Something's Phishy: See the Hook Before the Bait
This talk demonstrates how to use passive DNS and domain intelligence to identify and track malicious infrastructure before it is used in active phishing campaigns. It focuses on analyzing domain registration patterns, name server associations, and registrar data to uncover threat actor infrastructure. The speaker highlights how these techniques allow security teams to move from a reactive to a proactive stance by identifying potential threats early. The presentation includes a demonstration of using passive DNS data to map out related malicious domains and improve threat detection.
Mapping Phishing Infrastructure Before the First Email Hits
TLDR: Most phishing campaigns rely on predictable infrastructure patterns that can be identified using passive DNS data before the attack even launches. By pivoting from known malicious domains to their associated name servers and registrars, researchers can uncover entire clusters of future attack infrastructure. This proactive approach allows security teams to block threats at the source rather than reacting to individual malicious emails.
Security professionals often treat phishing as a reactive game. We wait for an alert, analyze the headers, extract the URL, and then block the domain. By that point, the damage is already done. The user has clicked, the credentials have been harvested, and the attacker is likely already moving laterally through the environment. The real opportunity lies in shifting our focus from the symptoms of an attack to the infrastructure that makes it possible.
The Anatomy of a Phishing Campaign
Attackers are creatures of habit. When they spin up a new phishing campaign, they rarely build their infrastructure from scratch for every single target. They follow a cycle: they prepare by registering domains, operationalize by configuring servers, use the infrastructure for the attack, and eventually discard it once it gets burned.
The critical insight here is that this infrastructure is often linked. If you find one domain used in a phishing campaign, you have found a thread. Pulling that thread—by looking at the name servers, the registrar, or the IP space—often reveals a cluster of other domains that are either currently active or waiting to be used. This is where passive DNS becomes a force multiplier. Unlike active DNS, which only tells you what a domain resolves to right now, passive DNS provides a historical record of DNS resolutions. This allows you to see the infrastructure's evolution over time.
Pivoting Through Infrastructure
When you encounter a phishing domain, don't just block it. Use it as a pivot point. If you are using a tool like SpiderFoot, you can automate the collection of these relationships. A typical pivot flow looks like this:
- Identify the domain: Start with the malicious domain found in a phishing email.
- Pivot to Name Servers: Check the name servers associated with that domain. If an attacker is using a specific, non-standard name server for their phishing domains, every other domain using that same name server is a high-probability target for investigation.
- Pivot to Registrars: Look at the registrar data. While major registrars are used by everyone, specific patterns in registration—such as the use of free-tier TLDs or specific registration dates—can help narrow down the scope.
- Analyze IP Space: Check the IP addresses the domains resolve to. Attackers often host multiple phishing sites on the same virtual private server.
For example, if you are investigating a domain like support-login-portal.com, you might find it resolves to an IP address that also hosts crypto-wallet-verify.com and bank-account-update.net. By identifying these connections, you can block the entire cluster before the attacker even sends the first email to your users.
Operationalizing Intelligence in the SOC
Integrating this data into your workflow is the difference between a manual, time-consuming investigation and an automated, proactive defense. If you are running a SIEM like Splunk or an orchestration platform like Cortex XSOAR, you should be automating these lookups.
When an alert triggers, your platform should automatically query your passive DNS provider for the domain's history and its associated infrastructure. If the domain is young—say, less than 48 hours old—and shares a name server with other known malicious domains, the risk score should be automatically escalated. This allows your analysts to focus on the threats that matter, rather than chasing down every single phishing report that hits the queue.
The Defensive Reality
Defenders must accept that blocking domains is a losing battle if you are only blocking what you see. The goal is to identify the "low-hanging fruit" of the attacker's infrastructure. When a new TLD is introduced, or when you see a sudden spike in domain registrations from a specific registrar, that is a signal.
You do not need to wait for a user to report a phishing email to know that an attacker is active. By monitoring for these patterns, you can identify the "hook" before the "bait" is ever cast. This requires a shift in mindset: stop looking at the phishing email as the start of the incident. The incident started when the attacker registered the domain. If you can find that registration, you can stop the attack before it reaches your users.
The next time you are investigating a phishing incident, take a moment to look at the infrastructure behind it. Pivot to the name servers. Check the registrar. You will likely find that the attacker is not as careful as they think they are. Use that to your advantage.
Vulnerability Classes
Tools Used
Target Technologies
OWASP Categories
All Tags
Up Next From This Conference
Similar Talks

Inside the FBI's Secret Encrypted Phone Company 'Anom'

Kill List: Hacking an Assassination Site on the Dark Web




