<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Data Breach Resolution &#187; data hacking</title>
	<atom:link href="http://www.experian.com/blogs/data-breach/tag/data-hacking/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.experian.com/blogs/data-breach</link>
	<description>Tools to help you navigate privacy, compliance, and security issues that may result in a data breach.</description>
	<lastBuildDate>Thu, 03 Jan 2013 19:44:41 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.4.2</generator>
		<item>
		<title>Stealing data through doppelganger domains</title>
		<link>http://www.experian.com/blogs/data-breach/2011/10/18/stealing-data-through-doppelganger-domains/</link>
		<comments>http://www.experian.com/blogs/data-breach/2011/10/18/stealing-data-through-doppelganger-domains/#comments</comments>
		<pubDate>Tue, 18 Oct 2011 15:28:02 +0000</pubDate>
		<dc:creator>ofonseca</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[data hacking]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[Doppelganger domains]]></category>
		<category><![CDATA[typo-squatting]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=832</guid>
		<description><![CDATA[A new form of data hacking has been exposed by two researchers who found ways to easily penetrate Fortune 500 companies through mistyped email addresses.]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2011%2F10%2F18%2Fstealing-data-through-doppelganger-domains%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=Data+Breach,data+hacking,Data+Security,Doppelganger+domains,typo-squatting&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/10/data_security.jpg"><img class="aligncenter size-full wp-image-836" title="data_security" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/10/data_security.jpg" alt="" width="448" height="291" /></a></p>
<p>A new form of data hacking has been exposed by two researchers who found ways to easily penetrate Fortune 500 companies through mistyped email addresses.</p>
<p>So-called typo-squatting &#8211; where criminals register for domains that are similar to those of legitimate businesses &#8211; has served as a fraudster tactic for years.  The newest twist on an old hack involves creating <a rel="”nofollow” nofollow" href="http://www.wired.com/threatlevel/2011/09/doppelganger-domains/" target="_blank" class="broken_link">doppelganger domains</a> by simply omitting the dot between a company’s host name and subdomain name.  This serves as an ideal tool to scoop up emails directed to a large corporation’s regional offices; for example, a hacker might register for seibm.com, as opposed to the true address of IBM’s Swedish division, se.ibm.com.</p>
<p>Researchers from information security firm <a rel="”nofollow” nofollow" href="http://www.wired.com/images_blogs/threatlevel/2011/09/Doppelganger.Domains.pdf" target="_blank" class="broken_link">Godai Group</a> spent six months testing the effectiveness of this hack.  The results were alarming.  Thirty percent of the Fortune 500 companies targeted proved vulnerable to this security loophole, with the researchers able to collect 20 gigabytes of data, including emails that contained trade secrets, invoices, employee information, network diagrams, usernames and passwords.  Some of the largest Fortune 500 companies can have as many as 60 subdomains, all with a high volume of traffic, so this scam can reap huge rewards for determined hackers.</p>
<p>The newest typo-squatting technique can be used in two ways.  The first is passively, where a fraudster simply registers for a doppelganger domain, sets up an email server to catch any emails sent to this domain, and then waits for his in-box to fill up with data breach goodies.  If the fraudster wants to take things a step further, he can actively redirect emails to the intended recipients in order to get a reply.  With this “man in the middle” technique, the hacker sets up doppelganger domains for two companies that he knows are corresponding and writes a script to forward emails that he receives between the two entities, thus doubling his access to sensitive data.</p>
<p>How can doppelgangers be deterred?  Companies can mitigate their exposure to this threat by registering for doppelganger domains themselves, or – when those domains have already been snapped up – configuring their internal and external DNS servers to block those incorrect domains.  Above all, this latest incarnation of typo-squatting is a reminder of the need for vigilant <a href="http://www.experian.com/data-breach/data-breach-resources.html" target="_blank">security systems</a> to ward off new and emerging data breach tactics.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2011/10/18/stealing-data-through-doppelganger-domains/&via=Experian_DBR&text=Stealing data through doppelganger domains&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2011/10/18/stealing-data-through-doppelganger-domains/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>