Spoofed Internet Domains And Email Accounts Pose Cyber And Disinformation Risks To Voters | Ron Benvenisti

A “Spoofed Email Domain” is a fake address that can be found at the end of an email message or the name of a website. 

An example would be: billgates@rnlcrosoft[.]com , or ivankatrump@trurnp2020[.]com. Note that the “m” has been replaced with an “r” followed by an “n” to look like an “m” in both domains. In the domain mlcrosoft.com the “i” is also replaced by an “l”.

Please do not reply or click to go to these fake domains!

Spoofed domains and email accounts are leveraged by foreign actors and cybercriminals and can be easily mistaken for legitimate websites or emails. Malicious actors can use spoofed domains and email accounts to disseminate false information; gather valid usernames, passwords, and email addresses; collect personally identifiable information; and spread malware, leading to further compromises and potential financial losses.

Cyber actors set up spoofed domains with slightly altered characteristics of legitimate domains. As in the examples above, a spoofed domain may feature more obvious alternate spellings of a word (“electon” instead of “election”), or use an alternative top-level domain, such as a “[.]com” version of a legitimate “[.] gov” website. Members of the public could unknowingly visit spoofed domains while seeking information regarding the 2020 election. Additionally, cyber actors may use a seemingly legitimate email account to entice the public into clicking on malicious files or links as in the previous examples.

The FBI and CISA urge all members of the American public to critically examine the websites they visit and the emails sent to their personal and business email accounts, in order to seek out reliable and verified information on election information.

RECOMMENDATIONS

  • Verify the spelling of web addresses, websites, and email addresses that look trustworthy but may be close imitations of legitimate election websites.
  • Seek out information from trustworthy sources, verifying who produced the content and considering their intent. The Election Assistance Commission (https://www.eac.gov) provides a vast amount of verified information and resources.
  • Ensure operating systems and applications are updated to the most current versions.
  • Update anti-malware and anti-virus software and conduct regular network scans.
  • Do not enable macros on documents downloaded from an email unless absolutely necessary, and only then, after ensuring the file is not malicious.
  • Disable or remove unneeded software applications.
  • Use strong two-factor authentication if possible, via biometrics, hardware tokens, or authentication apps.
  • Do not open e-mails or attachments from unknown individuals. Do not communicate with unsolicited e-mail senders.
  • Never provide personal information of any sort via e-mail. Be aware that many e-mails requesting your personal information appear to be legitimate.

The FBI is responsible for investigating and prosecuting election crimes, malign foreign influence operations, and malicious cyber activity targeting election infrastructure and other U.S. democratic institutions. CISA helps critical infrastructure owners and operators, including those in the election community, remain resilient against physical and cyber threats. The FBI and CISA provide services and information to uphold the security, integrity, and resiliency of U.S. electoral processes.

VICTIM REPORTING AND ADDITIONAL INFORMATION

The FBI encourages the public to report information concerning suspicious or criminal activity to their local field office (www.fbi.gov/contact-us/field-offices) or to the FBI’s Internet Crime Complaint Center (www.ic3.gov). For additional assistance, best practices, and common terms, please visit the following websites:

This content, and any other content on TLS, may not be republished or reproduced without prior permission from TLS. Copying or reproducing our content is both against the law and against Halacha. To inquire about using our content, including videos or photos, email us at [email protected].

Stay up to date with our news alerts by following us on Twitter, Instagram and Facebook.

**Click here to join over 20,000 receiving our Whatsapp Status updates!**

**Click here to join the official TLS WhatsApp Community!**

Got a news tip? Email us at [email protected], Text 415-857-2667, or WhatsApp 609-661-8668.

2 COMMENTS

  1. Very interesting little tricks. Thanks for sharing this. BTW I looked back at some texts and found one of these types of fake names so it seems to apply to text messages as well. Now I won’t forget to wear my glasses at the computer!

  2. You are correct! These fake addresses can also be in texts, FB, Twitter, WhatsApp, Messenger, etc.

    Also, beware of shortened URLs using tools like Bitly, for example: [https://bit.ly/123abCD]. You have no idea where they may lead.

    Thank you for your important comment!

Comments are closed.