Wednesday, May 1, 2024

Zero-Day Bug in Verisign & IaaS Services Such as Google, Amazon let Hackers to Register Malicious Domains

A critical zero-day vulnerability that affected Verisign and multiple IaaS services companies such as Google, Amazon and DeigitalOcean let attackers register t homograph domain names ( .com and .net).

Successfully register these Homograph domains looks like the same well-known domains, and subdomains used to perform social engineering attacks & insider attackers to the organization and it is similar to the IDN Homograph attack

Researchers identified several homograph domains are active since 2017 with HTTPS certificate that mimics the various sectors domains incusing financial, internet shopping, technology, and other Fortune 100 sites.

Matt Hamilton, a researcher from Soluble identified that several Generic top-level domains (gTLDs) are possible to register using the Unicode Latin IPA Extension character, and also he was able to register the following Homograph domains.

amɑzon.com**
chɑse.com
sɑlesforce.com
ɡmɑil.com
ɑppɩe.com
ebɑy.com
ɡstatic.com
steɑmpowered.com
theɡuardian.com
theverɡe.com
washinɡtonpost.com
pɑypɑɩ.com
wɑlmɑrt.com
wɑsɑbisys.com
yɑhoo.com
cɩoudfɩare.com
deɩɩ.com
gmɑiɩ.com
gooɡleapis.com
huffinɡtonpost.com
instaɡram.com
microsoftonɩine.com
ɑmɑzonɑws.com**
ɑndroid.com
netfɩix.com
nvidiɑ.com
ɡoogɩe.com

The above registered homographic domains are exactly similar to the respective original domains with the use of Unicode Latin IPA.

Similarly, the researcher tested nearly 300 prominent domains and the vulnerability believed to be only used in highly-targeted social engineering campaigns that will install malware, and steal sensitive data.

According to the Soluble report ” It appears that Verisign and other providers have been unaware of the homoglyphs within the Unicode Latin IPA Extension character set”

Register Homographic Domain by a Mix of Unicode & Latin characters

Basically, Verisign prevents users to register the domains that used mixed scripts such as “gооgle.com” using Cyrillic “о”s .

But due to the Zero-day bug, it was possible to register domains with a mix of Unicode and Latin characters as long as the Unicode characters were themselves Latin.

“Registrars, like Verisign, explicitly enforce anti-homograph measures (disallowing mixed-scripts) because they don’t want lookalike domains on their gTLDs. Public services that exist on a shared root, such as “s3.amazonaws.com”, “storage.googleapis.com”, or other services which allow users to create arbitrarily-named subdomains, should apply these same restrictions—they are effectively acting as registrars for those roots in the same way Verisign does for “.com”. Researcher said.

This bug affected not only VeriSign gTLDs but, any TLD which allows Latin IPA characters is likely affected. 

This vulnerability consider as Zero-day since multiple instances of HTTPS certificate logs through Certificate Transparency have been identified, also one “unofficial” JavaScript library hosted at a prominent domain.

Follow us on TwitterLinkedinFacebook for Daily cyber security & hacking news updates.

Website

Latest articles

Google Guide! How to Detect Browser Data Theft Using Windows Event Logs

In the ever-evolving cybersecurity landscape, Google is continually striving to protect user data from...

Millions of Malicious “Imageless” Docker Hub Repositories Drop Malware

In a startling revelation, nearly 20% of Docker Hub repositories have been identified as...

Attackers Leverage Sidecar Container Injection Technique To Stay Stealthy

Kubernetes (K8s) is an open-source container orchestration platform designed to automate application container deployment,...

How to Utilize Azure Logs to Identify Threats: Insights From Microsoft

Microsoft's Azure platform is a highly acclaimed and widely recognized solution that organizations worldwide...

Redline Malware Using Lua Bytecode to Challenge the SOC/TI Team to Detect

The first instance of Redline using such a method is in a new variant...

Threat Actor Claims Selling of Dell Database with 49M User Records

A threat actor reportedly sells a database containing 49 million user records from Dell,...

Google Blocks 2.28M Malicious Apps Entering The Play Store

A safe and trusted Google Play experience is our top priority.We leverage our...
Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

WAAP/WAF ROI Analysis

Mastering WAAP/WAF ROI Analysis

As the importance of compliance and safeguarding critical websites and APIs grows, Web Application and API Protection (WAAP) solutions play an integral role.
Key takeaways include:

  • Pricing models
  • Cost Estimation
  • ROI Calculation

Related Articles