Threat Intelligence Through NRD's ( New Registered Domain )
Threat actors are using compromised domains or registering new ones to set up Command and Control (C2) servers, allowing them to interact with victims or compromised networks. So what should we do just watch and do nothing? Absolutely not. We can actively monitor newly registered domains (NRDs) using a threat intelligence platform to detect potential malicious activity. This can include identifying if a domain is hosting malicious files, such as weaponized documents or PowerShell scripts acting as downloaders. Who knows what might be hidden behind that web server? That's why proactive monitoring is essential.
In addition, we can even create an automated Python script and integrate it with VirusTotal to check whether newly registered domains are malicious or not. This operation not only simplifies our daily tasks but also provides a proactive layer of defense for our network . or your organization's network.
You can see the screenshot below as an example . where I obtained newly registered domains from one of the GitHub feeds and uploaded them into an automated script I created (with help from ChatGPT, of course!). Ask ChatGPT
Comments
Post a Comment