Skip to content

Playbook: Typosquatting / Domain Impersonation Response

ID: PB-49 Severity: High | Category: Resource Development / Initial Access MITRE ATT&CK: T1583.001 (Acquire Infrastructure: Domains), T1608.005 (Link Target) Trigger: Brand monitoring alert (lookalike domain registered), user report (suspicious email from similar domain), threat intel (phishing campaign using typosquat domain)

⚠️ WARNING: Typosquatting domains are used for phishing, credential harvesting, and supply chain attacks. Attackers register domains that look like yours — one character off — and target your customers, partners, and employees.

Typosquatting Attack Methods

graph TD
    TS["🌐 Typosquatting Types"] --> Typo["Character swap\nexampel.com"]
    TS --> Missing["Missing char\nexmple.com"]
    TS --> Double["Double letter\nexammple.com"]
    TS --> TLD["TLD variation\nexample.co"]
    TS --> Homo["Homograph\nexаmple.com\n(Cyrillic а)"]
    TS --> Combo["Combosquat\nexample-login.com"]

    Typo --> Use["Phishing\nCredential harvest\nMalware delivery"]
    Missing --> Use
    Double --> Use
    TLD --> Use
    Homo --> Use
    Combo --> Use

    style TS fill:#ff6600,color:#fff
    style Homo fill:#cc0000,color:#fff
    style Use fill:#660000,color:#fff

Attack Use Cases

graph TD
    Domain["Typosquat Domain"] --> Phish["📧 Phishing Emails\nFrom: admin@exampel.com"]
    Domain --> Web["🌐 Fake Website\nClone of real login page"]
    Domain --> BEC["💼 BEC Attack\ncfo@exampel.com → wire"]
    Domain --> Supply["📦 Supply Chain\nFake vendor emails"]
    Domain --> SEO["🔍 SEO Poisoning\nFake site in search results"]
    Domain --> Malware["💀 Malware\nDrive-by download"]
    style Domain fill:#ff6600,color:#fff
    style BEC fill:#cc0000,color:#fff
    style Malware fill:#660000,color:#fff

Decision Flow

graph TD
    Alert["🚨 Suspicious Domain Detected"] --> Source{"Detection source?"}
    Source -->|"Brand monitoring"| Brand["New domain registered\nsimilar to ours"]
    Source -->|"User report"| User["Email from similar\ndomain received"]
    Source -->|"Threat intel"| TI["Phishing campaign\nusing typosquat domain"]
    Brand --> Active{"Domain actively\nhosting content?"}
    Active -->|Yes| Hostile["🔴 Active threat\nTakedown required"]
    Active -->|"No — parked"| Monitor["Monitor + request\nproactive takedown"]
    User --> Block["Block domain\nCheck who received emails"]
    TI --> Block
    Hostile --> Takedown["Initiate domain takedown"]
    Block --> Scope["Scope: affected users?"]
    style Alert fill:#ff6600,color:#fff
    style Hostile fill:#cc0000,color:#fff

Investigation Workflow

sequenceDiagram
    participant Monitor as Brand Monitor
    participant SOC as SOC Analyst
    participant Legal as Legal Team
    participant IT as IT / DNS
    participant Registrar

    Monitor->>SOC: 🚨 Lookalike domain registered
    SOC->>SOC: Analyze domain (WHOIS, DNS, content)
    SOC->>SOC: Check — is it hosting phishing content?
    SOC->>IT: Block domain at DNS/proxy/email gateway
    SOC->>Legal: Request domain takedown
    Legal->>Registrar: Submit abuse report + UDRP
    Registrar->>Legal: Domain suspended
    SOC->>SOC: Sweep email logs for messages from domain

Domain Analysis Checklist

graph TD
    subgraph "Domain Intelligence"
        D1["WHOIS — registration date, registrant"]
        D2["DNS — A record, MX record, nameservers"]
        D3["Content — clone of real site?"]
        D4["SSL cert — who issued?"]
        D5["VirusTotal — reputation"]
        D6["URLScan — page screenshot"]
    end
    subgraph "Email Intelligence"
        E1["SPF/DKIM/DMARC — configured?"]
        E2["Email gateway — messages from this domain?"]
        E3["Users who received/clicked"]
    end
    style D3 fill:#cc0000,color:#fff
    style E1 fill:#ff6600,color:#fff

Takedown Process

graph TD
    Detect["Detect typosquat domain"] --> Evidence["Collect evidence\nScreenshots, WHOIS, content"]
    Evidence --> Block["Block internally\nDNS, proxy, email"]
    Block --> Report["Report to registrar\nAbuse complaint"]
    Report --> UDRP{"Need UDRP/legal?"}
    UDRP -->|"Yes — disputed"| Legal["File UDRP dispute\nor legal action"]
    UDRP -->|"No — clear abuse"| Suspend["Registrar suspends\nwithin 24-72h"]
    Legal --> Resolve["Domain transferred\nor deleted"]
    Suspend --> Resolve
    style Detect fill:#ff6600,color:#fff
    style Report fill:#ffcc00,color:#000

Response Timeline

gantt
    title Typosquatting Response Timeline
    dateFormat HH:mm
    axisFormat %H:%M
    section Detection
        Brand monitoring alert  :a1, 00:00, 5min
        Domain analysis         :a2, after a1, 30min
    section Containment
        Block at DNS/proxy      :a3, after a2, 15min
        Block at email gateway  :a4, after a3, 15min
    section Takedown
        Submit abuse report     :a5, after a4, 30min
        Registrar response      :a6, after a5, 1440min
    section Investigation
        Email log sweep         :a7, after a3, 60min

1. Immediate Actions (First 30 Minutes)

# Action Owner
1 Analyze domain (WHOIS, DNS, content, SSL) SOC T2
2 Block domain at DNS resolver and web proxy IT / SOC
3 Block domain at email gateway (inbound/outbound) IT
4 Check email logs for messages from/to the domain SOC
5 Screenshot all hosted content as evidence SOC
6 Submit abuse report to domain registrar Legal / SOC

2. Investigation Checklist

Domain Analysis

  • WHOIS: registration date, registrant info, registrar
  • DNS records: A, MX, NS, TXT (SPF/DKIM)
  • Content: is it a clone of our website?
  • SSL certificate: issuing CA, subject
  • VirusTotal: detection by security vendors
  • URLScan.io: page screenshot and analysis

Email Impact

  • Inbound emails from the typosquat domain
  • Users who received emails from the domain
  • Users who clicked links in emails from the domain
  • Outbound emails to the typosquat domain (data leak risk)

Broader Campaign

  • Are there other similar domains registered?
  • Is this part of a phishing campaign?
  • Are partners/customers being targeted?

3. Containment

Scope Action
DNS Sinkhole / block the domain
Proxy URL category block
Email Block inbound + outbound
Users Notify anyone who interacted
External Alert customers/partners

4. Post-Incident

Question Answer
How was the typosquat domain detected? [Brand monitoring/user report]
Was brand monitoring in place? [Yes/No]
Were DMARC reject policies configured? [Yes/No]
Was domain takedown successful? [Status + timeline]

6. Detection Rules (Sigma)

title: Email From Typosquat Domain
logsource:
    product: email_gateway
detection:
    selection:
        sender_domain|re: '(examp1e|exampel|exmple|exampl)\.(com|org|net)'
    condition: selection
    level: high

References