Post

LetsDefend - SOC326

Impersonating Domain MX Record Change Detected

LetsDefend - SOC326

Initial incident

We start by seeing the initial incident

Initial Incident

A Medium severity incident is reported on Sep 17th 2024 at 12:05 PM

An alert was triggered due to a suspicious Mail Exchange (MX) record modification, involving a domain that bears a striking resemblance to letsdefend.io, with a substitute variation letsdefwnd.io. This clearly bears the hallmarks of a phishing attack, where a treat actor has intentionally crafted a malicious domain with the aim of deceiving unsuspecting individuals

An MX record is a type of DNS record that identifies the mail servers authorized to receive emails on behalf of the domain

The source address for the alert is no-reply@ctireport.io, which is likely associated with a threat intelligence provider (such as CrowdStrike Falcon, Cisco Talos, etc.). These providers monitor public data sources, including domains and DNS records, for changes that might indicate potential phishing attempts or other malicious activities

Understanding the attack process

  • Register a domain that closely resembles ours letsdefwnd.io
  • Change the MX record of the impersonating domain letsdefwnd.io to point to their mail server mail.mailerhost.net. This change will allow them to receive and manage all emails directed to the lookalike domain
  • Send phishing emails from the impersonating domain

Let’s take ownership of the alert

Ownedship

Great, now that we have ownership the alert will be in our Investigation Channel

Now, we can begin investigation. Since this is clearly a malicious domain intended to phish emails, let’s head over the the Email Security Tab to look for any phishing emails

Email Security

Here, we can look for the malicious domain in question letsdwfend.io

Alert

We see only one alert, and it comes from the notification in question

Email Notification

This email notification outlines the findings that we discussed earlier, providing a bit more detail such as the domain registrar & registrant

Let’s search letsdefwnd.io against VirusTotals database

Virtus Total

As we can see, the domain is flagged as a phishing domain

Let’s create a playbook for this alert as necessary

Playbook Questions

Are there any or URLs in the email?

  • Technically, yes. However, it wasn’t a phishing email as it was the notification email

Analyze Url/Attachment

  • The domain letsdefwnd.io was searched via VirusTotal

Check if Mail Delivered to User?

  • I answered no here, (this is incorrect) since no actual phishing email was sent

Delete Email from recipient!

  • Nothing to delete outside of an alert

Containment

  • Nothing to contain

Artifacts

Artifacts

Analyst Note

Analyst Note

Results

Results

As we can see, I got the check if mail delivered to user question incorrect. I’m unsure if the notification email constituted as a yes to this question or not as I could not find an actual phishing email that was sent from the typosquatted email in question

Feel free to send me a message on YouTube / Linkdin if I got something incorrect

GG, thats SOC326!

This post is licensed under CC BY 4.0 by the author.