June 20, 2018
Business Latest News | Poll Questions | Immigration | Lumber Market | RCV Ballots

Latest email scam: dropping the dot

By Sid Kirchheimer, AARP

First came “typosquatting.”

In this common scam, cyber-criminals buy Internet addresses that differ from big-name ones by just a letter or two, then capitalize on sloppy typing. Someone who wants to go to xyxcorp.com but accidentally types xyzcorp.com ends up at the scammer’s site.

Now comes another trick to hook the fumble-fingered, courtesy of a keystroke omission rather than a misspelling: a missing dot in an email address.

The goal is the same: to glean personal information, infect the visitor’s computer with a virus or sell worthless junk as a prized brand-name product.

This newly uncovered scheme, targeting the all-important dot in corporate communications systems, can route email into the hands of scammers, giving them any and all confidential information that the messages contain.

The scammers’ key tool is a “doppelganger” domain, an Internet address that is spelled identically to a legitimate site but is missing the crucial dot, typically found between what’s known as a subdomain and domain in the address.

Doppelganger domains would include “mailyahoo.com” instead of the correct “mail.yahoo.com,” or “seibm.com” instead of the correct “se.ibm.com” that IBM uses for its division in Sweden.

Doppelganger is a German term for a “ghostly counterpart of a living person” — and it’s an apt name for this scam.

The crooks purchase a doppelganger, then set it up on the Internet so that all mail that’s mistakenly addressed without the dot comes to their server, note researchers of the security consulting firm Godai Group in an eye-opening report released Sept. 6.

Godai’s Peter Kim and Garrett Gee spent six months measuring the doppelganger danger by setting up dot-missing variations of legitimate email domains run by every Fortune 500 company.

Over that time they were able to collect more than 120,000 misaddressed emails, some containing trade secrets, contracts and invoices complete with credit card information. Users’ email login information and employee data were also harvested.

Overall, the researchers concluded that nearly one-third of the Fortune 500 are susceptible to such attacks.

In fact, some of those companies, including Dell, Cisco, Yahoo and DuPont, had already been targeted by doppelgangers registered to addresses in China that were previously associated with scammer attacks. The doppelganger domain emailkohls.com, aimed at the Kohl’s department store chain, was registered to a Canadian post office box.

The take-home message of the study: Companies should themselves buy up doppelganger domains to prevent scammers from using them. To combat more traditional typosquatting, many companies already purchase Internet addresses that are misspelled versions of their legitimate websites.

And while mistyping an email address often (but not always) results in the message being bounced back to the sender, no bounce-back occurs if it goes to a doppelganger domain set up by a scammer.

This was adapted from the AARP Bulletin

Have feedback? Want to know more? Send us ideas for follow-up stories.

You may also like