social.tchncs.de is one of the many independent Mastodon servers you can use to participate in the fediverse.
A friendly server from Germany – which tends to attract techy people, but welcomes everybody. This is one of the oldest Mastodon instances.

Administered by:

Server stats:

3.9K
active users

#dns

46 posts42 participants2 posts today

While everyone is enjoying Carnival in Brazil, threat actors are still out there trying to lure people into their traps. We have found a cluster of lookalikes to the Brazilian DMV office (DETRAN in Portuguese). We observed at least two instances where they were impersonating the DMV office for the Brazilian states of Paraná and Maranhão.

The actor(s) create domains with the same label, but on several different TLDs (mostly highly abused). Here are some examples of what they look like.

consultes-seu-debitos2025.<space|site|shop|cloud>
debitos-sp-2025.<club|com|lat|net|online|store|xyz>
de3trasn2025.<click|fun|life|online|xyz>
departamentodetran2025.<click|icu|lat>
detran2025.<click|icu|lat|sbs>
l1cenciamento-detran2025.<click|icu|lat|sbs>

#lookalikes #dns #threatintel #cybercrime #threatintelligence #cybersecurity #infoblox #infobloxthreatintel

urlscan.io/result/802374b7-6c8
urlscan.io/result/721b12bb-d5f

urlscan.iodetranma.vercel.app - urlscan.iourlscan.io - Website scanner for suspicious and malicious URLs

Telegram users BOLO for suspicious links posing as terms of service violation notices!

We've observed over 4,000 domains in the past week attempting to trick users into granting web access to their accounts.

How it works:
- Presents itself in either Chinese, English, Japanese, Korean, Spanish, Vietnamese, German, Dutch or Thai depending on your browser language
- Prompts you to enter your phone number and triggers sending a legit login code to your phone using a modified version of the Telegram WebK
- Entering the login code allows the threat actor to authenticate to your account under the guise of a 'Telegram Security Check'
- These domains are propagated within Telegram itself, with victims unwittingly sending links to their contacts.

Domain indicators:
- Uses niche-oriented and commonly abused TLDs like '.auction', '.beer' and '.boutique' instead of traditional TLDs*
- Domains are registered through Dynadot or West[.]cn and protected by Cloudflare
- Mix of random RDGA-like domains, along with homoglyph and jumbled versions of 'Telegram'

Examples:
- `telegrom[.]tax`
- `telegreet[.]bar`
- `qwvlftokhc[.]club`

The motive remains unclear but likely involves collecting sensitive data for later exploitation.

* Big thanks to XYZ.COM LLC for their prompt response to our takedown request, some 4k domains using TLDs under their control have been suspended.



#scam #telegram #dns #threatintel #cybercrime #cybersecurity #infosec #infoblox #infobloxthreatintel

Replied in thread

@LukaszHorodecki @linux_pl Tak jak @rozie i @centopus piszą, lepiej chyba po prostu postawić sobie #pihole lub skonfigurować sobie innego #dns serwera co by podawał 127.0.0.1 dla znanych szkodliwych domen.
Co w sumie nie oznacza że nie warto mieć wtedy #ublock a, ja osobiście na ruterze z #openwrt dałem jedną z list domen do blokowania i jednocześnie używam ublocka (głównie od wyłączenia #javascript i plików medialnych co ważą dużo) i jestem szczęśliwy.

A large-scale operation of fake online stores is running wild, bulk-registered through Alibaba Cloud and shielded by Cloudflare. These aren’t just random scams—they’re coordinated, automated, and built on WordPress with WooCommerce, making them look and feel like legitimate shops.

Stores like micorders[.]com and familydailyitems[.]com don’t work alone. They rely on a shady payment redirection chain, bouncing transactions through sketchy processors like adelaytoung[.]com and oscarkitto[.]com before vanishing with your cash.

The core of this operation is a network of fraudulent store domains, the real indicators of compromise:
pexer[.]store, pinor[.]store, rilon[.]store, falix[.]store, toxil[.]store, uvixy[.]store, sytox[.]store, kyxon[.]store, zizzy[.]store

These sites use off-the-shelf e-commerce tools to appear trustworthy, but behind the scenes, they’re engineered for fraud. If a deal looks too good to be true… it probably is.



#dns #cybercrime #cybersecurity #fraud #scam #infoblox #threatintel #infosec #InfobloxThreatIntel

I don't usually post about work-related stuff, but here's something...

The state of DNSSEC on the wider Internet is sad, to say the least. Most large services don't sign their domains and most OSes can't do validation —
"systemd-resolved" can, but not by default.

It looks better regarding encryption at the OS level but, again, not by default.

Combining these two, not even 0.5% of queries are fully protected from tampering.

blog.cloudflare.com/new-dns-se 📜
radar.cloudflare.com/dns 📈

Cloudflare publie des statistiques #DNS très intéressantes, récoltées par son résolveur public 1.1.1.1. On peut notamment les afficher par pays (j'ai testé la France).

radar.cloudflare.com/dns/

Par exemple, on peut voir (pourcentage des requêtes via DoT ou DoH, pourcentage des réponses validées par DNSSEC) que personne n'en a rien à foutre de la sécurité (tant qu'il ne s'agit pas de cocher des cases pour une certification).