Cybersecurity

“SubdoMailing” — Thousands of Hijacked Major-Brand Subdomains Found Bombarding Users With Millions…

14 min read

22 hours ago

The State of the (Spammer’s) Union

Email may just be one of the earliest forms of digital communication applied on the internet, and though it’s been more than 50 years since the first email was sent, it is still one of the main applications to be used — and abused.

The Fight against spammers and impersonators introduced several security and authentication methods, with SPF and DKIM back in 2004, following DMARC policy in 2012. All of those remained optional — until Google stepped up last year, requiring at least ONE of the optional authentication methods to pass. This will also become mandatory for mass mailers (sending more than 5000 emails daily) later this year.

What does this mean for the dark ecosystem of spam and phishing? For average spammers, this might mean a slight adjustment in tactics — securing domain authenticity and adding an unsubscribe option. However, these measures are hardly a hurdle for emails sourced from low-reputation domains bought by spammers in masses, which are also easily blocked.

Yet, the upcoming changes signal a significant shift for those engaged in more sinister activities — distributing unethical ads, spreading fake news, launching phishing attacks, and propagating malware.

Our research has revealed that threat actors are not merely reacting to security measures; they’ve been proactively adapting and evolving for some time. A significant part of their strategy involves exploiting the reputations and resources of legitimate domains to disseminate malicious content under the guise of trustworthy sources.

Website owners find themselves unwitting participants in these schemes, underscoring their shared duty to combat these threats actively. It’s crucial to regularly check your domains for signs of compromise and better manage your online assets — starting with removing unused subdomains and DNS records. By securing our websites and raising awareness, we can make the digital landscape a more challenging environment for scammers, tipping the scales in our favor.

Fighting Back!

At Guardio, our mission extends beyond merely detecting and blocking malicious emails for our customers. We are also committed to eradicating this issue at its source, aiming to dismantle the infrastructure that fuels such nefarious activities.

We decided to create a special “SubdoMailing” checker website, allowing domain administrators and site owners to quickly check if any trace of abuse was found by our systems — and get the relevant info needed to fix and prevent this.

Guardio’s SubdoMailing Checker Tool — www.guard.io/subdomailing

Our dedicated web page is updated daily with the latest domains impacted by CNAME and SPF-based hijacking, as detected by our systems. Searching for a domain will give you all the details of known abuses, type of hijack, and relevant sub-domains and SPF records in need of attention:

SubdoMailing checker results example — www.guard.io/subdomailing

We’re calling on you to help us spread the word about this threat and our vital website to fight it. Together, we can ensure that none of us inadvertently contribute to or become victims of these malicious activities. Share the link to out checker tool at www.guard.io/subdomailing