{"id":10346,"date":"2024-07-17T09:53:39","date_gmt":"2024-07-17T16:53:39","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=10346"},"modified":"2024-12-20T06:08:44","modified_gmt":"2024-12-20T14:08:44","slug":"rdgas-the-next-chapter-in-domain-generation-algorithms","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/rdgas-the-next-chapter-in-domain-generation-algorithms\/","title":{"rendered":"RDGAs: The Next Chapter in Domain Generation Algorithms"},"content":{"rendered":"<h3><strong>Author: James Barnett<\/strong><\/h3>\n<p>&nbsp;<\/p>\n<p>This trailblazing report explores the burgeoning use of a technique that threat and infrastructure actors are using to covertly transform the DNS landscape with millions of new domains. You\u2019ll learn how traditional malware-based domain generation algorithms (DGAs) have evolved into registered DGAs (RDGAs) that can be used for malware, phishing, spam, scams, gambling, traffic distribution systems (TDSs), virtual private networks (VPNs), and advertising. We\u2019ll unveil a new RDGA infrastructure actor named Revolver Rabbit, who runs the largest network of registered DGA domains that we have detected. We\u2019ll also reveal how the notorious Hancitor malware used an RDGA to generate its C2 domains for years while most of the security industry remained oblivious to their methods.<\/p>\n<p>For nearly two decades, threat actors have used domain generation algorithms (DGAs) to distribute malware. In recent years, various kinds of DNS actors have been employing a technique we call registered domain generation algorithms (RDGAs), in which the actor uses an algorithm to register many domain names at one time. RDGA threats are considerably harder to detect and defend against than traditional DGAs, and despite their prevalence on the internet, they have been woefully underreported by the security community. We originally described RDGAs in October 2023 and have published on the topic multiple times since then.<\/p>\n<h3>What Exactly Are RDGAs?<\/h3>\n<p>RDGAs are a programmatic mechanism that allows DNS actors to create many domain names at once, over time, to register for use in their infrastructure. These differ significantly from the traditional domain generation algorithms (DGAs) that have long been associated with malware. In an RDGA, the algorithm is a secret kept by the actor, and they register all the domain names. In a traditional DGA, the malware contains an algorithm that can be discovered and most of the domain names will not be registered.<\/p>\n<table style=\"margin: 0 auto 30px\">\n<tbody>\n<tr>\n<td style=\"padding: 0px;\">\n<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/rgda-figure-1.png\" alt=\"Figure 1. Illustration of the difference in domain registration behaviors of traditional DGAs and registered DGAs\" width=\"1500\" height=\"707\" class=\"aligncenter size-full wp-image-10373\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/rgda-figure-1.png 1500w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/rgda-figure-1-300x141.png 300w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/rgda-figure-1-1024x483.png 1024w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/rgda-figure-1-768x362.png 768w\" sizes=\"auto, (max-width: 1500px) 100vw, 1500px\" \/>\n  <\/td>\n<\/tr>\n<tr>\n<td>Figure 1. Illustration of the difference in domain registration behaviors of traditional DGAs and registered DGAs.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>While traditional DGAs are used exclusively for connection to a malware controller, RDGAs can be used for a wider range of purposes \u2013 essentially any activity that benefits from having large numbers of domain names. This can include malicious purposes such as malware, phishing, spam, gambling, and scams. Unfortunately, we often see threat actors use traffic distribution systems (TDSs) and virtual private networks (VPNs) for their nefarious activity, making it more challenging for security practitioners to discern the intent of the infrastructure. We\u2019ll cover a couple of interesting cases of RDGA usage in this blog, but there are far more examples in our full research paper.<\/p>\n<p><strong>Threat actors, criminal enterprises, and legitimate businesses all use RDGAs.<\/strong> Registrars like Namecheap even offer tools to generate variants of a chosen domain name, and these tools can be leveraged by anyone \u2014 legitimate customers or threat actors. <\/p>\n<table style=\"margin: 0 auto 30px\">\n<tbody>\n<tr>\n<td>\n<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/rdga_figure_06_namecheap_beast_mode.jpg\" alt=\"\" width=\"2128\" height=\"1716\" class=\"aligncenter size-full wp-image-10359\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/rdga_figure_06_namecheap_beast_mode.jpg 2128w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/rdga_figure_06_namecheap_beast_mode-300x242.jpg 300w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/rdga_figure_06_namecheap_beast_mode-1024x826.jpg 1024w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/rdga_figure_06_namecheap_beast_mode-768x619.jpg 768w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/rdga_figure_06_namecheap_beast_mode-1536x1239.jpg 1536w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/rdga_figure_06_namecheap_beast_mode-2048x1651.jpg 2048w\" sizes=\"auto, (max-width: 2128px) 100vw, 2128px\" \/>\n  <\/td>\n<\/tr>\n<tr>\n<td>Figure 2. Namecheap\u2019s \u201cBeast Mode\u201d is a fully-featured graphical RDGA builder available to all customers<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h3>Why Call It RDGA?<\/h3>\n<p><strong>We coined this phrase and acronym because the term \u201cDGA\u201d has become broadly overused<\/strong> in the years since the concept was introduced, effectively serving as an umbrella term for any domain that is (or appears to be) algorithmically generated. In the same way that the concept of dictionary DGAs (DDGAs) was introduced to distinguish algorithms that generate domains using real words rather than random characters, <strong>we\u2019re using the concept of RDGAs to distinguish algorithms that threat actors use to privately register large numbers of domains from algorithms embedded in publicly-available malware<\/strong> to make their C2 communications more difficult to disrupt. <\/p>\n<h3>What Do RDGAs Look Like?<\/h3>\n<p><strong>Just like traditional DGAs, RDGAs come in all shapes and sizes.<\/strong> Some look like prototypical DGAs with seemingly random characters and a high degree of entropy, as <strong>Tables 1 and 2<\/strong> show:  <\/p>\n<table style=\"margin: 0 auto 30px\">\n<tbody>\n<tr>\n<td class=\"code-format\">6rnd9mitqt1rz82[.]top<br \/>\n7r7suw52ls00i20[.]top<br \/>\n9w9ohb5vky5p3dz[.]top<br \/>\nbjbntaxmh09r09e[.]top<br \/>\nqcj4pirltkpqrcu[.]top\n<\/td>\n<\/tr>\n<tr>\n<td>Table 1. Prototypical DGA used by a SocGholish\/TA569 affiliate <\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<table style=\"margin: 0 auto 30px\">\n<tbody>\n<tr>\n<td class=\"code-format\">h87e1mbm0u5f85[.]xyz<br \/>\nn8j1nau3os4otr[.]xyz<br \/>\nxnnxr1jquyupjc[.]xyz<br \/>\nxqajkr8fbrdryp0[.]xyz<br \/>\nxryqcgcb2upb28k[.]xyz\n<\/td>\n<\/tr>\n<tr>\n<td>Table 2. RDGA for a weight loss pill scam <\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong>Table 3<\/strong> shows that other RDGAs use nonsensical combinations of dictionary words like a traditional DDGA:  <\/p>\n<table style=\"margin: 0 auto 30px\">\n<tbody>\n<tr>\n<td class=\"code-format\">arriveplanetsnow[.]buzz<br \/>\ncoatthinkverb[.]buzz<br \/>\ndebtgenepub[.]live<br \/>\npoemtrainsurprise[.]top<br \/>\nquarterneighbourforward[.]xyz\n<\/td>\n<\/tr>\n<tr>\n<td>Table 3. VexTrio Viper RDGA <\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Some RDGAs use a limited set of dictionary words in a more structured format in order to fit a theme, like this set of domains in <strong>Table 4<\/strong>, whose names correspond to various regional jails: <\/p>\n<table style=\"margin: 0 auto 30px\">\n<tbody>\n<tr>\n<td class=\"code-format\">castrocountyjail[.]org<br \/>\nkilleencityjail[.]org<br \/>\nlasalleparishjail[.]org<br \/>\nmiamidadecountyjail[.]org<br \/>\nnorthcentralregionaljail[.]org\n<\/td>\n<\/tr>\n<tr>\n<td>Table 4. RDGA with a regional jail theme<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Still other RDGAs generate variations of a single domain name by inserting, shifting, or deleting characters from the base domain name (<strong>see Table 5<\/strong>). More often than not, the character changes in these variant domain names follow some sort of structure so that the generated domains are still somewhat intelligible and similar to the base domain, like the following set of RDGA domains for a Russian diploma mill: <\/p>\n<table style=\"margin: 0 auto 30px\">\n<tbody>\n<tr>\n<td class=\"code-format\">arenadiploma[.]com<br \/>\narea-diploman24[.]com<br \/>\narea-diplomans24[.]com<br \/>\narea-diploms24[.]com<br \/>\narea-diplomy24[.]com<br \/>\nareas-diplom[.]com<br \/>\nareas-diplom24[.]com<br \/>\nareas-diplomy24[.]com<br \/>\narena-diplomsy24[.]com<br \/>\narena-diplomy24[.]com\n<\/td>\n<\/tr>\n<tr>\n<td>Table 5. RDGA for a Russian diploma mill <\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong>Clearly, RDGAs come in a variety of forms and their domains may not be immediately recognizable when viewed in isolation. This is why researching and identifying RDGAs requires access to large-scale DNS data and enough DNS expertise to properly analyze it. <\/strong><\/p>\n<h3>Hancitor: Using RDGAs Before It Was Cool<\/h3>\n<p><strong>If you&#8217;re reading this blog, there&#8217;s a good chance you&#8217;ve heard of Hancitor malware.<\/strong> Although it hasn&#8217;t been active recently, it was an incredibly popular malware loader with prolific malspam campaigns that regularly delivered booby-trapped documents to unsuspecting victims for the better part of a decade. <strong>What most people don&#8217;t realize about Hancitor is that they were using an RDGA to generate all of their C2 domains,<\/strong> which meant they could be detected in DNS and blocked before their campaigns even became active. <\/p>\n<p>Looking at the C2 domains embedded in a single sample of Hancitor (<strong>Table 6<\/strong>), the pattern isn&#8217;t obvious. <\/p>\n<table style=\"margin: 0 auto 30px\">\n<tbody>\n<tr>\n<td class=\"code-format\">chopprousite[.]ru<br \/>\npatiennerrhe[.]com<br \/>\nthougolograrly[.]ru\n<\/td>\n<\/tr>\n<tr>\n<td>Table 6. Hancitor C2 domains from one sample<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>The C2s are nonsensical and look like DGA domains, but they don&#8217;t contain numbers or lots of high-entropy strings like a randomized traditional DGA. Some of them appear to contain English words like a DDGA, but they&#8217;re not exclusively made of intelligible words like a standard DDGA. While all of these observations are true, and they may even help identify Hancitor domains during manual threat hunting, they aren&#8217;t enough to fully characterize the algorithm and build an automated detector for it. <\/p>\n<p>If we look at a larger list of Hancitor C2 domains taken from multiple samples, however, the underlying patterns of its RDGA become more apparent (<strong>Table 7<\/strong>): <\/p>\n<table style=\"margin: 0 auto 30px\">\n<tbody>\n<tr>\n<td class=\"code-format\">dintretonid[.]com<br \/>\ndintretrewor[.]com<br \/>\ndintrolletone[.]com<br \/>\ndintromparsup[.]com<br \/>\ndirenrolpar[.]ru<br \/>\nhadhecrecled[.]com<br \/>\nhadrecrolof[.]ru<br \/>\nhadsparmirat[.]com<br \/>\nhanparolhar[.]com<br \/>\nrofromandfor[.]ru<br \/>\nrowrorofrat[.]com\n<\/td>\n<\/tr>\n<tr>\n<td>Table 7. Selected Hancitor C2 domains taken from various samples<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>From this set of domains we can see that <strong>Hancitor\u2019s RDGA has a tendency to repeat specific sequences of characters,<\/strong> such as \u201cdi\u201d and \u201cha.\u201d We could infer that the reason its domains appear random while having fairly low entropy is that <strong>the character sequences it uses are common in English words.<\/strong> <\/p>\n<p><strong>Infoblox recognized these peculiarities of the Hancitor RDGA in 2018<\/strong> and created a statistical model to identify domains that follow Hancitor\u2019s RDGA pattern. By combining this with our knowledge of Hancitor&#8217;s registration patterns and DNS signatures, we created a predictive analytic to identify and block Hancitor C2 domains before they were used in active campaigns. <\/p>\n<h3>Meet Revolver Rabbit<\/h3>\n<p><strong>One of the most prolific RDGA actors we\u2019ve found, which we\u2019ve named Revolver Rabbit, has registered over 500k domains on the .bond TLD alone. <\/strong>Their RDGA pattern is unique but also highly variable, which makes some of their domains difficult to identify without additional DNS context. <\/p>\n<p>The most common RDGA pattern this actor uses is a series of one or more dictionary words followed by a five-digit number, with each word or number separated by a dash (see <strong>Table 8<\/strong>). When multiple dictionary words are used, they usually form coherent phrases rather than appearing completely random. <\/p>\n<table style=\"margin: 0 auto 30px\">\n<tbody>\n<tr>\n<td class=\"code-format\">assisted-living-11607[.]bond<br \/>\nonline-jobs-42681[.]bond<br \/>\nperfumes-76753[.]bond<br \/>\nsecurity-surveillance-cameras-42345[.]bond<br \/>\nyoga-classes-35904[.]bond\n<\/td>\n<\/tr>\n<tr>\n<td>Table 8. Examples of most common RDGA pattern for Revolver Rabbit<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Sometimes the actor uses ISO 3166-1 country codes, full country names, or numbers corresponding to years instead of dictionary words (see <strong>Tables 9A and 9B<\/strong>). They tend to use these elements as prefixes or suffixes, and the domains that use them generally omit the standard five-digit numerical suffix regardless of whether the element is being used as a prefix or suffix.<\/p>\n<table style=\"margin: 0 auto 30px\">\n<tbody>\n<tr>\n<td class=\"code-format\">ai-courses-12139[.]bond<br \/>\nai-courses-13069[.]bond<br \/>\nai-courses-14729[.]bond<br \/>\nai-courses-16651[.]bond<br \/>\nai-courses-17621[.]bond<br \/>\napp-software-development-training-52686[.]bond<br \/>\napp-software-development-training-54449[.]bond<br \/>\napp-software-development-training-55554[.]bond<br \/>\napp-software-development-training-57549[.]bond<\/td>\n<td class=\"code-format\">ai-courses-2024-pe[.]bond<br \/>\nai-courses-2024-pk[.]bond<br \/>\nai-courses-2024sa[.]bond<br \/>\nai-courses2023-in[.]bond<br \/>\nai-courses2023in[.]bond<br \/>\nai-courses2024in[.]bond<br \/>\napp-software-development-italy[.]bond<br \/>\napp-software-development-training-usa[.]bond<\/td>\n<\/tr>\n<tr>\n<td>Table 9A. Domains using the basic pattern<\/td>\n<td>Table 9B. Domains using country codes, country names, and year numbers <\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong>Tables 10A and 10B<\/strong> show how the actor occasionally replaces their standard five-digit suffix with one or two digits followed by a single character.<\/p>\n<table style=\"margin: 0 auto 30px\">\n<tbody>\n<tr>\n<td class=\"code-format\">online-degrees-16099[.]bond<br \/>\nportable-air-conditioner-12322[.]bond<br \/>\nriver-cruises-13890[.]bond<br \/>\nroofing-services-10175[.]bond<br \/>\ntravel-insurance-43494[.]bond<\/td>\n<td class=\"code-format\">usa-online-degree-29o[.]bond<br \/>\nbra-portable-air-conditioner-9o[.]bond<br \/>\nuk-river-cruises-8n[.]bond<br \/>\nrsa-roofing-services-8n[.]bond<br \/>\ncol-travel-insurance-3n[.]bond<\/td>\n<\/tr>\n<tr>\n<td>Table 10A. Domains using the basic pattern<\/td>\n<td>Table 10B. Domains using 1-2 digits and a single letter<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong>Tables 11A and 11B<\/strong> show that in some cases the actor uses two dashes in a row rather than the single dash they normally use. <\/p>\n<table style=\"margin: 0 auto 30px\">\n<tbody>\n<tr>\n<td class=\"code-format\">welding-machines-10120[.]bond<br \/>\nwelding-machines-35450[.]bond<br \/>\nwelding-machines-56397[.]bond<br \/>\nwelding-machines-76813[.]bond<br \/>\nwelding-machines-99146[.]bond<\/td>\n<td class=\"code-format\">welding-machines&minus;&minus;11015[.]bond<br \/>\n    welding-machines&minus;&minus;31109[.]bond<br \/>\n    welding-machines&minus;&minus;56717[.]bond<br \/>\n    welding-machines&minus;&minus;75378[.]bond<br \/>\n    welding-machines&minus;&minus;97422[.]bond<\/td>\n<\/tr>\n<td>Table 11A. Domains using the basic pattern<\/td>\n<td>Table 11B. Domains using two dashes instead of one<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>The amount of variation in this actor\u2019s RDGA highlights the need for advanced DNS expertise and visibility when implementing automated RDGA detection. While many of their domains follow a basic pattern that could be detected with regular expressions or other string-based matching, they also have a number of domains that use different patterns. The similarities between this actor&#8217;s patterns may be obvious to a human observer, but for an automated detector to accurately group these somewhat disparate domains together, additional DNS context is required.<\/p>\n<p>We were originally going to publish Revolver Rabbit as an unknown, very active RDGA actor, but found over forty XLoader samples<sup>1, 2<\/sup> containing the domains shortly before our original publication. According to reputable malware sandbox sources, those samples used Revolver Rabbit domains both as decoy domains and live C2s. Following the release of our research, we were able to verify the identity of Revolver Rabbit as an advertising network. We have learnt from them that when a domain is no longer needed for the advertising campaign, it is dropped. Neither we nor they can confirm whether the domains observed in the malware samples were subsequently used by bad actors. We were able to confirm that in multiple samples, the domain listed as a C2 was no longer actively used in the advertising network at the time of analysis.<\/p>\n<h3>Unknown RDGAs Are on the Rise<\/h3>\n<p>For every RDGA like <a href=\"https:\/\/www.infoblox.com\/threat-intel\/threat-actors\/vextrio\/\" rel=\"noopener\" target=\"_blank\">VexTrio Viper<\/a> that we&#8217;ve extensively researched and published on, we&#8217;ve detected thousands of other RDGAs whose purposes remain largely unknown. Given the wide array of malicious activity we&#8217;ve observed from the RDGAs we know, the sheer quantity of unknown RDGAs is a matter of significant interest and concern. The patterns and DNS signatures that tie RDGA domains together can only be identified by large-scale analysis, so unknown RDGA domains are able to function largely unimpeded on networks that aren&#8217;t protected by advanced DNS analytics like ours.  <\/p>\n<p>In the six-month period from October 17, 2023 to April 17, 2024, our RDGA detectors identified over 2M unique RDGA domains, or an average of over 11k new RDGA domains per day (<strong>see Figure 3<\/strong>). <\/p>\n<table style=\"margin: 0 auto 30px\">\n<tbody>\n<tr>\n<td>\n<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/rdga_figure_20_daily_domains.png\" alt=\"\" width=\"2976\" height=\"800\" class=\"aligncenter size-full wp-image-10357\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/rdga_figure_20_daily_domains.png 2976w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/rdga_figure_20_daily_domains-300x81.png 300w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/rdga_figure_20_daily_domains-1024x275.png 1024w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/rdga_figure_20_daily_domains-768x206.png 768w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/rdga_figure_20_daily_domains-1536x413.png 1536w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/rdga_figure_20_daily_domains-2048x551.png 2048w\" sizes=\"auto, (max-width: 2976px) 100vw, 2976px\" \/>\n<\/td>\n<\/tr>\n<tr>\n<td>Figure 3. Daily RDGA domain detection counts from October 17, 2023 to April 17, 2024 <\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Our detectors initially clustered these domains into roughly 117k unique actor groups, which we later reduced to roughly 52k actor groups using a combination of automated refinements and manual analysis (<strong>see Figure 4<\/strong>). <\/p>\n<table style=\"margin: 0 auto 30px\">\n<tbody>\n<tr>\n<td>\n<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/rdga_figure_21_daily_actors.png\" alt=\"\" width=\"2976\" height=\"800\" class=\"aligncenter size-full wp-image-10356\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/rdga_figure_21_daily_actors.png 2976w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/rdga_figure_21_daily_actors-300x81.png 300w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/rdga_figure_21_daily_actors-1024x275.png 1024w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/rdga_figure_21_daily_actors-768x206.png 768w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/rdga_figure_21_daily_actors-1536x413.png 1536w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/rdga_figure_21_daily_actors-2048x551.png 2048w\" sizes=\"auto, (max-width: 2976px) 100vw, 2976px\" \/>\n<\/td>\n<\/tr>\n<tr>\n<td>Figure 4. Daily RDGA actor cluster counts from October 17, 2023 to April 17, 2024 <\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>The key takeaway from these statistics is that <strong>there are so many RDGA domains being registered that the security industry will never be able to research them all.<\/strong> It can take months for human researchers to understand a threat to the point that they can publish on it, but <strong>it only takes a day for RDGA actors to register tens of thousands of new domains for researchers to investigate.<\/strong> This is why <strong>automated detection is the only viable defense against RDGA threats.<\/strong> <\/p>\n<p>Learn more about RDGAs in our full research report <a href=\"https:\/\/insights.infoblox.com\/resources-research-report\/infoblox-research-report-registered-dgas-the-prolific-new-menace-no-one-is-talking-about\" rel=\"noopener\" target=\"_blank\">here<\/a>.<\/p>\n<h3>Conclusion<\/h3>\n<p><strong>RDGA domains are associated with a panoply of dubious activities that most organizations don&#8217;t want on their networks.<\/strong> But despite being used to register millions of new domains, RDGAs have gone almost entirely unrecognized by the security industry. This lack of reporting is likely due to the fact that RDGA detection requires both significant DNS expertise and access to large volumes of DNS data. <strong>Organizations should be aware of the threat that RDGAs pose to their networks, and should implement security solutions that include automated RDGA detection. <\/strong><\/p>\n<h3>Indicators of Activity<\/h3>\n<p>Below is a sample of indicators used by the RDGA threat actors we mentioned in this blog. Indicators are also available in our GitHub repository\u202f<a href=\"https:\/\/github.com\/infobloxopen\/threat-intelligence\/tree\/main\/indicators\" rel=\"noopener\" target=\"_blank\">here<\/a>.<\/p>\n<table style=\"margin: 0 auto 30px;\">\n<thead>\n<tr>\n<th>Indicator<\/th>\n<th>Type of Indicator <\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td class=\"code-format\">6rnd9mitqt1rz82[.]top<br \/>\n    7r7suw52ls00i20[.]top 9w9ohb5vky5p3dz[.]top <br \/>\n    bjbntaxmh09r09e[.]top <br \/>\n    qcj4pirltkpqrcu[.]top<\/td>\n<td>SocGholish\/TA569 affiliate traditional DGA domains<\/td>\n<\/tr>\n<tr>\n<td class=\"code-format\">h87e1mbm0u5f85[.]xyz <br \/>\n    n8j1nau3os4otr[.]xyz <br \/>\n    xnnxr1jquyupjc[.]xyz <br \/>\n    xqajkr8fbrdryp0[.]xyz <br \/>\n    xryqcgcb2upb28k[.]xyz <\/td>\n<td>Weight loss pill scam RDGA domains <\/td>\n<\/tr>\n<tr>\n<td class=\"code-format\">arriveplanetsnow[.]buzz <br \/>\n  coatthinkverb[.]buzz <br \/>\n  debtgenepub[.]live <br \/>\n  poemtrainsurprise[.]top <br \/>\n  quarterneighbourforward[.]xyz<\/td>\n<td>VexTrio Viper RDGA domains<\/td>\n<\/tr>\n<tr>\n<td class=\"code-format\">castrocountyjail[.]org <br \/>\n  killeencityjail[.]org <br \/>\n  lasalleparishjail[.]org <br \/>\n  miamidadecountyjail[.]org <br \/>\n  northcentralregionaljail[.]org<\/td>\n<td>Regional jail RDGA domains<\/td>\n<\/tr>\n<tr>\n<td class=\"code-format\">arenadiploma[.]com <br \/>\n  area-diploman24[.]com <br \/>\n  area-diplomans24[.]com <br \/>\n  area-diploms24[.]com <br \/>\n  area-diplomy24[.]com <br \/>\n  areas-diplom[.]com <br \/>\n  areas-diplom24[.]com <br \/>\n  areas-diplomy24[.]com <br \/>\n  arena-diplomsy24[.]com <br \/>\n  arena-diplomy24[.]com <\/td>\n<td>Russian diploma scam RDGA domains <\/td>\n<\/tr>\n<tr>\n<td class=\"code-format\">chopprousite[.]ru <br \/>\n  patiennerrhe[.]com <br \/>\n  thougolograrly[.]ru <br \/>\n  dintretonid[.]com <br \/>\n  dintretrewor[.]com <br \/>\n  dintrolletone[.]com <br \/>\n  dintromparsup[.]com <br \/>\n  direnrolpar[.]ru <br \/>\n  hadhecrecled[.]com <br \/>\n  hadrecrolof[.]ru <br \/>\n  hadsparmirat[.]com <br \/>\n  hanparolhar[.]com <br \/>\n  rofromandfor[.]ru <br \/>\n  rowrorofrat[.]com <\/td>\n<td>Hancitor C2 RDGA domains<\/td>\n<\/tr>\n<p><!--tr>\n\n\n<td class=\"code-format\">assisted-living-11607[.]bond <br \/>\n  online-jobs-42681[.]bond <br \/>\n  perfumes-76753[.]bond <br \/>\n  security-surveillance-cameras-42345[.]bond <br \/>\n  yoga-classes-35904[.]bond <br \/>\n  ai-courses-12139[.]bond <br \/>\n  ai-courses-13069[.]bond <br \/>\n  ai-courses-14729[.]bond <br \/>\n  ai-courses-16651[.]bond <br \/>\n  ai-courses-17621[.]bond <br \/>\n  app-software-development-training-52686[.]bond <br \/>\n  app-software-development-training-54449[.]bond <br \/>\n  app-software-development-training-55554[.]bond <br \/>\n  app-software-development-training-57549[.]bond <br \/>\n  ai-courses-2024-pe[.]bond <br \/>\n  ai-courses-2024-pk[.]bond <br \/>\n  ai-courses-2024sa[.]bond <br \/>\n  ai-courses2023-in[.]bond <br \/>\n  ai-courses2023in[.]bond <br \/>\n  ai-courses2024in[.]bond <br \/>\n  app-software-development-italy[.]bond <br \/>\n  app-software-development-training-usa[.]bond<br \/> \n  online-degrees-16099[.]bond <br \/>\n  portable-air-conditioner-12322[.]bond <br \/>\n  river-cruises-13890[.]bond <br \/>\n  roofing-services-10175[.]bond <br \/>\n  travel-insurance-43494[.]bond <br \/>\n  usa-online-degree-29o[.]bond <br \/>\n  bra-portable-air-conditioner-9o[.]bond <br \/>\n  uk-river-cruises-8n[.]bond <br \/>\n  rsa-roofing-services-8n[.]bond <br \/>\n  col-travel-insurance-3n[.]bond <br \/>\n  welding-machines-10120[.]bond <br \/>\n  welding-machines-35450[.]bond <br \/>\n  welding-machines-56397[.]bond <br \/>\n  welding-machines-76813[.]bond <br \/>\n  welding-machines-99146[.]bond <br \/>\n  welding-machines&minus;&minus;11015[.]bond <br \/>\n  welding-machines&minus;&minus;31109[.]bond <br \/>\n  welding-machines&minus;&minus;56717[.]bond <br \/>\n  welding-machines&minus;&minus;75378[.]bond <br \/>\n  welding-machines&minus;&minus;97422[.]bond <\/td>\n\n\n\n\n<td>Revolver Rabbit RDGA domains <\/td>\n\n\n<\/tr>\n\n\n\n\n<tr>\n\n\n<td class=\"code-format\">tires-book-robust[.]bond <br \/>\n  laser-skin-treatment-19799[.]bond <br \/>\n  pool-repair-35063[.]bond <br \/>\n  apartments-for-rent-72254[.]bond <br \/>\n  hemophilia-treatment-41433[.]bond <\/td>\n\n\n\n\n<td>Revolver Rabbit RDGA domains used as C2 \/ decoy domains for XLoader malware <\/td>\n\n\n<\/tr-->\n  <\/tbody>\n<\/table>\n<h3 style=\"font-size:18px;\">Footnotes<\/h3>\n<ol style=\"font-size:14px;\">\n<li><a href=\"https:\/\/www.joesandbox.com\/analysis\/1466892\/0\/html\" rel=\"noopener\" target=\"_blank\">https:\/\/www.joesandbox.com\/analysis\/1466892\/0\/html<\/a><\/li>\n<li><a href=\"https:\/\/www.virustotal.com\/gui\/file\/7738ec817c97182e16e409767c55c87460d83d37b0442eb337bc2507763d4486\/relations\" rel=\"noopener\" target=\"_blank\">https:\/\/www.virustotal.com\/gui\/file\/7738ec817c97182e16e409767c55c87460d83d37b0442eb337bc2507763d4486\/relations<\/a><\/li>\n<\/ol>\n<style>\n.green {color: #00bd4d;}\n.code-format {\n    font-family: 'Courier New';\n}\ntable{\nfont-size: 16px;\nword-break: keep-all;\n}\n<\/style>\n<p><script>\njQuery('.single h1').html('<span class=\"gradient\">RDGAs:<\/span> The Next Chapter in Domain Generation Algorithms');\n<\/script><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Author: James Barnett &nbsp; This trailblazing report explores the burgeoning use of a technique that threat and infrastructure actors are using to covertly transform the DNS landscape with millions of new domains. You\u2019ll learn how traditional malware-based domain generation algorithms (DGAs) have evolved into registered DGAs (RDGAs) that can be used for malware, phishing, spam, [&hellip;]<\/p>\n","protected":false},"author":397,"featured_media":10853,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[254],"tags":[30,893,286,915,307,32,1064,351,361,189],"class_list":{"0":"post-10346","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threat-intelligence","8":"tag-dns","9":"tag-domain-name-system","10":"tag-dga","11":"tag-rdga","12":"tag-phishing","13":"tag-malware","14":"tag-xloader","15":"tag-formbook","16":"tag-network-security","17":"tag-cybersecurity","18":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Registered DGAs - RDGAs change threat actor landscape with Revolver Rabbit &amp; XLoader malware | Infoblox<\/title>\n<meta name=\"description\" content=\"Infoblox Threat Intel exposes registered DGAs (RDGAs), the novel DGAs that our research has found are often used to host phishing and scam sites and deliver malware\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/rdgas-the-next-chapter-in-domain-generation-algorithms\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Registered DGAs - RDGAs change threat actor landscape with Revolver Rabbit &amp; XLoader malware | Infoblox\" \/>\n<meta property=\"og:description\" content=\"Infoblox Threat Intel exposes registered DGAs (RDGAs), the novel DGAs that our research has found are often used to host phishing and scam sites and deliver malware\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/rdgas-the-next-chapter-in-domain-generation-algorithms\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2024-07-17T16:53:39+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-12-20T14:08:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/rdgas-the-next-chapter-in-domain-generation-algorithms-blog-thumbnail-v2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"612\" \/>\n\t<meta property=\"og:image:height\" content=\"408\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Infoblox Threat Intel\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Registered DGAs - RDGAs change threat actor landscape with Revolver Rabbit &amp; XLoader malware | Infoblox\" \/>\n<meta name=\"twitter:description\" content=\"Infoblox Threat Intel exposes registered DGAs (RDGAs), the novel DGAs that our research has found are often used to host phishing and scam sites and deliver malware\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/rdgas-the-next-chapter-in-domain-generation-algorithms-blog-thumbnail-v2.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Infoblox Threat Intel\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"11 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/rdgas-the-next-chapter-in-domain-generation-algorithms\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/rdgas-the-next-chapter-in-domain-generation-algorithms\\\/\"},\"author\":{\"name\":\"Infoblox Threat Intel\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/b6aed8965e3298a0817c16d32c0a67ae\"},\"headline\":\"RDGAs: The Next Chapter in Domain Generation Algorithms\",\"datePublished\":\"2024-07-17T16:53:39+00:00\",\"dateModified\":\"2024-12-20T14:08:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/rdgas-the-next-chapter-in-domain-generation-algorithms\\\/\"},\"wordCount\":2442,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/rdgas-the-next-chapter-in-domain-generation-algorithms\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/rdgas-the-next-chapter-in-domain-generation-algorithms-blog-thumbnail-v2.jpg\",\"keywords\":[\"DNS\",\"Domain Name System\",\"DGA\",\"RDGA\",\"Phishing\",\"Malware\",\"XLoader\",\"formbook\",\"Network Security\",\"Cybersecurity\"],\"articleSection\":[\"Infoblox Threat Intel\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/rdgas-the-next-chapter-in-domain-generation-algorithms\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/rdgas-the-next-chapter-in-domain-generation-algorithms\\\/\",\"name\":\"Registered DGAs - RDGAs change threat actor landscape with Revolver Rabbit & XLoader malware | Infoblox\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/rdgas-the-next-chapter-in-domain-generation-algorithms\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/rdgas-the-next-chapter-in-domain-generation-algorithms\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/rdgas-the-next-chapter-in-domain-generation-algorithms-blog-thumbnail-v2.jpg\",\"datePublished\":\"2024-07-17T16:53:39+00:00\",\"dateModified\":\"2024-12-20T14:08:44+00:00\",\"description\":\"Infoblox Threat Intel exposes registered DGAs (RDGAs), the novel DGAs that our research has found are often used to host phishing and scam sites and deliver malware\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/rdgas-the-next-chapter-in-domain-generation-algorithms\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/rdgas-the-next-chapter-in-domain-generation-algorithms\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/rdgas-the-next-chapter-in-domain-generation-algorithms\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/rdgas-the-next-chapter-in-domain-generation-algorithms-blog-thumbnail-v2.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/rdgas-the-next-chapter-in-domain-generation-algorithms-blog-thumbnail-v2.jpg\",\"width\":612,\"height\":408},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/rdgas-the-next-chapter-in-domain-generation-algorithms\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Infoblox Threat Intel\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/threat-intelligence\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"RDGAs: The Next Chapter in Domain Generation Algorithms\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/b6aed8965e3298a0817c16d32c0a67ae\",\"name\":\"Infoblox Threat Intel\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_397_1714162589-96x96.png\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_397_1714162589-96x96.png\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_397_1714162589-96x96.png\",\"caption\":\"Infoblox Threat Intel\"},\"description\":\"Infoblox Threat Intel is the leading creator of original DNS threat intelligence, distinguishing itself in a sea of aggregators. What sets us apart? Two things: mad DNS skills and unparalleled visibility. DNS is notoriously tricky to interpret and hunt from, but our deep understanding and unique access to the internet's inner workings allow us to track down threat actors that others can't see. We're proactive, not just defensive, using our insights to disrupt cybercrime where it begins. We also believe in sharing knowledge to support the broader security community by publishing detailed research and releasing indicators on GitHub. In addition, our intel is seamlessly integrated into our Infoblox Protective DNS solutions, so customers automatically get its benefits, along with ridiculously low false positive rates.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/infoblox-threat-intel\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Registered DGAs - RDGAs change threat actor landscape with Revolver Rabbit & XLoader malware | Infoblox","description":"Infoblox Threat Intel exposes registered DGAs (RDGAs), the novel DGAs that our research has found are often used to host phishing and scam sites and deliver malware","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/rdgas-the-next-chapter-in-domain-generation-algorithms\/","og_locale":"en_US","og_type":"article","og_title":"Registered DGAs - RDGAs change threat actor landscape with Revolver Rabbit & XLoader malware | Infoblox","og_description":"Infoblox Threat Intel exposes registered DGAs (RDGAs), the novel DGAs that our research has found are often used to host phishing and scam sites and deliver malware","og_url":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/rdgas-the-next-chapter-in-domain-generation-algorithms\/","og_site_name":"Infoblox Blog","article_published_time":"2024-07-17T16:53:39+00:00","article_modified_time":"2024-12-20T14:08:44+00:00","og_image":[{"width":612,"height":408,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/rdgas-the-next-chapter-in-domain-generation-algorithms-blog-thumbnail-v2.jpg","type":"image\/jpeg"}],"author":"Infoblox Threat Intel","twitter_card":"summary_large_image","twitter_title":"Registered DGAs - RDGAs change threat actor landscape with Revolver Rabbit & XLoader malware | Infoblox","twitter_description":"Infoblox Threat Intel exposes registered DGAs (RDGAs), the novel DGAs that our research has found are often used to host phishing and scam sites and deliver malware","twitter_image":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/rdgas-the-next-chapter-in-domain-generation-algorithms-blog-thumbnail-v2.jpg","twitter_misc":{"Written by":"Infoblox Threat Intel","Est. reading time":"11 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/rdgas-the-next-chapter-in-domain-generation-algorithms\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/rdgas-the-next-chapter-in-domain-generation-algorithms\/"},"author":{"name":"Infoblox Threat Intel","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/b6aed8965e3298a0817c16d32c0a67ae"},"headline":"RDGAs: The Next Chapter in Domain Generation Algorithms","datePublished":"2024-07-17T16:53:39+00:00","dateModified":"2024-12-20T14:08:44+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/rdgas-the-next-chapter-in-domain-generation-algorithms\/"},"wordCount":2442,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/rdgas-the-next-chapter-in-domain-generation-algorithms\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/rdgas-the-next-chapter-in-domain-generation-algorithms-blog-thumbnail-v2.jpg","keywords":["DNS","Domain Name System","DGA","RDGA","Phishing","Malware","XLoader","formbook","Network Security","Cybersecurity"],"articleSection":["Infoblox Threat Intel"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/rdgas-the-next-chapter-in-domain-generation-algorithms\/","url":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/rdgas-the-next-chapter-in-domain-generation-algorithms\/","name":"Registered DGAs - RDGAs change threat actor landscape with Revolver Rabbit & XLoader malware | Infoblox","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/rdgas-the-next-chapter-in-domain-generation-algorithms\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/rdgas-the-next-chapter-in-domain-generation-algorithms\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/rdgas-the-next-chapter-in-domain-generation-algorithms-blog-thumbnail-v2.jpg","datePublished":"2024-07-17T16:53:39+00:00","dateModified":"2024-12-20T14:08:44+00:00","description":"Infoblox Threat Intel exposes registered DGAs (RDGAs), the novel DGAs that our research has found are often used to host phishing and scam sites and deliver malware","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/rdgas-the-next-chapter-in-domain-generation-algorithms\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/threat-intelligence\/rdgas-the-next-chapter-in-domain-generation-algorithms\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/rdgas-the-next-chapter-in-domain-generation-algorithms\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/rdgas-the-next-chapter-in-domain-generation-algorithms-blog-thumbnail-v2.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/rdgas-the-next-chapter-in-domain-generation-algorithms-blog-thumbnail-v2.jpg","width":612,"height":408},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/rdgas-the-next-chapter-in-domain-generation-algorithms\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Infoblox Threat Intel","item":"https:\/\/www.infoblox.com\/blog\/category\/threat-intelligence\/"},{"@type":"ListItem","position":3,"name":"RDGAs: The Next Chapter in Domain Generation Algorithms"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/b6aed8965e3298a0817c16d32c0a67ae","name":"Infoblox Threat Intel","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_397_1714162589-96x96.png","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_397_1714162589-96x96.png","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_397_1714162589-96x96.png","caption":"Infoblox Threat Intel"},"description":"Infoblox Threat Intel is the leading creator of original DNS threat intelligence, distinguishing itself in a sea of aggregators. What sets us apart? Two things: mad DNS skills and unparalleled visibility. DNS is notoriously tricky to interpret and hunt from, but our deep understanding and unique access to the internet's inner workings allow us to track down threat actors that others can't see. We're proactive, not just defensive, using our insights to disrupt cybercrime where it begins. We also believe in sharing knowledge to support the broader security community by publishing detailed research and releasing indicators on GitHub. In addition, our intel is seamlessly integrated into our Infoblox Protective DNS solutions, so customers automatically get its benefits, along with ridiculously low false positive rates.","url":"https:\/\/www.infoblox.com\/blog\/author\/infoblox-threat-intel\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/10346","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/397"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=10346"}],"version-history":[{"count":27,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/10346\/revisions"}],"predecessor-version":[{"id":10872,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/10346\/revisions\/10872"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/10853"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=10346"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=10346"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=10346"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}