Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Edge Threat Monitor

09:00 AM
Kacy Zurkus
Kacy Zurkus
Threat Monitor
Connect Directly

Domain Fraud on the Upswing

New TLDs has given rise to the increased number of fraudsters spinning up fake domains.

Cybercriminals have been leveraging the privacy features extended to consumers in regulations such as GDPR, because they allow them to remain anonymous and register for fraudulent domains, according to new research from Proofpoint.

In the recently published report, "2019 Domain Fraud Report," Proofpoint researchers found one in every four fraudulent domains that were registered have security certificates and 90% are active on a live server. Additionally, over 15% of fake domains have mail exchanger records.

An alarming 85% of top retail brands have identified fraudulent domains selling counterfeit versions of their products, which poses an obvious threat to businesses, the report points out. To create these "look-alike" domains, fraudsters are prone to using Chengdu West Dimension Digital, NameSilo, Public Domain Registry, GoDaddy as their registrars of choice. 

These fraudulent domains are able to go largely undetected because they use the same top-level domains (TLDs), registrars, and Web servers as legitimate businesses. Researchers found the advent of new TLDs in 2018, such as .app and .icu, has given rise to the increased number of fraudsters spinning up fake domains.

According to the report, TLDs "provided new opportunities for the registration of fraudulent domains. Our research suggests that attackers rushed to register domain names with the new TLDs. These fraudulent domains resembled '.com' domains already owned by top brands."

Kacy Zurkus is a cybersecurity and InfoSec freelance writer as well as a content producer for Reed Exhibition's security portfolio. Zurkus is a regular contributor to Security Boulevard and IBM's Security Intelligence. She has also contributed to several publications, ... View Full Bio


Recommended Reading:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Building Cybersecurity Strategies in Sub-Saharan Africa

Filmed for Dark Reading News Desk at Black Hat Virtual.

LAURA TICH: We have that imbalance, where the big organizations are more protected, where the smaller ones -- which are the most common businesses in the region -- they are least protected... Sometimes they do get the tools, they do get the funding to buy some critical tools, but there's a lack of skills to handle or people who understand how to work those tools. So there are a lot of factors that contribute to our growth -- or lack thereof -- in the cybersecurity industry.


Name That Toon: 'Rise' and Shine
Flash Poll