Deep Web

It is too easy to find enterprise logins on the Dark Web

Anomali Labs analyzed attacks against the reputation of FTSE 100 companies highlighting the availability in the Dark Web of employees data.

Anomali Labs analyzed attacks against the reputation of FTSE 100  companies highlighting the availability in the Dark Web of employees’ data.

Brand spoofing is an illegal practice that causes several damages to companies worldwide, crooks use to clone legitimate websites in the attempt to trick users into supplying confidential data.

The Anomali Labs security firm published a report titled “The FTSE 100: Targeted Brand Attacks and Mass Credential Exposures” that analyzes the cyber attacks on the companies’ brand focusing on FTSE 100 firms.

“The focus of this report is to look at the Financial Times Stock Exchange 100 (FTSE 100 Index) to identify suspicious domain registrations and potentially compromised accounts that could be used as part of an attack. ” states the report.

The study revealed that 81 companies in the FTSE 100 had potentially malicious domain registrations against them in the past three months, meanwhile, the total number of registered malicious domain names detected is 527, this means that each company had an average of five domains per company.

The sectors most impacted by such kind of illegal practice are Financial Services (376 malicious domain registrations), Retail (175) and Critical Infrastructure (75).

Analyzing the suspicious domain registrations per Country the experts noticed that most of were registered using a Chinese address, followed by the US, and Panama.

Dark Web - Suspicious Domain Registration by countryDark Web - Suspicious Domain Registration by country

Threat actors in the wild use bogus domain as part of fraud scheme that leverage on social engineering to trick victims into entering their personal information or visit domains hosting exploit kit that serve malware.

The data gathered with this technique are usually sold in the underground or used in further attacks against the companies.

“Mass compromised credential exposures are becoming a major problem. This often occurs when websites are compromised and collected usernames and passwords are stolen and either published or sold.” continues the report. “It is a problem because the vast majority of users reuse passwords across many sites, and many companies still do not have universal adoption of multi-factor authentication. There are a lot of employees that use their work email and password on sites outside of their work. Many of the sites they go to off-hours were likely compromised in a way that allowed the credentials to end up on the dark web.”

Experts from the Anomali firm have found 5,275 employee email and clear text password combinations from FTSE 100 companies available on the Dark Web, on crime forums, on paste sites, or posted through accidental exposure

The data is alarming is we consider that average of 50 employees for each FTSE 100 company have had their credentials exposed online.

“The list includes not only included companies with headquarters in the UK, but also any global subsidiary of those companies.” states the report. “The Oil and Gas vertical accounted for nearly 20% with 1,090 accounts”

Experts pointed out the bad habit of employees for visiting non-work-related sites that have then been hacked. This is the case of a major UK-based football website that suffered a data breach in April and its data was leaked on the Dark web.

Anomali estimated that 40 corporate credentials across 23 companies were exposed in this security breach.

“Employees need to be reminded of the dangers of surfing to these types of websites and logging in using corporate email addresses and passwords.  Companies should monitor for compromised employee credentials so they can force reset accounts and gather metrics about how often employees are using their work email addresses for access to non-work related websites,” states Anomali.

[adrotate banner=”9″]

Pierluigi Paganini

(Security Affairs – Dark Web, Brand Spoofing)

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Two Linux flaws can lead to the disclosure of sensitive data

Qualys warns of two information disclosure flaws in apport and systemd-coredump, the core dump handlers in Ubuntu, Red Hat Enterprise…

3 hours ago

Meta stopped covert operations from Iran, China, and Romania spreading propaganda

Meta stopped three covert operations from Iran, China, and Romania using fake accounts to spread…

22 hours ago

US Treasury sanctioned the firm Funnull Technology as major cyber scam facilitator

The U.S. sanctioned Funnull Technology and Liu Lizhi for aiding romance scams that caused major…

1 day ago

ConnectWise suffered a cyberattack carried out by a sophisticated nation state actor<gwmw style="display:none;"></gwmw><gwmw style="display:none;"></gwmw>

ConnectWise detected suspicious activity linked to a nation-state actor, impacting a small number of its…

1 day ago

Victoria’s Secret ‘s website offline following a cyberattack

Victoria’s Secret took its website offline after a cyberattack, with experts warning of rising threats…

2 days ago

China-linked APT41 used Google Calendar as C2 to control its TOUGHPROGRESS malware

Google says China-linked group APT41 controlled malware via Google Calendar to target governments through a…

2 days ago