Threat Hunting - Suspicious TLDs (2024)

Threat Hunting - Suspicious TLDs (3)

Top-level domains (TLDs) hold significant influence in the domain name system (DNS) hierarchy and can serve as indicators for threat detection.

Threat Hunting - Suspicious TLDs (4)

Properties and policies associated with TLDs, such as pricing, registration restrictions, and security practices, contribute to their attractiveness for malicious activities. Notably, TLDs offering free domain registration or from developing countries have emerged as prime targets for the deployment of phishing domains, highlighting the need to ThreatHunting for suspicious TLDs !

Multiple researches indicates that a significant proportion of malicious domain registrations are concentrate within a limited number of TLDs. While these TLDs themselves may not be inherently malicious, their susceptibility to abuse is high.

Great insights into the malicious TLD trends compared to the previous quarter

Threat Hunting - Suspicious TLDs (5)

TOP 10 most abused TLDs by spamhaus

Threat Hunting - Suspicious TLDs (6)

Great insight on the cybercrime incidents trend, for example:

These resources provide regular updates on TLDs with the highest number of malicious domains, along with a ratio and trend indicator. For instance, the netcraft.com list highlights that 10% of the domains with the TLD .lat are malicious … a significant percentage that deserves to be hunted for !

Additionally, here is another research example on the malicious TLD trend in 2021 by PaloAlto categorized by threat:

Threat Hunting - Suspicious TLDs (8)

Using these resources, I have compiled a list of suspicious TLDs for Threat Hunting in your proxy or DNS logs within your environment. The list is categorized by threat category (most known for), popularity, and severity, which aids us in hunting more efficiently. I have intentionally excluded some highly popular TLDs to prevent an excessive number of results for analysis, even in Threat Hunting scenarios. I have retained those with the highest ratio of malicious domains and the recently trending TLDs that attackers have been exploiting. The list is available on GitHub and will be regularly updated: https://github.com/mthcht/awesome-lists/blob/main/Lists/suspicious_tlds_list.csv

Threat Hunting - Suspicious TLDs (9)

Upload the list suspicious_tlds_list.csv on Splunk

Threat Hunting - Suspicious TLDs (10)

Create a definition lookup named suspicious_tlds_list for the lookup suspicious_tlds_list.csv with the option WILDCARD(url_domain)

Threat Hunting - Suspicious TLDs (11)

Use the List to Hunt for Suspicious TLDs in proxy logs:

Threat Hunting - Suspicious TLDs (12)

you can speed up the search process by including a
|[|inputlookup suspicious_tlds_list | table url_domain | rename url_domain as dest_host]
before the |lookup but it can consume more CPU on your indexers

you might also want to include src_ip, src_user, category, severity, process fields when available

Additinals searches options:

after the |lookup instead of the |where you can search specific values from the lookup:

Threat Hunting - Suspicious TLDs (13)

filtering on low popularity tlds associated with phishing with a high and critical severity for example

You can also search in your mail logs by focusing on the sender domain of incoming emails (make sure the field is parsed), and apply the same filters to identify senders with suspicious TLDs based on the sources I’ve mentioned.

Using these splunk searches, we searched through our proxy logs for the suspicious TLDs requested by our users using our list suspicious_tlds_list, We initiated a simple | stats command, which yielded thousands of results.

Threat Hunting - Suspicious TLDs (14)

send the job to background or copy the job id of your search:

Threat Hunting - Suspicious TLDs (15)

load it:

Threat Hunting - Suspicious TLDs (16)

an example result :

Threat Hunting - Suspicious TLDs (17)

If you have too many results, check what is causing the most noise:

Threat Hunting - Suspicious TLDs (18)
Threat Hunting - Suspicious TLDs (19)

This helps us identify which TLDs are creating the most disturbance in our environment. In this example, we have .pro .me .info .cc .ru .link .support .id .space .live .pics .pub .cn .il

This is why I included a popularity indicator in the list, enabling you to filter out the most popular ones. However, if you still wish to hunt for popular and suspicious TLDs, we can examine the number of domains requested by each TLD:

Threat Hunting - Suspicious TLDs (20)

This isn’t too many domains to search for in this example result. We can further exclude more domains using these methods:

Threat Hunting - Suspicious TLDs (21)

Example dashboards with hashes https://x.com/mthcht/status/1692122508420358353 although this can also be done for domains and URLs.

  • AbuseIPDB: Use the AbuseIPDB API to check all the domain IP addresses with a free license (allowing 1000 checks per day), this can help identify domains with reported or blacklisted IP addresses. https://www.abuseipdb.com/splunk
  • HTTP Method: Filter on the HTTP method, Data exfiltration to a suspicious TLD could be more important to investigate |search http_method=POST after the |loadjob
Threat Hunting - Suspicious TLDs (22)

reducing even more our results:

Threat Hunting - Suspicious TLDs (23)
Threat Hunting - Suspicious TLDs (24)
  • Domain IP address location: Sometimes looking at the domain IP address locations can help you identify anomalies from the usual network traffic of an user, you can use | iplocation dest_ip with splunk to get more informations about the destination IP addresses
  • Destination Port: Include the dest_port in your initial search, if available in your proxy logs. You can filter based on specific ports using the list of suspicious ports, accessible at https://github.com/mthcht/awesome-lists/blob/main/Lists/suspicious_ports_list.csv, for more guidance, check https://mthcht.medium.com/hunting-for-suspicious-ports-activities-50ef56d5cef
  • Suspicious User agent: Search for suspicious user agents in your results related to suspicious TLDs using my list of suspicious user agents https://github.com/mthcht/awesome-lists/blob/main/Lists/suspicious_http_user_agents_list.csv
  • Baseline: I recommend having a scheduled search that saves some information on the SIEM. For instance, when a domain is requested for the first time in the last 30 days, you’d want the date of the first request and the domain. You can then use this information in your hunting search to only keep the newly contacted domains in your environment if necessary.
  • Aggregatation: Aggregate by src_user or src_ip to quickly identify the users who have made the most requests to suspicious TLDs.

By implementing these filters, you should have a reasonable number of URLs to check, enabling you to find something interesting to investigate !

The process of hunting for suspicious TLDs demands significant effort and attention to detail. I highly recommend focusing on using the suspicious TLDs list only for ThreatHunting purposes or with low signal alerts that can be cross-referenced with other alerts on your SIEM

Happy Hunting !

Threat Hunting - Suspicious TLDs (25)
Threat Hunting - Suspicious TLDs (2024)

FAQs

What is suspicious TLD? ›

Top-level domains (TLDs) hold significant influence in the domain name system (DNS) hierarchy and can serve as indicators for threat detection. Properties and policies associated with TLDs, such as pricing, registration restrictions, and security practices, contribute to their attractiveness for malicious activities.

Which TLD is commonly associated with malicious activities? ›

Phishing Landscape 2020: Top 20 Top-level Domains by Malicious Phishing Domain Count
RankTLDTLD type
1comlegacy gTLD
2tkFreenom ccTLD
3buzznew gTLD
4xyznew gTLD
16 more rows

Which TLD is most secure? ›

.com is the #1 most trusted TLD, with . co in a close second place. When people try to remember a URL, they're 3.8 times more likely to assume it ends in .com than anything else.

What is TLD in cybersecurity? ›

A top-level domain (TLD), or domain suffix, represents the right-most segment of a domain address, specifically the letters immediately following the last “dot” in the domain (e.g., “. org” is the TLD in www.cisecurity.org).

What is a TLD example? ›

In the DNS hierarchy, a top-level domain (TLD) represents the first stop after the root zone. In simpler terms, a TLD is everything that follows the final dot of a domain name. For example, in the domain name 'google.com', '.com' is the TLD.

What is the most common TLD? ›

Let's explore the five most common domain extensions and why you should consider that extension for your new domain.
  • 1. .com. A .com domain extension is hands-down the most popular TLD available. ...
  • 2. . net. ...
  • 3. . org. ...
  • 4. . co. ...
  • 5. . us.

What is the TLD used by the US military? ›

The . mil top level domain is reserved exclusively for United State Department of Defense organizations. All Defense Media Activity (DMA) websites are hosted on secure U.S. Department of Defense servers. They are delivered using the most current transmission security standards (TLS) and Domain Name Services (DNS-SEC).

Which TLDs are restricted? ›

The .gov TLD is limited to United States governmental entities and agencies as well as qualifying state, county and local municipal government agencies, and tribal governments. The .mil TLD is limited to divisions, services and agencies of the United States Department of Defense.

Does Google care about TLD? ›

How important are they really in search? A: Overall, our systems treat new gTLDs like other gTLDs (like .com and . org). Keywords in a TLD do not give any advantage or disadvantage in search.

Who controls TLD? ›

Responsibility for management of most top-level domains is delegated to specific organizations by the ICANN, an Internet multi-stakeholder community, which operates the Internet Assigned Numbers Authority (IANA), and is in charge of maintaining the DNS root zone.

What are the two types of TLDs? ›

There are 5 official types of TLDs: Generic Top-level Domains (gTLD) Sponsored Top-level Domains (sTLD) Country Code Top-level Domains (ccTLD)

What is the purpose of a TLD? ›

The top-level domain identifies, organizes and classifies websites based on their purpose, location and content. For instance, a .com is for commercial websites and . edu is for educational websites. TLDs provide users and search engines with an idea behind your website, location and industry.

What is the meaning of TLD? ›

What is the meaning of TLD? TLD stands for top-level domain and describes the part of a URL that represents the final section of a domain name. For example, in the domain name Shopify.com, the TLD is .com.

What does untrustworthy TLDs mean? ›

This particular SpamAssassin rule is meant to warn users of "untrustworthy TLDs" (top level domains) like, for example, . click. Meaning that the makers of SpamAssassin believe that linking to a "dot click" domain is a spam sign.

What does a TLD do? ›

Purpose of TLDs: Thermoluminescent dosimeters (TLDs) measure and record ionizing radiation exposure, commonly used in workplaces where radiation is present. How TLDs Work: TLDs absorb radiation, store energy, and release it as light when heated, with the light emitted proportional to the radiation dose.

What is a suspicious domain name? ›

Cybersecurity. Domain name spoofing is when hackers attempt to trick users by pretending to be a website or email domain. Domain spoofing aims to fool a user into responding to a malicious email or phishing website under the false impression that it is authentic.

Top Articles
Compound money, not mistakes
What is a good credit score?
Where are the Best Boxing Gyms in the UK? - JD Sports
Victory Road Radical Red
Plaza Nails Clifton
South Carolina defeats Caitlin Clark and Iowa to win national championship and complete perfect season
O'reilly's In Monroe Georgia
Overzicht reviews voor 2Cheap.nl
4302024447
A Guide to Common New England Home Styles
Busty Bruce Lee
The most iconic acting lineages in cinema history
The Cure Average Setlist
Check From Po Box 1111 Charlotte Nc 28201
Xomissmandi
Tvtv.us Duluth Mn
Drago Funeral Home & Cremation Services Obituaries
Leccion 4 Lesson Test
Timeforce Choctaw
Www.craigslist.com Savannah Ga
Marion City Wide Garage Sale 2023
About My Father Showtimes Near Copper Creek 9
Vernon Dursley To Harry Potter Nyt Crossword
Costco Gas Hours St Cloud Mn
Rs3 Ushabti
Wsbtv Fish And Game Report
Dtm Urban Dictionary
Inter Miami Vs Fc Dallas Total Sportek
EVO Entertainment | Cinema. Bowling. Games.
Publix Near 12401 International Drive
Democrat And Chronicle Obituaries For This Week
TMO GRC Fortworth TX | T-Mobile Community
Jail Roster Independence Ks
Ultra Clear Epoxy Instructions
Gwen Stacy Rule 4
Peter Vigilante Biography, Net Worth, Age, Height, Family, Girlfriend
Www Violationinfo Com Login New Orleans
Junior / medior handhaver openbare ruimte (BOA) - Gemeente Leiden
Closest 24 Hour Walmart
Dallas City Council Agenda
The 50 Best Albums of 2023
Elisabeth Shue breaks silence about her top-secret 'Cobra Kai' appearance
Pepsi Collaboration
140000 Kilometers To Miles
Mytime Maple Grove Hospital
QVC hosts Carolyn Gracie, Dan Hughes among 400 laid off by network's parent company
Grizzly Expiration Date Chart 2023
The Largest Banks - ​​How to Transfer Money With Only Card Number and CVV (2024)
Www.homedepot .Com
Dietary Extras Given Crossword Clue
8663831604
When Is The First Cold Front In Florida 2022
Latest Posts
Article information

Author: Nicola Considine CPA

Last Updated:

Views: 6007

Rating: 4.9 / 5 (49 voted)

Reviews: 80% of readers found this page helpful

Author information

Name: Nicola Considine CPA

Birthday: 1993-02-26

Address: 3809 Clinton Inlet, East Aleisha, UT 46318-2392

Phone: +2681424145499

Job: Government Technician

Hobby: Calligraphy, Lego building, Worldbuilding, Shooting, Bird watching, Shopping, Cooking

Introduction: My name is Nicola Considine CPA, I am a determined, witty, powerful, brainy, open, smiling, proud person who loves writing and wants to share my knowledge and understanding with you.