Techolac - Computer Technology News
  • Home
  • Internet
  • Business
  • Computers
  • Gadgets
  • Lifestyle
  • Phones
  • Travel
  • Tech
  • More
    • Automotive
    • Education
    • Entertainment
    • Health
    • SEO
    • Linux
    • WordPress
    • Home Improvement
    • How to
    • Games
No Result
View All Result
  • Home
  • Internet
  • Business
  • Computers
  • Gadgets
  • Lifestyle
  • Phones
  • Travel
  • Tech
  • More
    • Automotive
    • Education
    • Entertainment
    • Health
    • SEO
    • Linux
    • WordPress
    • Home Improvement
    • How to
    • Games
No Result
View All Result
Techolac - Computer Technology News
No Result
View All Result
Home Internet

Contextualizing Security Alerts with WHOIS History to Combat Alert Fatigue

by Editorial Staff
October 21, 2020
in Internet
Reading Time: 3 mins read

Security information and event management (SIEM) and other cybersecurity technologies notify security teams about suspicious activities in their networks. Each week, organizations receive thousands of SIEM security alerts, resulting in alert fatigue for security professionals. The key could be to give context to these alerts so that the majority that gets through is valid and reliable. Integrating WHOIS history databases such as domainnamestat.com/whois-history into security platforms could aid in contextualizing security alerts.

In this post, we illustrated how domain ownership history could give context to security alerts. And by doing so, it allows for a more efficient prioritization.

Table of Contents
Contextualizing a Cerber Ransomware IoC with WHOIS History
Addressing Cyber Alert Fatigue with Domain History

Contextualizing a Cerber Ransomware IoC with WHOIS History

Cerber is a ransomware-as-a-service (RaaS) technology, which means that attackers don’t have to develop their own versions of the ransomware to launch an attack. Instead, they can use Cerber for a fee, in this case, as much as 40% of the ransom paid by the victim to the ransomware’s developer.

In 2017, the domain hjaoopoa[.]top was tagged as a Cerber indicator of compromise (IoC). Historical WHOIS records indicate that the domain’s registrant at that time was someone named “R. Lecomte” with an address in Massachusetts, U.S. The email address ******bobl@rothtec[.]com and a phone number ending in “622” were also indicated in the domain history record.

Security teams can use domain history data to give context to security alerts that contain the registrant name or email address in their historical WHOIS records. That way, security alerts involving domains whose domain ownership history indicates that they were owned or once owned by a suspected threat actor are given priority.

A search on the WHOIS history database using the email address ******bobl@rothtec[.]com yielded 1,052 domain names. The email address appeared in their domain name history. Such connection means that these domains are also possibly involved in malicious activities. In fact, dozens of these domains have been tagged “malicious” or “suspicious” by various blacklisting engines.

These specific domains, among others, were either reported for phishing, spamming, or malware activities:

  • btcmarkets[.]top
  • bulkcrypt[.]top
  • cryptoboom[.]top
  • cryptosinvestment[.]top
  • cyberbestcrypt[.]top
  • desksinvestment[.]top
  • hometowergop[.]top
  • sonyponytopc[.]top
  • guidemoney[.]top
  • libercrypt[.]top
  • libertcrypt[.]top

Addressing Cyber Alert Fatigue with Domain History

Alert fatigue among cybersecurity professionals occurs mostly due to the sheer number of alerts generated by security systems such as SIEM and threat intelligence platforms. And because of the significant number of false positives, cyber professionals may sometimes have to ignore alerts and that can be a huge problem. What if a severe threat gets through because of alert fatigue?

An effective way to fight off alert fatigue is to contextualize alerts and allow the context gained to determine their importance. SIEM systems, threat intelligence platforms, and other security solutions can be set to check the WHOIS history database for a domain’s connection with known threat actors or IoCs. If a connection is established, then priority is given to the particular alert. Security professionals can then deal with alerts according to the importance determined by the security platform.

In our Cerber example above, a high-priority rating can be given to security alerts involving domains connected to the IoC. To recall, a connection was established through the registrant’s email address indicated in historical WHOIS records.

Note that any cybersecurity alert associated with ransomware IoCs should be dealt with immediately, as such a cybercrime can cost organizations a lot of money. On the other hand, their reputation is also at risk since data breach could be involved.

A WHOIS history database can enrich security platforms and give context to the security alerts they generate. Providing contextual information to alerts can help determine their importance so cyber professionals would know what to address first. With this strategy, false positives are lessened, and ultimately, alert fatigue can be reduced.

Related Posts

veo camera

Veo Camera Alternatives Recording and Analysing Sports Matches

May 8, 2025
liner ai

Liner AI: The AI Search Engine and Alternatives

May 8, 2025

Google Vids Competitors For Online Video Creator Editor

May 8, 2025

SpyDialer Reverse Phone Lookup and Competitors

May 7, 2025

Best FastPeopleSearch Alternatives and Similar Websites

May 7, 2025

11 Best 4chan Alternatives For Imageboards in 2025

February 24, 2025

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recent Articles

  • Veo Camera Alternatives Recording and Analysing Sports Matches
  • Best 10 WizTree Alternatives for Disk Space Analyzer
  • Liner AI: The AI Search Engine and Alternatives
  • Webcam Toy: Complete Guide to Features & Alternatives
  • Google Vids Competitors For Online Video Creator Editor
  • 8 Best Free GameCube Emulators in 2025
  • SpyDialer Reverse Phone Lookup and Competitors

Related Posts

None found

  • DashTech
  • TechDaddy
  • Terms and Conditions
  • Disclaimer
  • Write for us

© Techolac © Copyright 2019 - 2022, All Rights Reserved.

No Result
View All Result
  • Home
  • Internet
  • Business
  • Computers
  • Gadgets
  • Lifestyle
  • Phones
  • Travel
  • Tech
  • More
    • Automotive
    • Education
    • Entertainment
    • Health
    • SEO
    • Linux
    • WordPress
    • Home Improvement
    • How to
    • Games

© Techolac © Copyright 2019 - 2022, All Rights Reserved.