A doppelganger domain is a domain spelled identical to a legitimate fully qualified domain name (FQDN) but missing the dot between host/subdomain and domain, to be used for malicious purposes.
Typosquatting's traditional attack vector is through the web to distribute malware or harvest credentials. Other vectors such as email and remote access services such as SSH, RDP, and VPN also can be leveraged. In a whitepaper by Godai Group on doppelganger domains, they demonstrated that numerous emails can be harvested without anyone noticing.
If someone's email address is "email@example.com", the doppelganger domain would be "financesomecompany.example". Hence, if someone is trying to send an email to that user and they forget the dot after "finance" (firstname.lastname@example.org), it would go to the doppelganger domain instead of the legitimate user.
- Anticybersquatting Consumer Protection Act (ACPA)
- Domain Name System (DNS)
- Uniform Domain-Name Dispute-Resolution Policy (UDRP)
- "Doppelganger Domain whitepaper". Godai Group. 6 Sep 2011.
- "Researchers' Typosquatting Stole 20 GB of E-Mail From Fortune 500". Wired. 8 Sep 2011.
- "Bad spelling opens up security loophole". BBC. 12 Sep 2011.
|This Internet-related article is a stub. You can help Wikipedia by expanding it.|
|This malware-related article is a stub. You can help Wikipedia by expanding it.|