Plenty of Phish Trust and Gtlds

- 7 mins read

Introduction

For some time now, I’ve expected the introduction of new top level domains to confuse the general public. When users are confused, they’re more easily manipulated, making them more likely to fall for age old tricks like phishing attacks.

New gTLDs

It’s been almost 9 years since the announcement below from ICANN came out regarding new top level domains, meaning there would be many more options than the traditional .com, .org, .net, .biz, .gov, .edu, etc.

ICANN will soon begin a global campaign to tell the world about this dramatic change in Internet names and to raise awareness of the opportunities afforded by new gTLDs. Applications for new gTLDs will be accepted from 12 January 2012 to 12 April 2012 source.

Now we’re in the year 2020, and I’d say that the nontechnical community still does not understand how domain names work, or what new gTLDs even are. Many new domain extensions have been released, but how businesses and individuals are choosing to use them is still not very clear. Are businesses supposed to use .support for their help desk, and .careers or .jobs for their hiring pages? Or are they just supposed to use .com still?

To get an idea of what extensions are available, take a look at Wikipedia’s List of Internet Top Level Domains, primarily the ICANN-era generic top-level domains. There you’ll find the English language domains listed alphabetically in tables indicating their target market, restrictions, registry, etc.

Domain Table
Figure 1: Partial table of English language generic top-level domains beginning with ‘C’.

Traditional Phishing

When educating users about what to look for in order to identify a phishing attack, things like SSL certificates and valid domain names have been at the top of the list. In the past it wasn’t typical for phishing sites to pay to obtain an SSL certificate, so we told users to check for the lock in the url bar. It was also common for phishing sites to use misspellings, or modified versions (url padding) of company domain names with the .com extension in order to gain a user’s trust. This means things like changing wellsfargo to wells-fargo, or wells-fargo-bank. In certain instances the url bar on mobile sites is too short to even display an entire domain name, which creates additional problems.

TLDs

According to Phish Labs the majority of phishing sites are compromised hosts, and thus use valid domains. This accounts for the majority of phishing domains still being .com extensions. Of course, if a domain is compromised then there isn’t much to do from a user’s perspective, as the site will likely appear valid in every way.

Historically, most phishing sites have been hosted on legitimate domains that are compromised, rather than domains specifically registered by phishers. As a result, the breakdown of TLDs used for phishing sites has closely mirrored that of the general website population source.

SSL Certificates

With the introduction of free certificate authorities such as LetsEncrypt, the lock in a user’s browser now only instills in them a false confidence. Phishing sites no longer need to pay for this certificate, and there is no protection. Users need to be aware that the lock means an encrypted connection to a site, not that the site itself is valid or secure in any way. The majority of users do not know how to check the certificate authority, and don’t know the difference between LetsEncrypt and DigiCert.

In 2018 threat actors continued to abuse SSL certificates to bypass browser filtering and add credibility to phishing sites source.

DigiCert Price
Figure 2: DigiCert’s cheapest certificate is $207, a big investment for a throwaway phishing site.

LetsEncrypt Price
Figure 3: LetsEncrypt is free, which is great for privacy overall, but SSL certs do not validate a site’s identity.

Modern Phishing

New forms of phishing attacks have emerged as a result of all these new gTLD’s. These extensions can be used to gather specific information from victims. A few hypothetical examples can be found below.

gTLD Phishing

The number of phishing sites observed on gTLDs more than doubled last year, and their share of total phishing volume rose from 5% to 8% source.

Plausible Attack Scenarios

The numerous amount of new domain extensions allow for a lot of creativity now when creating a phishing campaign. There are many industry specific domains that can be purchased to manipulate users in a particular industry (see World Cup example below). I can also imagine certain extensions being used across various industries to steal sensitive information.

Identity Theft

I see the extensions .careers, and .jobs as being particularly vulnerable to collect information by creating phishing sites targeting job applicants for a particular business.

Credential Harvesting

It seems also that .security, .shipping, .support, .review, .vote and .legal could all be used to manipulate users into providing their account credentials. For instance, a spear phishing campaign using the .legal extension notifying users that they must login to their account and accept a new terms of service agreement in order to continue using a particular site. The .shipping extension could be used to trick users into providing their account credentials thinking that they’re logging into a site to track an order. The number of scams that can be run is limited only by one’s imagination.

Anonymous Domain Registration and Hosting

For the purposes of this article I think it’s important to point out that domains can be registered, and hosting can be purchased, completely anonymously by using services such as Njalla. Njalla is accessible anonymously via the Tor Network at njalladnspotetti.onion, and individuals can pay for these services anonymously using crypto currencies. This means the owner of a site is difficult or even impossible to determine, which is ideal for any criminal.

Njalla
Figure 4: Njalla offers anonymous domain registration and hosting plans.

World Cup Example

There have been instances of gTLD’s being used for industry specific phishing attacks already. One example can be found during the 2018 World Cup. Domains specific to the soccer industry, and the World Cup itself, were being registered and used to phish for sensitive information.

Well-designed website interfaces featuring stolen logos are created to dupe users into sharing personal and financial information. To seem more credible, cybercriminals are registering domain names with keywords like world, worldcup, Russia, and FIFA source.

Remediation

For Users

There are a couple things that the technically literate crowd can use to help easily help identify a phishing site from a legitimate one. Educating the masses on these techniques may be imperative as new domain extensions become more common in the future.

Whois

If users are educated enough to utilize whois info in order to determine who registered a particular domain, they may find that the entity who registered the .careers extension is not the same entity that registered the .com extension, and this is a major red flag.

Certificate Authority

As I previously mentioned, if users are educated enough to determine who issued the site’s SSL certificate, they may find that the .careers extension is LetsEncrypt, while the .com is DigiCert. Any major entity using LetsEncrypt would be a major red flag in my eyes.

For Businesses

You may be wondering, how a company can register all extensions related to their brand to protect themselves from such an attack? Register your trademark with the Trademark Clearing House. For $150 per trademark a business is given some significant protections.

  • Registration and verification of the trademark record
  • Sunrise services for all new gTLD Sunrise periods, not just one
  • Trademark claims services for all new gTLDs, not just one
  • Linking up to 10 domain name labels to the registration
  • Ongoing Notifications
  • source

Conclusion

The implementation of so many new domain name extensions opens up the potential for a lot of creative phishing campaigns. The world is still getting used to all these new domain names, and the way that they’re being put into practice is still not clearly defined. For instance, nike.shoes simply redirects to nike.com, and peets.coffee redirects to peets.com. However, I believe the intent of these new domain extensions is not to have them all redirect to .com. The intent is that industry specific domains will be used within particular industries, and extensions like .careers and .support will be used by different departments of larger companies for specific use cases. None the less, even though it’s been 9 years now this is all still very new. Things are still rather confusing for businesses and users alike. When there is confusion, there is room for exploitation. I’ve been anticipating an exploitation of this confusion for a long time years now, we’ve seen it happen already, and I expect it to happen a whole lot more before things get figured out.