Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

10/16/2019
06:20 PM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
50%
50%

Typosquatting Websites Proliferate in Run-up to US Elections

People who mistype the URL for their political candidate or party's website could end up on an opposing party or candidate's website, Digital Shadow's research shows.

Another sign that the Internet has become the newest venue for political battles is the sheer number of websites that have sprung up that appear designed to confuse or take advantage of people following the 2020 US Presidential elections.

Researchers from Digital Shadows recently looked at how many domains they could find that appear to be targeting users who accidentally mistype the website address for a US political candidate or an election-related domain (for example berniesander.com instead of berniesanders.com).

They wanted to find out where exactly on the Internet individuals who made such typos would end up and discovered over 550 phony websites for the 19 Democratic and 4 Republican candidates and 11 other election-related domains as of Sept. 20, 2019.

About one quarter of the domains (24%) appeared harmless and simply 'parked' with no content. Another 8% appeared to be the result of the URLs not being correctly configured when initially created: many of these sites hosted nothing but an index page.

The remaining 68% of typosquatting sites, however, actively redirected people to entirely new sites - some of which could eventually end up being used for nefarious purposes. For example, Digital Shadows found that an individual who inadvertently typed elizibethwarren.com would get redirected to a donaldjtrump.com page. Similarly, someone entering donaldtrump.digital would instead end up on hillaryclinton.com.

Users wanting to donate to specific Republican candidates by going to the WinRed site get redirected to the ActBlue fundraising site for Democrats if they accidentally submit winrde.com instead of winred.com. Digital Shadows researchers found similar redirects for sites associated with several other candidates including Tulsi Gabbard, Bernie Sanders, and Joe Biden.

Six of the typosquatting domains studied by Digital Shadows redirected users to various "secure browsing" and "file converter" Google Chrome extensions. While none of the extensions appeared overtly malicious, the permissions they required appeared "unreasonably high," Digital Shadows said in a report this week that summarized its research. Three of the extensions had access to cookies in the user's browser.

"Without calling out one candidate or one party over another for these typosquats, it's clear that the political battles are not taking place just on the debate stage or in the media but expanding to the cyber realm, as well," the security vendor said.

Harrison Van Riper, strategy and research analyst at Digital Shadows, says the typosquatting sites to which users are being directed don't appear malicious like the ones scammers typically use to host malware or to directly spoof a legitimate site. Additionally, though, redirection can also be used to initiate a drive-by download or a watering hole attack. There is no sign of such activity on the election-related sites so far, he says.

"So it's challenging to determine precisely how harmful they are," Van Riper notes. "It's hard to quantify the negative impact any one specific candidate could receive from typosquats like this though it could potentially be measured in dollars lost from fundraising," or from frustrating voters trying to get more information about a candidate.

Digital Shadows' research uncovered 66 domains with political-sounding names hosted on a single IP address by an entity with an address in Panama. The domains were all registered in the last 40 days and include those with names like cleareconomy.info; brinkofrecession.com; kamalaharriss.info; and polociprotest.info. Among the domains is one called dailytravelposh.com that previously hosted typosquatting pages for several technology companies.

All 66 domains presently contain no content, but it is possible that they will begin hosting typosquatted content sometime in the future, Digital Shadows said.

Related Content:

This free, all-day online conference offers a look at the latest tools, strategies, and best practices for protecting your organization’s most sensitive data. Click for more information and, to register, here.

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 6/5/2020
How AI and Automation Can Help Bridge the Cybersecurity Talent Gap
Peter Barker, Chief Product Officer at ForgeRock,  6/1/2020
Cybersecurity Spending Hits 'Temporary Pause' Amid Pandemic
Kelly Jackson Higgins, Executive Editor at Dark Reading,  6/2/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: What? IT said I needed virus protection!
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-13871
PUBLISHED: 2020-06-06
SQLite 3.32.2 has a use-after-free in resetAccumulator in select.c because the parse tree rewrite for window functions is too late.
CVE-2020-13864
PUBLISHED: 2020-06-05
The Elementor Page Builder plugin before 2.9.9 for WordPress suffers from a stored XSS vulnerability. An author user can create posts that result in a stored XSS by using a crafted payload in custom links.
CVE-2020-13865
PUBLISHED: 2020-06-05
The Elementor Page Builder plugin before 2.9.9 for WordPress suffers from multiple stored XSS vulnerabilities. An author user can create posts that result in stored XSS vulnerabilities, by using a crafted link in the custom URL or by applying custom attributes.
CVE-2020-11696
PUBLISHED: 2020-06-05
In Combodo iTop a menu shortcut name can be exploited with a stored XSS payload. This is fixed in all iTop packages (community, essential, professional) in version 2.7.0 and iTop essential and iTop professional in version 2.6.4.
CVE-2020-11697
PUBLISHED: 2020-06-05
In Combodo iTop, dashboard ids can be exploited with a reflective XSS payload. This is fixed in all iTop packages (community, essential, professional) for version 2.7.0 and in iTop essential and iTop professional packages for version 2.6.4.