Recent Articles

Nothing Compares to CPU

Nothing Compares to CPU

| June 8, 2016 | 0 Comments

Our technical operations team is critical for keeping the office afloat, which happens to be a very stressful job, so it’s only natural that they have a few outlets to remain sane. One of these outlets happens to be creativity. As an example, when faced with paying proper tribute to old hardware devices, tech ops found the […]

Continue Reading

The Monday Media Wrap Up

The Monday Media Wrap Up

| June 6, 2016 | 0 Comments

Articles from May 28 – June 4 FBI Alerts To Rise In Extortion Email Schemes Dark Reading | Staff | June 3, 2016 The FBI has issued an announcement alerting citizens to a rise in extortion email schemes related to recent high-profile data thefts, stating the message is sent as soon as breach of an […]

Continue Reading

DomainTools 101: Don’t Discount Subdomain Signals

DomainTools 101: Don’t Discount Subdomain Signals

| June 1, 2016 | 3 Comments

“If it looks too good to be true, it most likely is.” This is a mantra I live by when sifting through email, social media, or surfing websites. In my experience, if the text is odd, or poorly structured, that is a clue; and most importantly, if there’s a suspicious structure to the domain, specifically […]

Continue Reading

The Monday Media Wrap Up

The Monday Media Wrap Up

| May 31, 2016 | 0 Comments

Articles from May 21-27 FBI Report: Deconstructing The Wide Scope Of Internet Crime Dark Reading | Ericka Chickowski | May 27, 2016 The FBI recently released its annual data dump from the Internet Crime Complaint Center (IC3), which offers up the consolidated information gleaned from a year’s worth of criminal complaints made to the agency […]

Continue Reading

Basic Principles of Domain Names

Basic Principles of Domain Names

| May 27, 2016 | 3 Comments

Forensic investigations are often fueled by Domain and DNS research. However, In order to harness the power of domain-based investigations, it’s imperative to understand the anatomy of domains. You’ll notice a short list of critical information regarding the origin of domain data is listed below: 5 Necessary Vocabulary Words: Registrant: The entity that registers a […]

Continue Reading

The Monday Media Wrap Up

The Monday Media Wrap Up

| May 23, 2016 | 0 Comments

Articles From May 14 – 20 Domain Abuse Sinks “Anchors Of Trust” Dark Reading | Kelly Jackson Higgins | May 18, 2016 Researchers at Georgia Tech have developed an algorithm that helps catch abuse of recycled domain names, where attackers hide behind a reputable domain or inherit one previously used for malicious purposes. Hijacking the […]

Continue Reading

DomainTools Celebrates 15 Years

DomainTools Celebrates 15 Years

| May 19, 2016 | 1 Comment

A few weeks back we celebrated our 15 year anniversary here at DomainTools. It was a day of forest restoration with the Nature Consortium, nature puns (which were so mulch fun), a speech from our fearless leader, and a delightful assortment of food and drink. This is a pretty typical DomainTools anniversary bash, especially considering […]

Continue Reading

The Monday Media Wrap Up

The Monday Media Wrap Up

| May 16, 2016 | 1 Comment

Articles from May 7-13 Cyber security firm reportedly ties Bangladesh bank heist to Sony attack Fox News | Staff | May 12, 2016 A cyber security firm said in a report Friday that the malicious software used in the Bangladesh Central Bank heist in February is linked to the 2014 Sony hack attack. BAE Systems […]

Continue Reading

DomainTools 101: Blocking and Tackling Bad Domains

DomainTools 101: Blocking and Tackling Bad Domains

| May 9, 2016 | 0 Comments

In my last post we covered some ways to look deeper into a report and find other connected domains that are part of the actors infrastructure. Let’s to continue to dive deeper and learn more. Reverse IP Pivot In our last post we uncovered an IP address that was being used to host the domain […]

Continue Reading

Enhancing Your Investigations: Introducing Iris 1.1

Enhancing Your Investigations: Introducing Iris 1.1

| May 9, 2016 | 0 Comments

Since we released Iris in September of 2015, we have spent very little time resting on our laurels; we know there are many things we can add to and enhance in Iris to better support the important work you do in your investigations. To that end, we’re happy to announce that we have released an important […]

Continue Reading