The risk of running obsolete code and hardware was highlighted after attackers exfiltrated data from a UK supplier of high-security fencing for military bases. The initial entry point? A Windows 7 PC.β¦
Microsoft has reminded users that TLS 1.0 and 1.1 will soon be disabled by default in Windows.β¦
Webinar It's sometimes easy to be lulled into a sense of false security and imagine that your organization or business will not become a target of highly professional cybercriminals, hacktivists and even nation-state actors. But the threat posed by DDoS attacks is very much on the rise.β¦
Nearly four weeks after the Police Service of Northern Ireland (PSNI) published data on 10,000 employees in a botched response to a Freedom of Information request, another two men, aged 21 and 22, have been released on bail after being arrested under the Terrorism Act.β¦
Infosec in brief The latest round of Apple's Security Research Device (SRD) program is open, giving security researchers a chance to get their hands on an unlocked device β and Apple's blessing to attack it and test its security capabilities.β¦
Video Efforts by cops to seize and shut down encrypted messaging apps favored by criminals, and then mine their conversations for evidence, appear to have led to more arrests β plus the seizure of about 2.7 tonnes of cocaine.β¦
Customers of cloudy identification vendor Okta are reporting social engineering attacks targeting their IT service desks in attempts to compromise user accounts with administrator permissions.β¦
Domain names ending in β.USβ β the top-level domain for the United States β are among the most prevalent in phishing scams, new research shows. This is noteworthy because .US is overseen by the U.S. government, which is frequently the target of phishing domains ending in .US. Also, .US domains are only supposed to be available to U.S. citizens and to those who can demonstrate that they have a physical presence in the United States.
.US is the βcountry code top-level domainβ or ccTLD of the United States. Most countries have their own ccTLDs: .MX for Mexico, for example, or .CA for Canada. But few other major countries in the world have anywhere near as many phishing domains each year as .US.
Thatβs according to The Interisle Consulting Group, which gathers phishing data from multiple industry sources and publishes an annual report on the latest trends. Interisleβs newest study examined six million phishing reports between May 1, 2022 and April 30, 2023, and found 30,000 .US phishing domains.
.US is overseen by the National Telecommunications and Information Administration (NTIA), an executive branch agency of the U.S. Department of Commerce. However, NTIA currently contracts out the management of the .US domain to GoDaddy, by far the worldβs largest domain registrar.
Under NTIA regulations, the administrator of the .US registry must take certain steps to verify that their customers actually reside in the United States, or own organizations based in the U.S. But Interisle found that whatever GoDaddy was doing to manage that vetting process wasnβt working.
βThe .US βnexusβ requirement theoretically limits registrations to parties with a national connection, but .US had very high numbers of phishing domains,β Interisle wrote. βThis indicates a possible problem with the administration or application of the nexus requirements.β
Dean Marks is emeritus executive director for a group called the Coalition for Online Accountability, which has been critical of the NTIAβs stewardship of .US. Marks says virtually all European Union member state ccTLDs that enforce nexus restrictions also have massively lower levels of abuse due to their policies and oversight.
βEven very large ccTLDs, like .de for Germany β which has a far larger market share of domain name registrations than .US β have very low levels of abuse, including phishing and malware,β Marks told KrebsOnSecurity. βIn my view, this situation with .US should not be acceptable to the U.S. government overall, nor to the US public.β
Marks said there are very few phishing domains ever registered in other ccTLDs that also restrict registrations to their citizens, such as .HU (Hungary), .NZ (New Zealand), and .FI (Finland), where a connection to the country, a proof of identity, or evidence of incorporation are required.
βOr .LK (Sri Lanka), where the acceptable use policy includes a βlock and suspendβ if domains are reported for suspicious activity,β Marks said. βThese ccTLDs make a strong case for validating domain registrants in the interest of public safety.β
Sadly, .US has been a cesspool of phishing activity for many years. As far back as 2018, Interisle found .US domains were the worst in the world for spam, botnet (attack infrastructure for DDOS etc.) and illicit or harmful content. Back then, .US was being operated by a different contractor.
In response to questions from KrebsOnSecurity, GoDaddy said all .US registrants must certify that they meet the NTIAβs nexus requirements. But this appears to be little more than an affirmative response that is already pre-selected for all new registrants.
Attempting to register a .US domain through GoDaddy, for example, leads to a U.S. Registration Information page that auto-populates the nexus attestation field with the response, βI am a citizen of the US.β Other options include, βI am a permanent resident of the US,β and βMy primary domicile is in the US.β It currently costs just $4.99 to obtain a .US domain through GoDaddy.
GoDaddy said it also conducts a scan of selected registration request information, and conducts βspot checksβ on registrant information.
βWe conduct regular reviews, per policy, of registration data within the Registry database to determine Nexus compliance with ongoing communications to registrars and registrants,β the company said in a written statement.
GoDaddy says it βis committed to supporting a safer online environment and proactively addressing this issue by assessing it against our own anti-abuse mitigation system.β
βWe stand against DNS abuse in any form and maintain multiple systems and protocols to protect all the TLDs we operate,β the statement continued. βWe will continue to work with registrars, cybersecurity firms and other stakeholders to make progress with this complex challenge.β
Interisle found significant numbers of .US domains were registered to attack some of the United Statesβ most prominent companies, including Bank of America, Amazon, Apple,Β AT&T, Citi, Comcast, Microsoft, Meta, and Target.
βIronically, at least 109 of the .US domains in our data were used to attack the United States government, specifically the United States Postal Service and its customers,β Interisle wrote. β.US domains were also used to attack foreign government operations: six .US domains were used to attack Australian government services, six attacked Greatβs Britainβs Royal Mail, one attacked Canada Post, and one attacked the Denmark Tax Authority.β
The NTIA recently published a proposal that would allow GoDaddy to redact registrant data from WHOIS registration records. The current charter for .US specifies that all .US registration records be public.
Interisle argues that without more stringent efforts to verify a United States nexus for new .US domain registrants, the NTIAβs proposal will make it even more difficult to identify phishers and verify registrantsβ identities and nexus qualifications.
In a written statement, the NTIA said DNS abuse is a priority issue for the agency, and that NTIA supports βevidence-based policymaking.β
βWe look forward to reviewing the report and will engage with our contractor for the .US domain on steps that we can take not only to address phishing, but the other forms of DNS abuse as well,β the statement reads.
Interisle sources its phishing data from several places, including the Anti-Phishing Working Group (APWG), OpenPhish, PhishTank, and Spamhaus. For more phishing facts, see Interisleβs 2023 Phishing Landscape report (PDF).β
Update, Sept. 5, 1:44 p.m. ET: Updated story with statement provided today by the NTIA.
Webinar Any organization can lose service, revenue, and reputation as a result. If you are particularly unlucky, a DDoS attack can defenestrate your network defences. You may find yourself facing an cyber criminal who wants to take your business for everything it's got - not an attractive prospect in anybody's book.β¦
Even ransomware operators make mistakes, and in the case of ransomware gang the Key Group, a cryptographic error allowed a team of security researchers to develop and release a decryption tool to restore scrambled files.β¦
Russia's Sandworm crew is using an Android malware strain dubbed Infamous Chisel to remotely access Ukrainian soldiers' devices, monitor network traffic, access files, and steal sensitive information, according to a Five Eyes report published Thursday.β¦