We write quite often about SEO spam injections on compromised websites, but this is the first time we have seen this blackhat tactic spreading into the WHOIS results for a domain name.
If you are not familiar with “WHOIS“, it is a protocol used to check who owns a specific domain name. These simple text records are publicly available and usually contain contact details for the website owner, i.e. their name, address, and phone number (unless the website owner purchased a WHOIS protection service).
Anatomy of a WHOIS Hack
A customer of ours was concerned about recent changes to their WHOIS records and email notifications containing spam content. We investigated further and discovered that attackers had taken advantage of domain expiration by purchasing a previously legitimate WHOIS server. They managed to insert arbitrary ads into the old South African WHOIS server records.
South Africa uses the country code .co.za for its official top-level domain. When we looked up where the official WHOIS server was for the client, we got a response like this:
dig co.za.whois-servers.net +noall +answer ; <<>> DiG 9.8.3-P1 <<>> co.za.whois-servers.net +noall +answer ;; global options: +cmd co.za.whois-servers.net. 537 IN CNAME whois.coza.net.za. whois.coza.net.za. 7138 IN A 184.108.40.206
Everything looks fine so far – coza[.]net.za is the official registrar for all co.za domains. Nothing appears to be wrong here.
However, the WHOIS record change notifications also contained information about what was changed.
Spam Content in WHOIS Records
Each notification email showed a new set of spam links in the WHOIS changelog. These alerts gave us the information we needed to dig deeper.
The emails he received looked something like this:
< Your Lucky Day: Become A Millionaire!
< Spin The Lucky Slots 80 Free Spins! Jackpot is over USD
< hxxp://www.facebook .com/myVegas
> You are a Winner!
> One of Your Prizes: iPad mini SmartTV 65″. Participation Required
> hxxp://helpfulhint .net/Free_iPad
< hxxp://www.survey-prizes .com/
< hxxp://www.apple .com/survey-prizes
< 1. http://whois.co.za/search/redirect.php?f=http%3A%2F
This was clearly spam, but there was a small clue at the end of the message. Why would queries go to whois.co.za instead of whois.coza.net.za?
Querying the WHOIS Server
I went in Terminal and ran this query to find out:
whois victim-site.co.za whois: za.whois-servers.net: nodename nor servname provided, or not known
Seeing this tipped me off that there is definitely something going on with this domain name.
In order to find the root cause of these issues, I installed Brew and used it to download an updated version of WHOIS. I was able to install WHOIS version 5.2.12 and simply ran the same command, but this time I had a different outcome (client information has been redacted).
./whois victim-site.co.za Domain Name: victim-site.co.za Registrant: [redacted] Email: [redacted] Tel: [redacted] Fax: None Registrant's Address: [redacted] Johannesburg Gauteng ZA [redacted] Registrar: Internet Solutions Relevant Dates: Registration Date: 1997-07-04 Renewal Date: 2016-07-04 Domain Status: Registered until renewal date Pending Timer Events: None Name Servers: jupiter.is.co.za [ redacted IP ] titan.is.co.za [ redacted IP ] demeter.is.co.za [ redacted IP ] WHOIS lookup made at 2016-05-08 04:55 UTC -- The use of this Whois facility is subject to the following terms and conditions. https://registry.net.za/whois_terms Copyright (c) ZACR 1995-2016
Bingo, a correct result!
Still, this didn’t tell me what the issue was exactly.
Browsing The Registry Website
I opened my browser and visited the site for the WHOIS server:
… I was immediately redirected to https://www.registry.net.za/whois/ – which is fine. It’s a legitimate website.
However when I went to:
… this time, I was redirected elsewhere, and a bunch of ads started popping up on my browser. GOTCHA!
This tells me something is wrong with the whois.co.za domain – and naturally, I needed to find out! I kept on checking using dig and found the following DNS records:
whois.co.za. 560 IN A 220.127.116.11 www.whois.co.za. 573 IN A 18.104.22.168
The bare domain and the www subdomain are pointed to different servers. You get a clean version when you simply use hxxp://whois[.]co.za and a spam-filled one if you use hxxp://www.whois[.]co.za.
When I simply ran another WHOIS query, this time I specifically told the WHOIS command which server to use:
$ whois -h whois.registry.net.za whois.co.za Domain Name: whois.co.za Registrant: HR Staffing Email: firstname.lastname@example.org Tel: +1.7274786000 Fax: +1.7274786001 Registrant's Address: 7335 US Highway N New Port Richey Florida US 34652 Registrar: HR Staffing Relevant Dates: Registration Date: 2016-04-22 Renewal Date: 2017-04-22 Domain Status: serverDeleteProhibited, serverTransferProhibited, serverUpdateProhibited Pending Timer Events: None Name Servers: ns1.sedoparking.com ns2.sedoparking.com WHOIS lookup made at 2016-05-06 15:34 UTC
There you go! Someone got a hold of the domain whois.co.za and renewed it on April 22nd. Our client started seeing ads in their notification emails ever since.
I tried to replicate the issue using a virtual machine and ran the WHOIS command there:
[me@vm-centos6 ~]$ whois whois.co.za [Querying http://whois.co.za/cgi-bin/whois.sh]
The whois.sh script code renders an HTML page with – yes, you guessed it – lots of ads.
Outdated WHOIS Version
Here is the tricky part. The issue does not happen to everyone.
It only happens with the versions of WHOIS older than 5.0.19.
Expired WHOIS Servers
Essentially, the whois[.]co.za domain was removed in version 4.7.33 back in 2009 because the domain was being taken down. This necessitated changes to the co.za ccTLD domains that affected WHOIS lookups.
Reading more about this on the IANA website revealed changes submitted in 2005 that affected the .co.za domains and the WHOIS servers. As a consequence of these changes, whois[.]co.za was removed from the official list of WHOIS servers for co.za domains – and whois.coza.net.za was its replacement.
An attacker capitalized on this after the domain expired by purchasing it and using it to serve advertisements instead of valid WHOIS information.
This means that all UNIX systems using a WHOIS version older than 5.0.19 will still see the deprecated (and now malicious) WHOIS server when querying co.za domains.
I reported this to the South African registrar, but unfortunately, I haven’t received a reply from them.
It’s important to keep an eye on your WHOIS records to ensure hackers don’t make unauthorized changes or compromise your WHOIS server. Our WHOIS monitoring service will notify you so you can verify the changes are legitimate or address any unauthorized changes.