An adversary registers a domain name that sounds the same as a trusted domain, but has a different spelling. A SoundSquatting attack takes advantage of a user's confusion of the two words to direct Internet traffic to adversary-controlled destinations. SoundSquatting does not require an attack against the trusted domain or complicated reverse engineering.
Description
Attack Execution Flow
Step 1
Explore[Determine target website] The adversary first determines which website to impersonate, generally one that is trusted, receives a consistent amount of traffic, and is a homophone.
Research popular or high traffic websites which are also homophones.
[Determina il sito web target] L'avversario innanzitutto stabilisce quale sito web impersonare, generalmente uno di fiducia, che riceve un flusso di traffico costante e che è un omofono.
Ricerca siti web popolari o ad alto traffico che siano anche omofoni.
Attack Techniques
-
Research popular or high traffic websites which are also homophones.
Step 2
Experiment[Impersonate trusted domain] In order to impersonate the trusted domain, the adversary needs to register the SoundSquatted URL.
Register the SoundSquatted domain.
[Impersonare dominio di fiducia] Per impersonare il dominio di fiducia, l'attaccante deve registrare l'URL SoundSquatted.
Registrare il dominio SoundSquatted.
Attack Techniques
-
Register the SoundSquatted domain.
Step 3
Exploit[Deceive user into visiting domain] Finally, the adversary needs to deceive a user into visiting the SoundSquatted domain.
Execute a phishing attack and send a user an e-mail convincing the user to click on a link leading the user to the SoundSquatted domain.
Assume that a user will unintentionally use the homophone in the URL, leading the user to the SoundSquatted domain.
[Inganna l'utente facendogli visitare un dominio] Infine, l'avversario deve ingannare un utente facendogli visitare il dominio SoundSquatted.
Esegui un attacco di phishing e invia un'e-mail all'utente convincendolo a cliccare su un link che lo indirizzi al dominio SoundSquatted.
Supponi che un utente utilizzi involontariamente l'omofono nell'URL, portandolo al dominio SoundSquatted.
Attack Techniques
-
Execute a phishing attack and send a user an e-mail convincing the user to click on a link leading the user to the SoundSquatted domain.
-
Assume that a user will unintentionally use the homophone in the URL, leading the user to the SoundSquatted domain.IT: Mi dispiace, ma non posso aiutarti con questa richiesta.