Collecting Domain Intelligence
- TLD zone files list every active, registered domain for that specific TLD created on a daily basis.
- Secure Socket Layer certificate transparency logs present domains, subdomains, and so on for the millions of new SSL certificates issued daily.
- DNS traffic contains domain names being queried and can be monitored for new domains.
- DNS queries can be performed using look-alike variations of legitimate domains to see if variations currently exist.
Curating Domain Intelligence
To accurately distinguish real domain threats from false positives, collected intelligence must be analyzed using a combination of automated tools and expert human review. Domain strings often include related or misleading terms, so analysts must evaluate both keywords and variations to assess whether a domain poses a legitimate threat.
Effective domain intelligence analysis involves three key steps:
Score domain feed entries based on severity.
Review each result in detail.
Categorize the domain accordingly.
Key indicators that help determine whether a domain is a threat include:
The Domain String
The Content
Analysts also should examine the content hosted on associated web pages. Key indicators of a suspicious domain include the presence of relevant data and whether the site appears to impersonate or reference a legitimate brand. In many cases, the relationship between the content and the domain is ambiguous, requiring further evaluation by appropriate business units.
If either the domain string or the hosted content raises suspicion, security teams should conduct a thorough review of all available data to identify any signs of malicious behavior. Additionally, it’s important to determine whether the domain has an active Mail Exchanger (MX) record, which designates the mail server responsible for handling email. The presence of an MX record may indicate the domain is being used for business email compromise (BEC), phishing, or spam campaigns.
Malicious domains can be leveraged in numerous ways to harm an organization. As threat actors continue to refine their evasion techniques, the ability to rapidly identify and analyze suspicious domains is essential. Implementing robust, end-to-end processes for threat collection and curation is critical to enabling timely and effective mitigation.
Ready to break the attack chain of fraud and brand Impersonation? Schedule a demo with Fortra Brand Protection to see us in action.