Back to Case Lab

Case 04 / Domain / CTI

Phishing domain chain

Read a phishing claim as a chain: short link, lookalike domain, passive DNS, certificate traces, and page similarity.

Real-case basis: Citizen Lab analysis of phishing and disinformation infrastructure.

Intermediate35-55 minCitizen Labphishingdomainpassive DNS
01

Data package

01

A message that appears to be a security warning

02

A short URL, redirect chain, and visible login page

03

WHOIS/RDAP, passive DNS, IP, and certificate traces

04

Similar infrastructure from related campaigns

02

Task

01

Map the link and redirect chain without logging in or submitting data.

02

Compare the lookalike domain with the real service domain.

03

Assess whether IP, timing, and content patterns support campaign linkage.

03

Hint

01

Short links hide the destination. Expand them through safe or passive methods.

02

Lookalike domains may use a different TLD, punycode, or a single changed character.

03

A shared IP is not attribution by itself.

04

Answer key

01

The chain should be shown from message to short link to lookalike domain to infrastructure trace.

02

Citizen Lab connected domain, message, and infrastructure evidence to explain campaign context.

03

A good report focuses on risk and defensive handling, not live interaction.

05

Weak analysis example

The link looks like a security warning, so the user should open it and reset the password.

06

Careful report example

The link was not clicked live. Passive sources show a redirect to a domain that does not match the real service. Shared infrastructure and timing support phishing risk. The user should avoid the link and report it through the proper security channel.