March 14, 2025 18 minutes minutes read Admin

The GoogleAPIs.com Typosquatting Threat

Understanding Typosquatting

Typosquatting is a form of cybersquatting that targets users who incorrectly type a website address into their browser. This social engineering technique relies on the predictable mistakes people make when manually entering URLs.

Common typosquatting methods include:

  • Simple keyboard typos (pressing adjacent keys)
  • Character omission (forgetting a letter)
  • Character transposition (swapping letters)
  • Character replacement (using similar-looking characters)
  • Domain hyphenation (adding hyphens between words)
  • TLD variation (using .co, .cm instead of .com)

According to a 2015 research, over one-fifth of all .com domain registrations are now typo domains, with the number growing each year. This isn't just annoying – it's potentially devastating for both individuals and organizations.

Google's googleapis.com Domain

Before getting into the findings, let's understand what makes googleapis.com particularly valuable to attackers.

The googleapis.com domain serves as one of the primary endpoints that developers integrate into their applications. This includes high-volume services like:

When developers make API calls to these services, they typically use endpoints like https://domains.googleapis.com or other service-specific subdomains. The domain handles billions of API requests daily from applications worldwide.

A simple example for Google Fonts usage:

<link rel="stylesheet" href="https://fonts.googleapis.com/css?family=Tangerine">

A simple example for Google-hosted Bootstrap and JQuery usage:

<script src="https://ajax.googleapis.com/ajax/libs/bootstrap/5.3.3/js/bootstrap.min.js"></script>
<script src="https://ajax.googleapis.com/ajax/libs/jquery/3.7.1/jquery.min.js"></script>

Keyboard Proximity Search & WHOIS Data

I began looking into potential typosquatting vectors for googleapis.com using keyboard proximity analysis to identify likely typos. Using a combination of algorithm-generated typo permutations and manual analysis of common developer mistakes, I identified a list of high-risk domain variations.

The next step was querying WHOIS servers to determine registration status, ownership patterns, and potential malicious indicators for these domains.

Here's what I found when analyzing key typosquatting domains:

domain registrar registrant creation_date expiration_date last_updated name_servers
gogleapis.com 123-Reg Limited 2014-09-09T09:48:31 2025-09-09T09:48:31 2024-09-10T11:26:32 NS2.HE.NET, NS3.HE.NET, NS4.HE.NET, NS5.HE.NET
googleapis.net Alibaba Cloud Computing Ltd. d/b/a HiChina (www.net.cn) 2024-12-18T00:37:42 2025-12-18T00:37:42 2024-12-18T00:53:02 ARMFAZH.NS.CLOUDFLARE.COM, STELLA.NS.CLOUDFLARE.COM
googleapk.com eName Technology Co.,Ltd. 2010-11-16T14:45:23 2025-11-16T14:45:23 2024-11-02T02:48:30 NS3.DNS.COM, NS4.DNS.COM
googleapjs.com GoDaddy Online Services Cayman Islands Ltd. 2019-08-31T18:04:30 2025-08-31T18:04:30 2024-09-01T11:12:19 NS01.DOMAINCONTROL.COM, NS02.DOMAINCONTROL.COM
gooogleapis.com GoDaddy.com, LLC 2020-02-14T20:02:51 2026-02-14T20:02:51 2025-03-02T18:22:24 NS43.DOMAINCONTROL.COM, NS44.DOMAINCONTROL.COM
googeapis.com GRANSY S.R.O D/B/A SUBREG.CZ NEROSO Inst., s.r.o. 2022-07-18T12:40:02 2025-07-18T12:40:02 2024-06-19T13:45:03 NS.PARKTONS.COM, NS2.PARKTONS.COM
googleapi.com MarkMonitor, Inc. Google LLC 2004-04-02T17:56:34 2026-04-02T16:56:34 2025-03-01T10:21:12 NS1.GOOGLEDOMAINS.COM, NS2.GOOGLEDOMAINS.COM, NS3.GOOGLEDOMAINS.COM, NS4.GOOGLEDOMAINS.COM
googleapis.com MarkMonitor, Inc. Google LLC 2005-01-25T17:52:26 2026-01-25T17:52:26 2024-12-24T10:14:22 NS1.GOOGLE.COM, NS2.GOOGLE.COM, NS3.GOOGLE.COM, NS4.GOOGLE.COM
googlepis.com MarkMonitor, Inc. Google LLC 2016-07-13T18:37:34 2025-07-13T18:37:34 2024-06-11T09:51:33 NS1.GOOGLEDOMAINS.COM, NS2.GOOGLEDOMAINS.COM, NS3.GOOGLEDOMAINS.COM, NS4.GOOGLEDOMAINS.COM
googleapp.com MarkMonitor, Inc. Google LLC 2008-05-15T16:50:26 2025-05-15T16:50:26 2024-04-13T10:12:48 NS1.GOOGLEDOMAINS.COM, NS2.GOOGLEDOMAINS.COM, NS3.GOOGLEDOMAINS.COM, NS4.GOOGLEDOMAINS.COM
googleqpis.com MarkMonitor, Inc. Google LLC 2024-03-13T20:44:37 2026-03-13T20:44:37 2025-03-14T07:45:54 NS1.GOOGLEDOMAINS.COM, NS2.GOOGLEDOMAINS.COM, NS3.GOOGLEDOMAINS.COM, NS4.GOOGLEDOMAINS.COM
gogleapi.com NAMECHEAP INC Privacy service provided by Withheld for Privacy ehf 2024-03-07T16:00:48 2026-03-07T16:00:48 2025-02-05T07:56:30 DNS1.NAMECHEAPHOSTING.COM, DNS2.NAMECHEAPHOSTING.COM
googieapis.com NAMECHEAP INC Privacy service provided by Withheld for Privacy ehf 2017-05-13T23:14:13 2025-05-13T23:14:13 2024-05-03T22:49:43 HAL.NS.CLOUDFLARE.COM, JADE.NS.CLOUDFLARE.COM
gogleapi.com NAMECHEAP INC Privacy service provided by Withheld for Privacy ehf 2024-03-07T16:00:48 2026-03-07T16:00:48 2025-02-05T07:56:30 DNS1.NAMECHEAPHOSTING.COM, DNS2.NAMECHEAPHOSTING.COM
googlrapis.com NAMECHEAP INC Privacy service provided by Withheld for Privacy ehf 2016-03-07T16:54:46 2026-03-07T16:54:46 2025-02-05T07:53:36 DNS1.REGISTRAR-SERVERS.COM, DNS2.REGISTRAR-SERVERS.COM
googapis.com NAMECHEAP INC Privacy service provided by Withheld for Privacy ehf 2016-03-08T07:37:11 2026-03-08T07:37:11 2025-02-06T07:26:39 DNS1.REGISTRAR-SERVERS.COM, DNS2.REGISTRAR-SERVERS.COM
googpeapi.com NameCheap, Inc. 2024-07-05T16:20:48 2025-07-05T16:20:48 2024-07-05T16:31:39 ANGELINA.NS.CLOUDFLARE.COM, EMERSON.NS.CLOUDFLARE.COM
googleapls.com NameSilo, LLC See PrivacyGuardian.org 2019-04-23T03:45:31 2025-04-23T03:45:31 2024-03-26T00:44:20 KALLIE.NS.CLOUDFLARE.COM, VALENTIN.NS.CLOUDFLARE.COM
googleapics.com NameSilo, LLC See PrivacyGuardian.org 2024-11-07T11:00:25 2025-11-07T11:00:25 2024-11-07T11:00:26 NS1.HOST-WW.NET, NS2.HOST-WW.NET
googleapls.com NameSilo, LLC See PrivacyGuardian.org 2019-04-23T03:45:31 2025-04-23T03:45:31 2024-03-26T00:44:20 KALLIE.NS.CLOUDFLARE.COM, VALENTIN.NS.CLOUDFLARE.COM
googleaips.com REGISTER S.P.A. REDACTED FOR PRIVACY 2024-08-26T11:56:57 2025-08-26T11:56:57 2024-08-26T12:07:02 NS1.REGISTER.IT, NS2.REGISTER.IT
googlaepis.com Registrar of Domain Names REG.RU LLC 2017-01-27T07:07:36 2026-01-27T07:07:36 2024-11-06T09:32:53 ISLA.NS.CLOUDFLARE.COM, ROCKY.NS.CLOUDFLARE.COM

Findings

  1. Legitimate Google Domains vs. Typosquats:

    The domains registered by Google LLC through MarkMonitor (googleapis[.]com, googleapi[.]com, googlepis[.]com, googleapp[.]com, googleqpis[.]com) all use Google's nameservers. This is expected as it's possible that Google proactively registers common typos to protect users.

    However, I identified 17 typosquatted variations present in the dataset that aren't likely controlled by Google.

  2. Recently Registered Domains (Potential Threats):

    Several domains were registered in the past year, suggesting active typosquatting campaigns:

    • googleapis[.]net (Dec 2024) - Alibaba Cloud, using Cloudflare nameservers
    • gogleapi[.]com (Mar 2024) - NAMECHEAP, using Namecheap hosting
    • googpeapi[.]com (Jul 2024) - NameCheap, using Cloudflare nameservers
    • googleapics[.]com (Nov 2024) - NameSilo, using Host-WW nameservers
    • googleaips[.]com (Aug 2024) - REGISTER S.P.A., using Register.it nameservers
  3. Long-lived Typosquats:

    Some typosquatting domains have been active for surprisingly long periods:

    • gogleapis[.]com (since 2014)
    • googleapk[.]com (since 2010)

    These long-established domains may have built significant traffic over time.

  4. Very Recent Activity:

    The domain googleqpis[.]com was updated on March 14, 2025 (today!)

My Experiment

To quantify the real-world impact of typosquatting against googleapis.com, I conducted a controlled experiment:

Methodology:

The particular typo I targeted (.cm instead of .com) has been documented as a frequent typosquatting vector. According to research by Brian Krebs, ..cm typosquatting sites received over 12 million visits in just the first quarter of 2018.

  1. I registered the domain googleapis[.]cm (Cameroon TLD)
  2. Implemented a Matomo instance to track visitors
  3. Created a minimal PHP endpoint, using Matomo PHP SDK, at *.googleapis[.]cm

Results:

Within just 24 hours, my typosquatted domain received connections from several surprising sources:

  • A United States-based medical service organization that provides services to more than 20,000 healthcare organizations
  • An Indonesian government organization
  • A water purification facility
  • A media publication tool
  • A small social media website
  • An online education platform

The affected organizations have been notified about the vulnerability in their code.

Exploitation Methods

Had a malicious actor controlled any typosquatted variant of googleapis.com—whether through TLD confusion (.cm, .co, .net), character omission (googleapi.com), character insertion (gooogleapis.com), or character transposition (googelapis.com)—they could exploit any website that accidentally referenced these misspelled domains in their code. These attack vectors aren't limited to the .cm TLD example from my experiment; they apply to any typosquatted variant that appears in a website's HTML, CSS, or JavaScript. Here's how attackers could exploit different types of mistyped Google API endpoints:

  1. For fonts.googleapis[.]cm (CSS resources): Attackers controlling this domain could return weaponized CSS using attribute selectors to exfiltrate sensitive data from form fields and page content, effectively creating data-stealing stylesheets. They might deploy specially crafted font files with malicious ligatures that capture and leak information when specific character combinations are displayed, or implement CSS-based keyloggers that track user input through clever selector combinations and background image requests that encode captured keystrokes in the requested URL parameters.

  2. For ajax.googleapis[.]cm (JavaScript libraries): By controlling this domain, attackers could serve compromised versions of popular JavaScript libraries like jQuery or Angular with embedded backdoors or tracking code that executes in the context of the victim site. These malicious scripts could harvest form data, cookies, and authentication tokens; manipulate the DOM to alter page content, insert convincing phishing forms, or redirect users to fraudulent sites; and even inject cryptojacking scripts that silently mine cryptocurrency using visitors' CPU resources, all while appearing to come from a trusted Google domain.

  3. For storage.googleapis[.]cm: Controlling this domain would allow attackers to serve malicious executables, libraries, or container images in place of legitimate software that developers and applications expect to download from Google's storage. This creates a particularly dangerous vector for software supply chain attacks where deployment pipelines, CI/CD systems, or automated update mechanisms unknowingly pull and integrate compromised packages, potentially affecting thousands of downstream systems and providing persistent access that survives beyond the initial compromise.

The impact of such an attack could be especially severe as the malicious code would execute with the privileges of the trusted website domain, bypassing same-origin policy protections. For websites handling sensitive information—like the healthcare organization in my findings—this could lead to HIPAA violations and exposure of protected health information.

Conclusion

A single mistyped character in a domain name can lead to data breaches, credential theft, and malware distribution. The financial and reputational damage from such attacks can be enormous, especially when they impact critical infrastructure or healthcare organizations.