oo12 / SMBBB

SMB Baddies Blocklist: a DNS blocklist of all the phishing and malware links one small company gets

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

SMBBB

SMB Baddies Blocklist: a DNS blocklist of all the phishing and malware links one small company gets

Direct link: https://raw.githubusercontent.com/oo12/SMBBB/master/blocklist.txt

We get so many phishing and malware links at work. Mostly targeting Microsoft 365. I‘ve developed an extensive set of rules to (mostly) intercept them before they’re delivered, but still. Partly to relieve my personal frustration with this and partly in the hope that it’ll be useful to some other exasperated IT person, I’m posting the list here. At present I’m updating it daily. Feed it into your filtering DNS and flush these turds before your users click. (Though honestly, your first priority should be quarantining pesky emails before they reach your users, using mail flow rules in Exchange or whatever. DNS filtering is helpful, but you’re always a step behind.)

I use this list with Pi-hole, which is totally solid for enterprise use by the way. At least running on a proper VM and for around 100 users, nary a problem.

Block or Unblock

All of these domains were taken from actual phishing emails, by me personally. False positives should be pretty low. However, phishers like to use legitimate sites for part of the process, especially if there’s a free account available. I block or don’t block stuff based on what’s appropriate for our workplace. Is it more likely that somebody will actually need this domain, or that it‘ll be phishing?

Take a look through the rest of this document and decide what’s right for you.

You might want to allow these

if you actually use them. They’re legitimate sites, just get abused like everything else.

  • firebasestorage.googleapis.com — Google cloud storage. Used frequently for hosting phishing sites and for us, blocking it has had little negative effect.
  • rebrand.ly — Another URL shortner.
  • cutt.ly — same
  • www.notion.so — Popular for what I call phishing lures. You know, a PDF or whatnot that says “You received secure file! Click to view” with a big button that takes you on to the actual phishing site.
  • www.canva.com — Same. Unlike most of the other similar sites here, there’s no way to send an abuse report.
  • view.genial.ly — same
  • view.joomag.com and joom.ag — same

Consider blocking

  • 1drv.ms — Short link for OneDrive files. Don’t know about you, but around here they’re more likely nothin’ good.
  • onedrive.live.com — Same. Though it’s probably better to quarantine all incoming emails with these links, then release the few that are legit.

These are more document design/sharing sites that can be abused for phishing. In contrast to the ones above, I’ve only seen them used once, and the folks at the site responded promptly to the abuse report, so for the moment they have a favorable value to risk ratio.

  • readymag.com
  • www.stackfield.com

Regular Expressions

Some things can only be blocked with regexes. Here are a few suggestions if you’re using something like Pi-hole which accepts them.

  • \.ga$, \.tk$, \.xyz$ — and really all the other TLDs your users are unlikely to legitimately need. Take a look at the blocklist for an idea of which ones we get. It’s sorted by domain so you can easily get an idea for frequency.
  • -my\.sharepoint\.com$ — You’ll definitely have to whitelist the ones your users actually need, but having this default blocked has saved us so many times. Whenever one Microsoft 365 user gets phished, they’ll put a lure on OneNote, then blast out the link to all of their contacts. These can be convincing looking since they come from somebody you know and usually have their correct signature and all.
  • \.000webhostapp\.com$ – free web hosting. Abused as badly as you’d expect.
  • \.carrd\.co$ — Online design site. Unlike Canva, they’re responsive to abuse reports.
  • \.dorik\.io$ — Free web site builder
  • \.glitch\.me$ — Programming project hosting. Also good about dealing with phishers.
  • \.only2clicks\.com$ — Some junk you don’t need.
  • \.oragondesignstudio\.com$ — Redirects to an “Outlook Web App” phishing page on the appspot.com domain below.
  • -dot-gl494903049\.wl\.r\.appspot\.com$ — Hosts phishing sites with unique subdomains. I wish Google—and Microsoft—were better about shutting this nonsense down.
  • \.et\.r\.appspot\.com$ — cloud hosting
  • \.web\.app$ — same
  • ^\w+\.azurewebsites\.net$ — same. This will block a few legitimate sites though.
  • \.3utilities\.com$ — This and the remainder of the list are free dynamic DNS services.
  • \.wze\.io$
  • \.gotdns\.ch$
  • \.duckdns\.org$
  • \.itsaol\.com$
  • \.x24hr\.com$
  • \.(app|page)\.link$
  • \.carpicsediting\.com$

One Offs

These came in for a bunch of users at once, with a unique subdomain for each email. A “one day and done” thing; haven't seen them again.

  • (\.|^)vitaliciasrl\.com$
  • \.salamapetrochemical\.com$

About

SMB Baddies Blocklist: a DNS blocklist of all the phishing and malware links one small company gets

License:GNU General Public License v3.0