In today’s digital landscape, cybercriminals are constantly finding new sophisticated ways to compromise corporate systems. An example of a clever tactic used: typosquatting- an attack style that intentionally includes misspelled characters in the domain name that at a quick glance to the average user, may appear to be legitimate. Interacting with the fake domain may set the user up for a potential phishing attack.
Cado Security has released their latest blog, which discovered a domain that closely resembled the Cado corporate domain.
During a routine check, Cado discovered that just three days prior and before any damage had been done, the domain resembling the Cado domain, had been registered that contained a character substitution similar to what is seen for typosquatting attacks. Analysis revealed that not only was the domain being mimicked, but also several other tech companies’ domains have been targeted in a similar fashion.
This blog will discuss how this domain was identified, and the steps taken following discovery. You can read the blog here.
Like this:
Like Loading...
Related
This entry was posted on August 21, 2024 at 9:00 am and is filed under Commentary with tags Cado Security. You can follow any responses to this entry through the RSS 2.0 feed.
You can leave a response, or trackback from your own site.
New Research Reveals Attackers Mimicking Tech Companies’ Domain Using Typosquatting Techniques
In today’s digital landscape, cybercriminals are constantly finding new sophisticated ways to compromise corporate systems. An example of a clever tactic used: typosquatting- an attack style that intentionally includes misspelled characters in the domain name that at a quick glance to the average user, may appear to be legitimate. Interacting with the fake domain may set the user up for a potential phishing attack.
Cado Security has released their latest blog, which discovered a domain that closely resembled the Cado corporate domain.
During a routine check, Cado discovered that just three days prior and before any damage had been done, the domain resembling the Cado domain, had been registered that contained a character substitution similar to what is seen for typosquatting attacks. Analysis revealed that not only was the domain being mimicked, but also several other tech companies’ domains have been targeted in a similar fashion.
This blog will discuss how this domain was identified, and the steps taken following discovery. You can read the blog here.
Share this:
Like this:
Related
This entry was posted on August 21, 2024 at 9:00 am and is filed under Commentary with tags Cado Security. You can follow any responses to this entry through the RSS 2.0 feed. You can leave a response, or trackback from your own site.