You are a freelancing human rights cyber security analyst. You have been contacted by a humanitarian aid group from Venezuela that claims they were attacked and need your help conducting the cyber investigation. You have been given some background information and a twitter post to begin your investigation.
Venezuela is currently in the throes of a major political crisis as opposition leader and self-declared interim President Juan Guaidó is attempting to oust the incumbent President, Nicolas Maduro, who had been re-elected for a second term in a very controversial election that many are refusing to recognize as legitimate.
Back in February, shortly after declaring himself as interim president, Guaidó called for citizens of Venezuela to volunteer in helping international organizations deliver humanitarian aid to the country because Maduro was refusing to accept aid and blocking desperately needed supplies, food, and medicine at their borders.
A website was set up where volunteers could register to help, which required them to provide personal information such as their name, phone number, address, and whether they have things like a medical degree or a car.
This website appeared online on February 6th. Only a few days later, on February 11th, the day after the public announcement of the initiative, another almost identical website appeared with a very similar domain name and structure.
Only people inside of Venezuela seemed to be affected by this attack.
Twitter posts started to show an identical fraudulent website. Below are the actual twitter posts.
Zoomed-in view of the fraudulent website URL:
Esa IP (http://126.96.36.199) corresponde a un droplet de DigitalOcean (ver imagen 1) mientras que la página oficial está en 188.8.131.52 que es en Amazon (ver imagen 2) pic.twitter.com/Dc37Uw0KCc
— Jesus Lara (@phenobarbital) February 13, 2019
Fake IP 159[.]65[.]65[.]194, Real IP 54[.]240[.]186[.]199
Here is an actual video that was posted to Twitter of the DNS poisoning attack in Venezuela.
First search: Perform a search for the domain www.voluntariosxvenezuela.com.
Second search: Perform a search for the domain www.voluntariosvenezuela.com.
Third search: Perform a search for the domain www.voluntariosxxvenezuela.com.
Fourth search: Perform a search for the IP address 159[.]65[.]65[.]194.
URL for urlscan.io: https://urlscan.io
Your goal is to investigate both websites from back in February 2019 and determine the following and provide your evidence:
- Is www[.]voluntariosvenezuela[.]com fraudulent?
- Are any other websites also infringing on the real website www[.]voluntariosxvenezuela[.]com?
- Can you determine or infer who is behind this domain infringing DNS poison attack?
- Are there any other websites that the threat actor is currently using or has used in attacks?
- What are some ways people can to do to be protect against DNS spoofing?