Using RDAP for Cyberattack Investigations

Cyberattacks are increasingly sophisticated, and one of the critical steps in responding to them is identifying the domains involved in malicious activities. The Registration Data Access Protocol (RDAP) is a powerful tool for investigating suspicious domains and tracking down information related to phishing websites, malware distribution, or other cybercrime activities. RDAP allows security teams to retrieve detailed registration data, which can help identify the source and history of a domain, assisting in investigation and response efforts. This article will explore how to use RDAP to investigate suspicious domains and provide examples of analyzing phishing sites.

How to Find Information About a Suspicious Domain Using RDAP

RDAP provides essential details about domain registration that can be invaluable when investigating cyberattacks. By querying RDAP for information on a suspicious domain, investigators can obtain key data such as the domain's creation date, its registrar, contact information, and its status. This information can be used to track down the parties behind malicious activities, identify patterns, or confirm whether the domain has been involved in previous attacks.

Key Data Points in an RDAP Response

When you perform an RDAP query, the response will include a wealth of information about the domain in question. Key data points to look for when investigating a suspicious domain include:

To begin an investigation, you would query the RDAP server using the domain name. For example, querying rdap.verisign.com for a .com domain might look like:

GET https://rdap.verisign.com/com/v1/domain/suspiciousdomain.com

The response will contain a JSON object with details about the domain. Here is an example of a typical RDAP response:


{
  "objectClassName": "domain",
  "handle": "SUSPICIOUS-DOMAIN",
  "ldhName": "suspiciousdomain.com",
  "status": ["inactive"],
  "events": [
    {
      "eventAction": "registration",
      "eventDate": "2022-05-10T00:00:00Z"
    }
  ],
  "entities": [
    {
      "objectClassName": "entity",
      "handle": "REGISTRAR-XYZ",
      "roles": ["registrar"],
      "vcardArray": [
        "vcard",
        [
          ["fn", "Registrar XYZ"],
          ["email", "[email protected]"]
        ]
      ]
    }
  ]
}

In this example, the domain suspiciousdomain.com was registered on May 10, 2022, and it is currently inactive. The registrar is Registrar XYZ, and they have an abuse contact email, [email protected], which can be used to report any illegal activity associated with this domain.

Example of Analyzing Phishing Sites Using RDAP

Phishing websites are designed to steal sensitive information by impersonating legitimate sites. RDAP can be used to gather information about domains suspected of being used for phishing. By analyzing the registration data of a suspected phishing domain, investigators can uncover details about its creation, status, and ownership, which may help identify the perpetrators behind the attack.

Steps to Analyze a Phishing Domain

To analyze a phishing site using RDAP, follow these steps:

Here's an example of an RDAP query for a suspected phishing domain:

GET https://rdap.arin.net/registry/domain/phishingsite.com

The RDAP response might include the following key details:


{
  "objectClassName": "domain",
  "handle": "PHISHING-DOMAIN",
  "ldhName": "phishingsite.com",
  "status": ["active", "locked"],
  "events": [
    {
      "eventAction": "registration",
      "eventDate": "2022-06-15T00:00:00Z"
    }
  ],
  "entities": [
    {
      "objectClassName": "entity",
      "handle": "REGISTRAR-ABC",
      "roles": ["registrar"],
      "vcardArray": [
        "vcard",
        [
          ["fn", "Registrar ABC"],
          ["email", "[email protected]"]
        ]
      ]
    }
  ]
}

In this case, the domain phishingsite.com was registered on June 15, 2022, and is currently active but locked. The registrar is Registrar ABC, and their support contact is [email protected]. If you identify this site as part of a phishing campaign, you can report it to the registrar or take other action to block the site.

Identifying Indicators of Malicious Domains

There are several indicators to look for when investigating suspicious domains that may be involved in phishing or other cyberattacks. Some common red flags include:

Using RDAP for Cyberattack Response

RDAP is a valuable tool for investigators and security teams when responding to cyberattacks, particularly those involving phishing, malware distribution, and other online scams. By querying RDAP for suspicious domains, security teams can gather critical information about domain registration, registrar details, and owner contact information (if available). With this information, they can take appropriate action to mitigate the impact of the attack, report malicious domains to the appropriate authorities, and block further access to the harmful sites.