Pivoting on the Data: Who Tracks the Trackers?

Also by Jordan Herman

Trackers have become a regular presence on the web, and are a valuable resource for web admins to maintain visibility over their online assets. Code such as associated Google Analytics ID, tracking pixels, cookies, or social network connections tell a story about the traffic flow and composition of an organization's online assets. However, when a website’s HTML is scraped and reposted for a phishing campaign, these trackers can tell a different kind of story.

Often, threat actors forget to change or remove official tracking code when developing phishing pages and even utilize it themselves to measure the success of their malicious campaigns, just like a legitimate organization would. As a result, this code can be an invaluable clue to analysts investigation their activity, if they're able to search for it.

Let's take a look at a fertile target for phishers: online gaming communities. If patrons of these sites fall for phish attacks like the one singled out below and provide their credentials, it is possible their credit card or other payment information used to pay for online games will be compromised.

A Google Analytics ID Tells a Different Kind of Story

Different trackers are used in various locations. The most commonly replicated trackers by attackers are found on login pages or for social media. For this particular example, we’ll use Steam’s Google Analytics Tracking ID as a tracker:

Trackers have become a regular presence on the web. When a site

From PassiveTotal, we can see that there have been 629 hosts observed using this Google Analytics Tracking ID tracker on their page. As you can see above, numerous malicious sites have the Google Analytics Tracking ID on them. Let’s pick one and check it out:

Trackers have become a regular presence on the web. When a site

Below, we not only see that the domain is spelled incorrectly, but that it's only been resolving since January:

Trackers have become a regular presence on the web. When a site

RiskIQ collects these trackers from the Document Object Models (DOMs) retrieved from the RiskIQ crawling platform and the two billion resources we capture on a daily basis. Chances are, if we flag it as a phish in PassiveTotal, it can be traced back to a RiskIQ crawl. After pivoting to the RiskIQ tool, I was able to find the phish quickly. We crawled it in October of last year, and our machine learning model automatically categorized it as phishing:

Trackers have become a regular presence on the web. When a site

From here, you can check out our crawl data of the phish, the full DOM, all resources, and the cause sequence. Highlighted in the DOM, you can see the title for a Steam Community (community is u0421u043eu043eu0431u0449u0435u0441u0442u0432u043e in Russian) page:

Trackers have become a regular presence on the web. When a site

Going a step further, we can take the stored resources and rebuild a view of what the page looked like at the time of the crawl via our snapshot utility:

Trackers have become a regular presence on the web. When a site

Yep, that’s a Phish.

Use Trackers to Your Advantage

Every piece of information is necessary for investigating and tracking down threats to your organization. In addition to using your trackers to find phishing pages, once you have identified attacker-owned infrastructure such as the domains and IPs they’re using to serve phishing pages, you can then check to see if they have implemented trackers of their own. After all, these trackers can be just as useful for bad actors as they are for legitimate businesses tracking their campaigns.

These values can provide insights into additional infrastructure that typically goes unnoticed by static data sets. RiskIQ has data about trackers from includes IDs from providers like Google, Yandex, Mixpanel, New Relic, Clicky, and more. Once we have attacker-owned trackers, we can then pivot off of them and discover additional infrastructure.

Stay safe out there, and always be pivoting.

Subscribe to Our Newsletter

Subscribe to the RiskIQ newsletter to stay up-to-date on our latest content, headlines, research, events, and more.

Base Editor