It’'s 2008 and I’ve recently stumbled upon a currently active typosquatted portfolio of malware-serving domains successfully impersonating Google further spreading malicious software to hundreds of thousands of unsuspecting users.
In this post I’ll provide actionable intelligence on the infrastructure behind the campaign.
Related malicious domains known to have participated in the campaign:

Article Link: http://feedproxy.google.com/~r/DanchoDanchevOnSecurityAndNewMedia/~3/GgDnJrSmdA0/historical-osint-malware-domains.html