Hacking law firms with abandoned - Iron Bastion...Backlinks(DMoz/ Ahrefs) 5. Register domain 6....

Preview:

Citation preview

Hacking law firms

with abandoned

domain names

“You had better keep your expiring domain names alive”

gabor:~$ whoami

Gabor Szathmari@gszathmari

Cyber security expert @ Iron Bastion

Privacy advocate @ CryptoAUSTRALIA

Which one is real?

OptusGames.com.au

TheWestPacCentre.com.au

wmWoolworthsMoneyCreditCard.com.au

@gszathmari

Overview

•How domain names die?

•How to find good domain names?

•Hacking law firms – The examples

•Tips for individuals & red/blue teams

Let’s go!

How domain names die?

.au domain lapsing:

1. Active

2. ‘Expired Hold’ (30 days)

3. ‘Expired Pending Purge’ (1 day)

4. Purged at 1.00pm (AEST)

5. Available for new registration

How to find

good domain names?

The manual method 1.

$ cat RO_expired-domain-names_au_daily_2018-09-08.csv | grep law

2018-09-04,04:13:42,joshlawelectrical.com.au

2018-09-04,04:30:04,comslaw.org.au

2018-09-04,05:37:05,lawyersforbusiness.net.au

[…]

KeywordsBacklinks Dmoz rating

The manual method 2.

Workflow

1. Iden.fy good sounding names

2. How the website looked like? à web.archive.org

3. Look up domain reputa.on(for proxy and spam filter bypass)

4. Backlinks (DMoz / Ahrefs)

5. Register domain

6. Profit!

Hacking law firms

with abandoned

domains

Reasons to target law firms

•Merge and get acquired frequently

•Low-security businesses

•Manage sensitive data and high-value

payments

Reasons to NOT target law firms

#1: Tendency to sue people

What we did

1. Identified valuable expired

domain names

2. Registered domain name

3. Added our MX hosts – ‘catch all’

4. Started receiving emails

Ques%on 1.

What are the auDA

requirements to register

a .com.au domain?

Question 1.

1. Must be one of these:•Registered business •Sole trader• Incorporated association•Trade mark owner

2. Must provide ABN/ACN/ARBN/TM#

3. Be able to tick a box

Loot #1:

Statements and

no/fica/ons

Text-to-email

service

Loot #2:

Legal documents

Family legal matter

Family legal ma*er

Tax invoice

Client enquiry

Negotiation strategy

Nego%a%on strategy

Bank statements

Par-tay! !

Loot #3:

Password

recovery

Ques%on 2.

What are the domain

verification methods on

‘Havibeenpwned’?

Question 2.

•Email – e.g. postmaster@

•Website – Meta tag and file upload

•DNS – TXT record

SpyCloud.com

Casual observation

Lawyers are:

•guilty of using crappy passwords

•tend to reuse them across mul7ple

websites

Loot #4:

Password

resets

Loot #5:

Professional-

specific portals

What else we could’ve accessed?

•NSW Online Registry

•PayPal (accounts@mylawfirm.com.au)

•Google AdWords

•G Suite admin panel

•Office 365 admin portal

Recap

•Sensi&ve data in emails

•List of email accounts at

haveibeenpwned

•Passwords from SpyCloud

•Password reset emails

How to prevent pwnage? (1/2)

•Keep renewing the domain name indefinitely;

•Close user accounts that were registered with the

business email address

(e.g. Dropbox, Commonwealth Courts Portal, PayPal);

•Change or remove the business email address from

online user accounts (e.g. LinkedIn, Facebook);

How to prevent pwnage? (2/2)

•Unsubscribe from email no0fica0ons that usually features sensi0ve data (Text-to-email services, mobile phone billing no0fica0ons);

•Advise your clients to update their address book;

• Enable two-factor authen0ca0on where the feature is supported for online services; and

•Use unique and complex passwords.

Red Teams

Blue Teams

Abandoned versus new domains

Better reputation:

•Backlinks/SEO on Google

•Proxy category

•Spam – Not flagged as a newly

registered domain

Ideal for phishing

Blue Teams – Protect my organisation

•Phishing against my organisa.on

• Informa.on leakage (via ‘catch all’ email service)

•Shadow IT takeover (e.g. rogue Dropbox accounts)

•www. or *. à Web traffic / API traffic / iframe/

embedded content hijacking

•Haveibeenpwned, SpyCloud

Red Teams – Security assessments

•Ideal for phishing campaigns

•Gather leaked creden5als

•Provides access to 3rd party

online services

Question 3.

Can you name three domain reputation services?** Used by proxy servers

Question 3.

• For$net - h+p://url.for$net.net/rate/submit.php

•McAfee - h+ps://www.trustedsource.org/en/feedback/url

• Trend Micro - h+ps://global.sitesafety.trendmicro.com/index.php

• Symantec WebPulse Site Review -

h+ps://sitereview.bluecoat.com/

• Barracuda Central -

h+p://www.barracudacentral.org/report/website-category

Tooling

•Ubuntu + Pos+ix + Dovecot

•Domain registra6on:

•Manual

•API – Above.com

•Domain backorders

• ‘Drop catch’ services

(e.g. www.dropcatch.com, www.drop.com.au)

Summary

•Expired domains are .ed to your

personal/professional online presence in

unexpected ways

•Overlooked a:ack vector (Red Teams)

•Achilles’s Heel of your organisa.on (Blue Teams)

•ProTip™: Keep your domain names registered

Fun facts

In this research, we:

•Registered six abandoned domain names

•Received approximately 25,000 emails in total

•Won $250,000 from Mark Zuckerberg himself (we are yet to claim the prize)

Questions?

h"ps://blog.gaborszathmari.me/2018/08/22/hacking-law-firms-abandoned-domain-name-a"ack/

@gszathmari

Recommended