Malvertising – which has remained steady and is currently the main driving force behind some of the most common malware and scam distribution operations- not only stems from various publishers but also from ‘abandoned’ websites. Those related domains once served a legitimate purpose but were never renewed by their owners and fell into the hands of actors looking to make a quick profit using questionable practices.
In this post, we take a look at how malicious redirections from expired domains work and what kind of traffic they lead to.
The life, death, and resurrection of a domain name
Most issues when it comes to web security don’t usually come from the platforms themselves but from the people that run them or from properties that have simply been relinquished. The folks over at Sucuri have written about this extensively and in a
recent post, they showed how expired domains and outdated plugins in popular CMS were a deadly mix, resulting in malicious redirects.
Here is an example of a website,
oezelotel[.]com first registered to
denizduezguen@yahoo.de on 03/10/2014, that once was advertising various hotels, was wiped in 2016, and eventually got parked as its domain name registration was never renewed.