<span id="hs_cos_wrapper_post_body" class="hs_cos_wrapper hs_cos_wrapper_meta_field hs_cos_wrapper_type_rich_text" style="" data-hs-cos-general-type="meta_field" data-hs-cos-type="rich_text" ><p>Ever since we <a href="/blog/duckdns-malicious-typosquats" rel="noopener" target="_blank">posted about Duck DNS </a>&nbsp;at the end of last year, we have seen a ton of curiosity about the <span>free dynamic DNS hosting provider. As a reminder - Duck DNS allows anyone to route traffic from one of their subdomains (*.duckdns[.]org) to an IP of choice. Since this free service is so prevalently used, cyber attackers are joining the club and exploiting the service. Not only is it bad enough that it's already easy to abuse a free dynamic dns hosting service for malware,<span style="font-weight: bold;"> hackers are creating Duck DNS typosquats too</span>.</span></p> <p><span><!--more-->In our previous post, we showed an IP infrastructure that hosts these typosquats. The parent domains and their related IPs were:</span></p> <div><span style="text-decoration: underline;"><strong>Domains</strong></span><br>ducksdns[.]org<br>duckddns[.]org<br>ducknds[.]org<br>duck-dns[.]org<br>ducksns[.]org<br>duckcns[.]org<br>dockdns[.]org<br>dukdns[.]org<br>ducdns[.]org<br>duc.kdns[.]org<br>duckns[.]org<br>duck.dns[.]org</div> <div>&nbsp;</div> <div><span style="text-decoration: underline;"><strong>IPs</strong></span><br>170.178.168[.]203<br>103.224.182[.]242<br>70.32.1[.]32<br>81.171.22[.]7<br>23.82.12[.]31<br>192.185.167[.]252<br>199.59.242[.]153</div> <div>&nbsp;</div> <p style="direction: ltr;">An <span style="font-weight: bold;">updated analysis on the infrastructure&nbsp;</span><span style="font-weight: normal;">shows that the core IPs (<span>170.178.168[.]203, 103.224.182[.]242, 70.32.1[.]32) are still hosting much of the infrastructure, while additional IPs have joined in to host various Duck DNS typosquat subdomains. Based on the infrastructure dispersion seen below, and differences registrars and registration dates, we can guess that there are a few hackers/cyber groups that are trying to capitalize on Duck DNS typosquat abuse. </span></span><span style="font-weight: normal;"><span>And the worst part is - many of the fake domains listed above are in the list of most popular websites on the internet, meaning they are being "visited" (infecting victims) at a high rate.</span></span></p> <p style="direction: ltr; font-size: 12px;"><span style="font-weight: normal;"><span><img src="https://www.threatstop.com/hubfs/duckdns_typosquats_virustotal.png" alt="duckdns_typosquats_virustotal" width="1956" loading="lazy" style="width: 1956px;"><em>Image courtesy of VirusTotal</em></span></span><span style="font-weight: normal;"><span></span></span></p> <p style="direction: ltr;">&nbsp;</p> <p style="direction: ltr;"><span style="font-weight: normal;"><span>If you are a ThreatSTOP customer, you are automatically protected from this threat infrastructure and others like it. <span style="font-weight: bold;">Not a ThreatSTOP customer yet? Want to see ThreatSTOP instantly eliminate attacks on your network?</span></span></span></p> <p style="direction: ltr;"><span style="font-weight: normal;"><span><span style="font-weight: bold;"></span></span></span></p> <p><span>Note: <span style="font-weight: bold;">ThreatSTOP customers that want to block dynamic DNS providers</span> altogether can simply add our DynDNS target to their policy for instant protection.</span></p> <p>&nbsp;</p> <h3 style="text-align: center; font-size: 18px;">Indicators of compromise from updated analysis:</h3> <table width="327" style="border-collapse: collapse; table-layout: fixed; margin-left: auto; margin-right: auto; border: 1px solid #99acc2; width: 358px; height: 1064.08px;"> <tbody> <tr style="height: 21.3906px;"> <td style="text-align: center; width: 169px; height: 21px;"><strong>Subdomains Hosted</strong></td> <td style="text-align: center; width: 189px; height: 21px;"><strong>IP</strong></td> </tr> <tr style="height: 21.3906px;"> <td style="width: 169px; height: 21px;" rowspan="9">*.ducksdns[.]org</td> <td style="width: 189px; height: 21px;">23.82.12[.]32</td> </tr> <tr style="height: 21.3906px;"> <td style="width: 189px; height: 21px;">5.79.68[.]102</td> </tr> <tr style="height: 40px;"> <td style="width: 189px; height: 40px;">212.32.237[.]101</td> </tr> <tr style="height: 21.3906px;"> <td style="width: 189px; height: 21px;">23.82.12[.]29</td> </tr> <tr style="height: 40px;"> <td style="width: 189px; height: 40px;">212.32.237[.]92</td> </tr> <tr style="height: 21.3906px;"> <td style="width: 189px; height: 21px;">23.82.12[.]30</td> </tr> <tr style="height: 40px;"> <td style="width: 189px; height: 40px;">212.32.237[.]91</td> </tr> <tr style="height: 21.3906px;"> <td style="width: 189px; height: 21px;">23.82.12[.]31</td> </tr> <tr style="height: 40px;"> <td style="width: 189px; height: 40px;">212.32.237[.]90</td> </tr> <tr style="height: 24.0781px;"> <td style="width: 169px; height: 24px;" rowspan="3">*.duckddns[.]org<br>*.ducknds[.]org<br>*.duck-dns[.]org<br>*.duckcns[.]org<br>*.dockdns[.]org<br>*.ducknds[.]org</td> <td style="width: 189px; height: 24px;">70.32.1[.]32</td> </tr> <tr style="height: 45.1406px;"> <td style="width: 189px; height: 45px;">103.224.182[.]242</td> </tr> <tr style="height: 44.1094px;"> <td style="width: 189px; height: 44px;">170.178.168[.]203</td> </tr> <tr style="height: 21.3906px;"> <td style="width: 169px; height: 21px;">*.ducksns[.]org</td> <td style="width: 189px; height: 21px;">75.2.37[.]224</td> </tr> <tr style="height: 40px;"> <td style="width: 169px; height: 40px;">*.duc.kdns[.]org</td> <td style="width: 189px; height: 40px;">72.52.178[.]23</td> </tr> <tr style="height: 40px;"> <td style="width: 169px; height: 40px;" rowspan="14">*.duckns[.]org</td> <td style="width: 189px; height: 40px;">172.98.192[.]36</td> </tr> <tr style="height: 40px;"> <td style="width: 189px; height: 40px;">93.115.28[.]104</td> </tr> <tr style="height: 40px;"> <td style="width: 189px; height: 40px;">63.143.32[.]89</td> </tr> <tr style="height: 40px;"> <td style="width: 189px; height: 40px;">172.98.192[.]35</td> </tr> <tr style="height: 40px;"> <td style="width: 189px; height: 40px;">109.201.135[.]44</td> </tr> <tr style="height: 40px;"> <td style="width: 189px; height: 40px;">172.98.192[.]37</td> </tr> <tr style="height: 40px;"> <td style="width: 189px; height: 40px;">199.59.243[.]200</td> </tr> <tr style="height: 40px;"> <td style="width: 189px; height: 40px;">199.59.242[.]153</td> </tr> <tr style="height: 40px;"> <td style="width: 189px; height: 40px;">64.190.63[.]136</td> </tr> <tr style="height: 40px;"> <td style="width: 189px; height: 40px;">78.41.204[.]33</td> </tr> <tr style="height: 40px;"> <td style="width: 189px; height: 40px;">78.41.204[.]27</td> </tr> <tr style="height: 40px;"> <td style="width: 189px; height: 40px;">78.41.204[.]34</td> </tr> <tr style="height: 40px;"> <td style="width: 189px; height: 40px;">78.41.204[.]32</td> </tr> <tr style="height: 40px;"> <td style="width: 189px; height: 40px;">78.41.204[.]26</td> </tr> <tr style="height: 40px;"> <td style="width: 169px; height: 40px;">duck.dns[.]org:</td> <td style="width: 189px; height: 40px;">192.185.167[.]252</td> </tr> </tbody> </table></span>