Recent Articles

The Monday Media Wrap Up

The Monday Media Wrap Up

| June 20, 2016 | 0 Comments

Articles from June 11-17 ‘Guccifer 2.0’ claims glory for DNC Hack, more documents leaked SC UK | Max Metzger | June 17, 2016 A hacker claiming access to the servers of the Democratic National Committee (DNC) has posted more internal documents. Guccifer 2.0 has claimed responsibility and added that it was him and only him […]

Continue Reading

Go Phish: How the English Language Helps Threat Actors

Go Phish: How the English Language Helps Threat Actors

| June 14, 2016 | 0 Comments

There is no getting around it. Even though it is a language built on rigid rules, there are so many exceptions, words that are close in meaning, sound and usage, it is common to make grammatical errors. Not so surprisingly, threat actors deploying phishing campaigns often use these grammatical imperfections to their advantage. A typical […]

Continue Reading

Nothing Compares to CPU

Nothing Compares to CPU

| June 8, 2016 | 0 Comments

Our technical operations team is critical for keeping the office afloat, which happens to be a very stressful job, so it’s only natural that they have a few outlets to remain sane. One of these outlets happens to be creativity. As an example, when faced with paying proper tribute to old hardware devices, tech ops found the […]

Continue Reading

The Monday Media Wrap Up

The Monday Media Wrap Up

| June 6, 2016 | 0 Comments

Articles from May 28 – June 4 FBI Alerts To Rise In Extortion Email Schemes Dark Reading | Staff | June 3, 2016 The FBI has issued an announcement alerting citizens to a rise in extortion email schemes related to recent high-profile data thefts, stating the message is sent as soon as breach of an […]

Continue Reading

DomainTools 101: Don’t Discount Subdomain Signals

DomainTools 101: Don’t Discount Subdomain Signals

| June 1, 2016 | 3 Comments

“If it looks too good to be true, it most likely is.” This is a mantra I live by when sifting through email, social media, or surfing websites. In my experience, if the text is odd, or poorly structured, that is a clue; and most importantly, if there’s a suspicious structure to the domain, specifically […]

Continue Reading

The Monday Media Wrap Up

The Monday Media Wrap Up

| May 31, 2016 | 0 Comments

Articles from May 21-27 FBI Report: Deconstructing The Wide Scope Of Internet Crime Dark Reading | Ericka Chickowski | May 27, 2016 The FBI recently released its annual data dump from the Internet Crime Complaint Center (IC3), which offers up the consolidated information gleaned from a year’s worth of criminal complaints made to the agency […]

Continue Reading

Basic Principles of Domain Names

Basic Principles of Domain Names

| May 27, 2016 | 3 Comments

Forensic investigations are often fueled by Domain and DNS research. However, In order to harness the power of domain-based investigations, it’s imperative to understand the anatomy of domains. You’ll notice a short list of critical information regarding the origin of domain data is listed below: 5 Necessary Vocabulary Words: Registrant: The entity that registers a […]

Continue Reading

The Monday Media Wrap Up

The Monday Media Wrap Up

| May 23, 2016 | 0 Comments

Articles From May 14 – 20 Domain Abuse Sinks “Anchors Of Trust” Dark Reading | Kelly Jackson Higgins | May 18, 2016 Researchers at Georgia Tech have developed an algorithm that helps catch abuse of recycled domain names, where attackers hide behind a reputable domain or inherit one previously used for malicious purposes. Hijacking the […]

Continue Reading

DomainTools Celebrates 15 Years

DomainTools Celebrates 15 Years

| May 19, 2016 | 1 Comment

A few weeks back we celebrated our 15 year anniversary here at DomainTools. It was a day of forest restoration with the Nature Consortium, nature puns (which were so mulch fun), a speech from our fearless leader, and a delightful assortment of food and drink. This is a pretty typical DomainTools anniversary bash, especially considering […]

Continue Reading

The Monday Media Wrap Up

The Monday Media Wrap Up

| May 16, 2016 | 1 Comment

Articles from May 7-13 Cyber security firm reportedly ties Bangladesh bank heist to Sony attack Fox News | Staff | May 12, 2016 A cyber security firm said in a report Friday that the malicious software used in the Bangladesh Central Bank heist in February is linked to the 2014 Sony hack attack. BAE Systems […]

Continue Reading