T1583.001

Domains

Adversaries may acquire domains to use during targeting. Domain names are acquired to support phishing campaigns, drive-by compromise delivery, and command and control infrastructure. Adversaries frequently register domains that visually resemble legitimate organizations using typosquatting, homoglyphs, internationalized domain names (IDNs), or different top-level domains. They may also acquire expired domains with pre-existing trust reputation. In cloud environments, adversaries with compromised credentials may use services like AWS Route53 to register domains and create hosted zones pointing to attacker-controlled infrastructure. Detection focuses on three pillars: (1) identifying queries to lookalike domains in DNS telemetry, (2) detecting cloud API calls that register or modify domain infrastructure in compromised environments, and (3) hunting for newly registered domains with structural similarity to organizational assets in network traffic.

Microsoft Sentinel / Defender
kusto
// T1583.001 - Domain Acquisition Detection
// Pillar 1: DNS queries to suspicious lookalike or homoglyph domains (requires DNS Analytics connector)
let SuspiciousKeywords = dynamic([
  "-login-", "-signin-", "-secure-", "-verify-", "-account-", "-update-", "-portal-",
  "paypa1", "paypai", "micros0ft", "rnicros0ft", "g00gle", "g0ogle", "arnazon",
  "faceb00k", "linkedln", "0utlook", "suppport", "accoount", "verifyy"
]);
let SuspiciousTLDs = dynamic(["xyz", "top", "club", "online", "site", "tech", "live", "ws", "cc", "pw"]);
DnsEvents
| where TimeGenerated > ago(24h)
| where ResultCode == 0
| where Name has_any (SuspiciousKeywords)
    or Name matches regex @"[\u0400-\u04FF]"  // Cyrillic homoglyphs
    or Name matches regex @"[\u0370-\u03FF]"  // Greek homoglyphs
    or Name matches regex @"[\u4E00-\u9FFF]"  // CJK characters in domain
    or extract(@"\.([a-z]{2,8})$", 1, Name) in (SuspiciousTLDs)
| extend DomainAge = "unknown"  // enrich via TI feed if available
| extend MatchedKeyword = tostring(set_intersect(dynamic([]), SuspiciousKeywords))
| project TimeGenerated, Computer, ClientIP, QueryName=Name, ResolvedIPs=IPAddresses, QueryType
| sort by TimeGenerated desc
| union (
    // Pillar 2: Cloud domain registration - detect Route53 / Azure DNS zone creation (potential compromised cloud account)
    AzureActivity
    | where TimeGenerated > ago(24h)
    | where OperationNameValue in~ (
        "MICROSOFT.NETWORK/DNSZONES/WRITE",
        "MICROSOFT.NETWORK/DNSZONES/A/WRITE",
        "MICROSOFT.NETWORK/DNSZONES/CNAME/WRITE"
      )
      or (OperationNameValue contains "DNS" and ActivityStatusValue =~ "Succeeded")
    | extend CallerIdentity = Caller
    | extend ResourceName = tostring(split(ResourceId, "/")[-1])
    | project TimeGenerated, CallerIdentity, OperationNameValue, ResourceName, ActivityStatusValue, ResourceGroup, SubscriptionId
    | extend Computer="AzureActivity", ClientIP=CallerIdentity, QueryName=ResourceName, ResolvedIPs="", QueryType=OperationNameValue
)
| sort by TimeGenerated desc
medium severity medium confidence

Data Sources

Network Traffic: DNS Resolution Cloud Service: Cloud Service Modification Azure Activity Logs DNS Analytics connector

Required Tables

DnsEvents AzureActivity

False Positives

  • Legitimate third-party SaaS products that use hyphenated domain naming conventions (e.g., acme-login.vendor.com patterns)
  • Security awareness phishing simulation platforms (KnowBe4, Proofpoint Security Awareness) that register lookalike domains for training campaigns
  • Development and QA environments that create DNS zones in Azure for staging domains that mirror production naming
  • CDN and cloud provider subdomains that contain keywords like 'secure' or 'login' as part of legitimate infrastructure (e.g., secure.cdn-provider.com)
  • VPN and zero-trust vendors (Zscaler, Netskope, Cloudflare) whose traffic may resolve through domains containing security-related keywords

Unlock Pro Content

Get the full detection package for T1583.001 including response playbook, investigation guide, and atomic red team tests.

Response PlaybookInvestigation GuideHunting QueriesAtomic Red Team TestsTuning Guidance

Related Detections