{"id":3642,"date":"2022-11-29T07:09:04","date_gmt":"2022-11-29T07:09:04","guid":{"rendered":"https:\/\/shreshtait.com\/blog\/?p=3642"},"modified":"2024-02-24T18:47:34","modified_gmt":"2024-02-24T13:17:34","slug":"lk-domain-name","status":"publish","type":"post","link":"https:\/\/shreshtait.com\/blog\/2022\/11\/lk-domain-name\/","title":{"rendered":"LK domain name abused by threat actors"},"content":{"rendered":"\n<p>Before we deep dive into how attackers target .lk domains using domain shadowing attack, first, a primer on registration of a domain name under .lk namespace. <\/p>\n\n\n\n<p>tl;dr registration of a domain name under .lk namespace is regulated<\/p>\n\n\n\n<p>The <a href=\"https:\/\/domains.lk\/index.php\/policies-conditions\/domain-registration-policy\" target=\"_blank\" rel=\"noreferrer noopener\">domain registration policy<\/a> says the LK registry may ask for documents supporting the request for a domain name registration. Depending on the category the domain registration would fall under, the list of documents would vary,<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"494\" src=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2022\/11\/Screenshot-2022-11-29-at-10.15.11-AM-1024x494.png\" alt=\"LK domain registration supporting documents list\" class=\"wp-image-3643\" title=\"LK domain registration supporting documents list\" srcset=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2022\/11\/Screenshot-2022-11-29-at-10.15.11-AM-1024x494.png 1024w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2022\/11\/Screenshot-2022-11-29-at-10.15.11-AM-300x145.png 300w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2022\/11\/Screenshot-2022-11-29-at-10.15.11-AM-768x370.png 768w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2022\/11\/Screenshot-2022-11-29-at-10.15.11-AM-1536x740.png 1536w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2022\/11\/Screenshot-2022-11-29-at-10.15.11-AM.png 1618w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center has-small-font-size\">Figure 1: Screenshot of LK domain registration supporting documents list<\/p>\n\n\n\n<p>The regulation makes it extremely hard for attackers to register a domain name for malicious purposes. Without the supporting documentation, the LK registry will not add the domain name in the .lk ccTLD.<\/p>\n\n\n\n<p>That does not stop the attackers from abusing domain names under .lk. Attackers use <a href=\"https:\/\/shreshtait.com\/blog\/2022\/09\/phishing-website-android-app-targeting-hdfc-bank-customers\/\" target=\"_blank\" rel=\"noreferrer noopener\">innovative<\/a> <a href=\"https:\/\/shreshtait.com\/blog\/2022\/09\/phishing-campaign-adidas-nike\/\" target=\"_blank\" rel=\"noreferrer noopener\">methods<\/a> to target users. <\/p>\n\n\n\n<p><a href=\"https:\/\/shreshtait.com\/blog\">Shreshta threat intelligence<\/a> has uncovered attackers targeting .lk domains using domain shadowing attack. <\/p>\n\n\n\n<p>For a detailed insight into domain shadowing, see our <a href=\"https:\/\/shreshtait.com\/blog\/2024\/02\/domain-shadowing\/\" target=\"_blank\" rel=\"noreferrer noopener\">blog post<\/a><\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"569\" src=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2022\/11\/Screenshot-2022-11-29-at-11.36.56-AM-1024x569.png\" alt=\"Domain shadowing attack of a .lk domain name\" class=\"wp-image-3646\" style=\"width:1024px;height:569px\" title=\"AOL phishing page opendir\" srcset=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2022\/11\/Screenshot-2022-11-29-at-11.36.56-AM-1024x569.png 1024w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2022\/11\/Screenshot-2022-11-29-at-11.36.56-AM-300x167.png 300w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2022\/11\/Screenshot-2022-11-29-at-11.36.56-AM-768x427.png 768w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2022\/11\/Screenshot-2022-11-29-at-11.36.56-AM-1536x853.png 1536w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2022\/11\/Screenshot-2022-11-29-at-11.36.56-AM-2048x1138.png 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center has-small-font-size\">Figure 2: Screenshot of a opendir page accessible via a subdomain<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"568\" src=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2022\/11\/Screenshot-2022-11-29-at-11.35.17-AM-1024x568.png\" alt=\"Domain shadowing attack of a .lk domain name phishing AOL\" class=\"wp-image-3647\" title=\"AOL phishing page\" srcset=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2022\/11\/Screenshot-2022-11-29-at-11.35.17-AM-1024x568.png 1024w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2022\/11\/Screenshot-2022-11-29-at-11.35.17-AM-300x167.png 300w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2022\/11\/Screenshot-2022-11-29-at-11.35.17-AM-768x426.png 768w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2022\/11\/Screenshot-2022-11-29-at-11.35.17-AM-1536x853.png 1536w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2022\/11\/Screenshot-2022-11-29-at-11.35.17-AM-2048x1137.png 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center has-small-font-size\">Figure 3: Screenshot of AOL phishing page under a benign domain name<\/p>\n\n\n\n<p><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"565\" src=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2022\/11\/Screenshot-2022-11-29-at-11.35.32-AM-1024x565.png\" alt=\"Phishing page of www.bethpagefcu.com\" class=\"wp-image-3648\" title=\"Phishing page of www.bethpagefcu.com\" srcset=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2022\/11\/Screenshot-2022-11-29-at-11.35.32-AM-1024x565.png 1024w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2022\/11\/Screenshot-2022-11-29-at-11.35.32-AM-300x166.png 300w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2022\/11\/Screenshot-2022-11-29-at-11.35.32-AM-768x424.png 768w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2022\/11\/Screenshot-2022-11-29-at-11.35.32-AM-1536x848.png 1536w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2022\/11\/Screenshot-2022-11-29-at-11.35.32-AM-2048x1130.png 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center has-small-font-size\">Figure 4: Screenshot of www.bethpagefcu.com phishing page under a benign domain name<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"567\" src=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2022\/11\/Screenshot-2022-11-29-at-11.35.41-AM-1024x567.png\" alt=\"Phishing page of www.maerkische-stanz-partner.de\" class=\"wp-image-3649\" title=\"Phishing page of www.maerkische-stanz-partner.de\" srcset=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2022\/11\/Screenshot-2022-11-29-at-11.35.41-AM-1024x567.png 1024w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2022\/11\/Screenshot-2022-11-29-at-11.35.41-AM-300x166.png 300w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2022\/11\/Screenshot-2022-11-29-at-11.35.41-AM-768x425.png 768w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2022\/11\/Screenshot-2022-11-29-at-11.35.41-AM-1536x850.png 1536w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2022\/11\/Screenshot-2022-11-29-at-11.35.41-AM-2048x1134.png 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center has-small-font-size\">Figure 5: Screenshot of www.maerkische-stanz-partner.de phishing page under a benign domain name<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"570\" src=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2022\/11\/Screenshot-2022-11-29-at-11.35.50-AM-1024x570.png\" alt=\"Phishing page of www.moncheflafee.fr\" class=\"wp-image-3650\" title=\"Phishing page of www.moncheflafee.fr\" srcset=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2022\/11\/Screenshot-2022-11-29-at-11.35.50-AM-1024x570.png 1024w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2022\/11\/Screenshot-2022-11-29-at-11.35.50-AM-300x167.png 300w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2022\/11\/Screenshot-2022-11-29-at-11.35.50-AM-768x427.png 768w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2022\/11\/Screenshot-2022-11-29-at-11.35.50-AM-1536x855.png 1536w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2022\/11\/Screenshot-2022-11-29-at-11.35.50-AM-2048x1139.png 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center has-small-font-size\">Figure 6: Screenshot of www.moncheflafee.fr phishing page under a benign domain name<\/p>\n\n\n\n<p class=\"has-medium-font-size\"><strong>Conclusion<\/strong><\/p>\n\n\n\n<p><strong>How is this happening?<\/strong><\/p>\n\n\n\n<p>Our hypothesis for the most likely scenario is that the attackers use brute force on the registrants&#8217; domain name control panel. Once successful, stealthy create subdomains under legitimate domain names, which point to the attackers&#8217; infrastructure.<\/p>\n\n\n\n<p>As a domain name registrant, here are a few things that you can do to stop a domain shadowing attack, <\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Enable 2FA in the domain name control panel which is provided by the registrar<\/li>\n\n\n\n<li>Password hygiene <\/li>\n\n\n\n<li>Periodically monitor the DNS zones &#8211; there are a few free and paid services which enable you to do this<\/li>\n<\/ul>\n\n\n\n<p>&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-get-free-access-to-newly-registered-domain-names-nrd-community-feeds\">Get free access to Newly registered domain names (NRD) community feeds<\/h2>\n\n\n\n<p><a href=\"https:\/\/shreshtait.com\/blog\/2024\/01\/what-are-newly-registered-domain-names\/\" target=\"_blank\" rel=\"noreferrer noopener\">Newly registered domain names<\/a> or recently registered domains can be a potential security risk for organisations. They are often used to host phishing, malware, and other malicious content.<\/p>\n\n\n\n<p>By monitoring or blocking NRDs, enterprises can eliminate the risk of cyber threats posed by NRDs.<\/p>\n\n\n\n<p>Get no-cost access to our newly registered domain names(NRD) community feeds.<\/p>\n\n\n\n<p><a href=\"https:\/\/shreshtait.com\/blog\/2024\/02\/recently-registered-domains-download\/\" target=\"_blank\" rel=\"noreferrer noopener\">Download the free NRD community feeds<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Before we deep dive into how attackers target .lk domains using domain shadowing attack, first, a primer on registration of a domain name under .lk namespace. tl;dr registration of a domain name under .lk namespace is regulated The domain registration policy says the LK registry may ask for documents supporting the request for a domain [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":4253,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[14],"tags":[59,61,58,56,48,46,55,57,60,47],"class_list":["post-3642","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-information-security","tag-lk","tag-aol","tag-attack","tag-domain","tag-phishing","tag-protective-dns","tag-sdinet","tag-shadowing","tag-sri-lanka","tag-threat-intelligence"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.0 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>DNS Security &amp; Threat Intelligence Blog | Shreshta<\/title>\n<meta name=\"description\" content=\"The LK domain registry regulates LK domain name registration, but despite this, threat actors abuse legitimate domain names under .LK\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/shreshtait.com\/blog\/2022\/11\/lk-domain-name\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"LK domain name abused by threat actors\" \/>\n<meta property=\"og:description\" content=\"The LK domain registry regulates LK domain name registration, but despite this, threat actors abuse legitimate domain names under .LK\" \/>\n<meta property=\"og:url\" content=\"https:\/\/shreshtait.com\/blog\/2022\/11\/lk-domain-name\/\" \/>\n<meta property=\"og:site_name\" content=\"DNS Security &amp; Threat Intelligence Blog | Shreshta\" \/>\n<meta property=\"article:published_time\" content=\"2022-11-29T07:09:04+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-02-24T13:17:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2022\/11\/DOMAIN-SHADOWING-ATTACK.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1344\" \/>\n\t<meta property=\"og:image:height\" content=\"896\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Swapneel Patnekar\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@shreshtait\" \/>\n<meta name=\"twitter:site\" content=\"@shreshtait\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Swapneel Patnekar\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/2022\\\/11\\\/lk-domain-name\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/2022\\\/11\\\/lk-domain-name\\\/\"},\"author\":{\"name\":\"Swapneel Patnekar\",\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/#\\\/schema\\\/person\\\/9193d733c00e1d16e59261d57c852484\"},\"headline\":\"LK domain name abused by threat actors\",\"datePublished\":\"2022-11-29T07:09:04+00:00\",\"dateModified\":\"2024-02-24T13:17:34+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/2022\\\/11\\\/lk-domain-name\\\/\"},\"wordCount\":397,\"publisher\":{\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/2022\\\/11\\\/lk-domain-name\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/DOMAIN-SHADOWING-ATTACK.png\",\"keywords\":[\".lk\",\"aol\",\"attack\",\"domain\",\"phishing\",\"protective dns\",\"SDINET\",\"shadowing.\",\"sri lanka\",\"threat intelligence\"],\"articleSection\":[\"Information Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/2022\\\/11\\\/lk-domain-name\\\/\",\"url\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/2022\\\/11\\\/lk-domain-name\\\/\",\"name\":\"\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/2022\\\/11\\\/lk-domain-name\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/2022\\\/11\\\/lk-domain-name\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/DOMAIN-SHADOWING-ATTACK.png\",\"datePublished\":\"2022-11-29T07:09:04+00:00\",\"dateModified\":\"2024-02-24T13:17:34+00:00\",\"description\":\"The LK domain registry regulates LK domain name registration, but despite this, threat actors abuse legitimate domain names under .LK\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/2022\\\/11\\\/lk-domain-name\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/shreshtait.com\\\/blog\\\/2022\\\/11\\\/lk-domain-name\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/2022\\\/11\\\/lk-domain-name\\\/#primaryimage\",\"url\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/DOMAIN-SHADOWING-ATTACK.png\",\"contentUrl\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/DOMAIN-SHADOWING-ATTACK.png\",\"width\":1344,\"height\":896,\"caption\":\"Domain shadowing attack\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/2022\\\/11\\\/lk-domain-name\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"LK domain name abused by threat actors\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/\",\"name\":\"DNS Security &amp; Threat Intelligence Blog | Shreshta\",\"description\":\"DNS Security &amp; Threat Intelligence\",\"publisher\":{\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/#organization\",\"name\":\"Shreshta IT Technologies Pvt. Ltd.\",\"alternateName\":\"Shreshta\",\"url\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/Shreshta.svg\",\"contentUrl\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/Shreshta.svg\",\"width\":330,\"height\":76,\"caption\":\"Shreshta IT Technologies Pvt. Ltd.\"},\"image\":{\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/shreshtait\",\"https:\\\/\\\/infosec.exchange\\\/@shreshta\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/shreshta\\\/\"],\"description\":\"DNS security and threat intelligence company providing real-time threat protection for organizations worldwide. Our solutions include DNS Shield (Protective DNS), DNS Watchtower (Passive DNS), and comprehensive threat intelligence feeds. Trusted by enterprises to detect, prevent, and investigate cyber threats at the DNS layer.\",\"email\":\"sales@shreshtait.com\",\"legalName\":\"Shreshta IT Technologies Pvt. Ltd.\",\"foundingDate\":\"2014-01-22\",\"numberOfEmployees\":{\"@type\":\"QuantitativeValue\",\"minValue\":\"11\",\"maxValue\":\"50\"},\"publishingPrinciples\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/blog\\\/\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/#\\\/schema\\\/person\\\/9193d733c00e1d16e59261d57c852484\",\"name\":\"Swapneel Patnekar\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b8a02ca124e85d2be9710cbbca4d5e3abdaeac895af98732bc4b2bd953879e78?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b8a02ca124e85d2be9710cbbca4d5e3abdaeac895af98732bc4b2bd953879e78?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b8a02ca124e85d2be9710cbbca4d5e3abdaeac895af98732bc4b2bd953879e78?s=96&d=mm&r=g\",\"caption\":\"Swapneel Patnekar\"},\"sameAs\":[\"https:\\\/\\\/shreshtait.com\\\/blog\"],\"url\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/author\\\/pswapneel\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"DNS Security &amp; Threat Intelligence Blog | Shreshta","description":"The LK domain registry regulates LK domain name registration, but despite this, threat actors abuse legitimate domain names under .LK","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/shreshtait.com\/blog\/2022\/11\/lk-domain-name\/","og_locale":"en_US","og_type":"article","og_title":"LK domain name abused by threat actors","og_description":"The LK domain registry regulates LK domain name registration, but despite this, threat actors abuse legitimate domain names under .LK","og_url":"https:\/\/shreshtait.com\/blog\/2022\/11\/lk-domain-name\/","og_site_name":"DNS Security &amp; Threat Intelligence Blog | Shreshta","article_published_time":"2022-11-29T07:09:04+00:00","article_modified_time":"2024-02-24T13:17:34+00:00","og_image":[{"width":1344,"height":896,"url":"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2022\/11\/DOMAIN-SHADOWING-ATTACK.png","type":"image\/png"}],"author":"Swapneel Patnekar","twitter_card":"summary_large_image","twitter_creator":"@shreshtait","twitter_site":"@shreshtait","twitter_misc":{"Written by":"Swapneel Patnekar","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/shreshtait.com\/blog\/2022\/11\/lk-domain-name\/#article","isPartOf":{"@id":"https:\/\/shreshtait.com\/blog\/2022\/11\/lk-domain-name\/"},"author":{"name":"Swapneel Patnekar","@id":"https:\/\/shreshtait.com\/blog\/#\/schema\/person\/9193d733c00e1d16e59261d57c852484"},"headline":"LK domain name abused by threat actors","datePublished":"2022-11-29T07:09:04+00:00","dateModified":"2024-02-24T13:17:34+00:00","mainEntityOfPage":{"@id":"https:\/\/shreshtait.com\/blog\/2022\/11\/lk-domain-name\/"},"wordCount":397,"publisher":{"@id":"https:\/\/shreshtait.com\/blog\/#organization"},"image":{"@id":"https:\/\/shreshtait.com\/blog\/2022\/11\/lk-domain-name\/#primaryimage"},"thumbnailUrl":"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2022\/11\/DOMAIN-SHADOWING-ATTACK.png","keywords":[".lk","aol","attack","domain","phishing","protective dns","SDINET","shadowing.","sri lanka","threat intelligence"],"articleSection":["Information Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/shreshtait.com\/blog\/2022\/11\/lk-domain-name\/","url":"https:\/\/shreshtait.com\/blog\/2022\/11\/lk-domain-name\/","name":"","isPartOf":{"@id":"https:\/\/shreshtait.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/shreshtait.com\/blog\/2022\/11\/lk-domain-name\/#primaryimage"},"image":{"@id":"https:\/\/shreshtait.com\/blog\/2022\/11\/lk-domain-name\/#primaryimage"},"thumbnailUrl":"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2022\/11\/DOMAIN-SHADOWING-ATTACK.png","datePublished":"2022-11-29T07:09:04+00:00","dateModified":"2024-02-24T13:17:34+00:00","description":"The LK domain registry regulates LK domain name registration, but despite this, threat actors abuse legitimate domain names under .LK","breadcrumb":{"@id":"https:\/\/shreshtait.com\/blog\/2022\/11\/lk-domain-name\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/shreshtait.com\/blog\/2022\/11\/lk-domain-name\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/shreshtait.com\/blog\/2022\/11\/lk-domain-name\/#primaryimage","url":"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2022\/11\/DOMAIN-SHADOWING-ATTACK.png","contentUrl":"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2022\/11\/DOMAIN-SHADOWING-ATTACK.png","width":1344,"height":896,"caption":"Domain shadowing attack"},{"@type":"BreadcrumbList","@id":"https:\/\/shreshtait.com\/blog\/2022\/11\/lk-domain-name\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/shreshtait.com\/blog\/"},{"@type":"ListItem","position":2,"name":"LK domain name abused by threat actors"}]},{"@type":"WebSite","@id":"https:\/\/shreshtait.com\/blog\/#website","url":"https:\/\/shreshtait.com\/blog\/","name":"DNS Security &amp; Threat Intelligence Blog | Shreshta","description":"DNS Security &amp; Threat Intelligence","publisher":{"@id":"https:\/\/shreshtait.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/shreshtait.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/shreshtait.com\/blog\/#organization","name":"Shreshta IT Technologies Pvt. Ltd.","alternateName":"Shreshta","url":"https:\/\/shreshtait.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/shreshtait.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2023\/03\/Shreshta.svg","contentUrl":"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2023\/03\/Shreshta.svg","width":330,"height":76,"caption":"Shreshta IT Technologies Pvt. Ltd."},"image":{"@id":"https:\/\/shreshtait.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/shreshtait","https:\/\/infosec.exchange\/@shreshta","https:\/\/www.linkedin.com\/company\/shreshta\/"],"description":"DNS security and threat intelligence company providing real-time threat protection for organizations worldwide. Our solutions include DNS Shield (Protective DNS), DNS Watchtower (Passive DNS), and comprehensive threat intelligence feeds. Trusted by enterprises to detect, prevent, and investigate cyber threats at the DNS layer.","email":"sales@shreshtait.com","legalName":"Shreshta IT Technologies Pvt. Ltd.","foundingDate":"2014-01-22","numberOfEmployees":{"@type":"QuantitativeValue","minValue":"11","maxValue":"50"},"publishingPrinciples":"https:\/\/shreshtait.com\/blog\/blog\/"},{"@type":"Person","@id":"https:\/\/shreshtait.com\/blog\/#\/schema\/person\/9193d733c00e1d16e59261d57c852484","name":"Swapneel Patnekar","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/b8a02ca124e85d2be9710cbbca4d5e3abdaeac895af98732bc4b2bd953879e78?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/b8a02ca124e85d2be9710cbbca4d5e3abdaeac895af98732bc4b2bd953879e78?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b8a02ca124e85d2be9710cbbca4d5e3abdaeac895af98732bc4b2bd953879e78?s=96&d=mm&r=g","caption":"Swapneel Patnekar"},"sameAs":["https:\/\/shreshtait.com\/blog"],"url":"https:\/\/shreshtait.com\/blog\/author\/pswapneel\/"}]}},"_links":{"self":[{"href":"https:\/\/shreshtait.com\/blog\/wp-json\/wp\/v2\/posts\/3642","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/shreshtait.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/shreshtait.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/shreshtait.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/shreshtait.com\/blog\/wp-json\/wp\/v2\/comments?post=3642"}],"version-history":[{"count":45,"href":"https:\/\/shreshtait.com\/blog\/wp-json\/wp\/v2\/posts\/3642\/revisions"}],"predecessor-version":[{"id":6485,"href":"https:\/\/shreshtait.com\/blog\/wp-json\/wp\/v2\/posts\/3642\/revisions\/6485"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/shreshtait.com\/blog\/wp-json\/wp\/v2\/media\/4253"}],"wp:attachment":[{"href":"https:\/\/shreshtait.com\/blog\/wp-json\/wp\/v2\/media?parent=3642"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/shreshtait.com\/blog\/wp-json\/wp\/v2\/categories?post=3642"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/shreshtait.com\/blog\/wp-json\/wp\/v2\/tags?post=3642"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}