July 24th, 2024

Phish-friendly domain registry ".top" put on notice

ICANN warned Jiangsu Bangning Science & Technology to improve phishing management for the ".top" domain by mid-August 2024, following its high usage in phishing attacks and inadequate responses.

Read original articleLink Icon
ConcernFrustrationSkepticism
Phish-friendly domain registry ".top" put on notice

The Internet Corporation for Assigned Names and Numbers (ICANN) has issued a warning to the Chinese company Jiangsu Bangning Science & Technology Co. Ltd., which operates the ".top" domain registry. The company has until mid-August 2024 to implement effective systems for managing phishing reports and suspending abusive domains, or it risks losing its license to sell domains. This action follows findings that ".top" was the second most common domain suffix used in phishing attacks over the past year, with over 117,000 phishing sites identified among its approximately 2.76 million registered domains. ICANN's letter criticized the registry for its inadequate response to phishing reports and lack of a proper investigation process for DNS abuse. The report from Interisle Consulting Group highlighted a significant increase in phishing sites, particularly those hosted on decentralized networks like the InterPlanetary File System (IPFS). The study noted that bulk registrations of domains for phishing purposes are prevalent, with some registrants acquiring thousands of domains in a short time. ICANN's enforcement actions have decreased in recent years, and many warnings have been linked to registrars failing to pay membership fees. Experts suggest that registrars could reduce phishing registrations by monitoring bulk domain registrations more closely. ICANN's ongoing investigations aim to ensure compliance among registries and registrars, although the organization has faced criticism for its enforcement effectiveness.

AI: What people are saying
The discussion surrounding ICANN's warning to Jiangsu Bangning Science & Technology about the ".top" domain reveals several key concerns and themes.
  • Many users report receiving phishing emails and spam from ".top" domains, indicating widespread abuse.
  • Commenters express skepticism about the effectiveness of ICANN's actions, suggesting that phishers will continue to exploit cheap domains regardless of warnings.
  • There is a general consensus that the low cost of ".top" domains contributes to their popularity among phishers.
  • Some users advocate for stricter regulations on TLDs to prevent abuse, while others argue against the responsibility of registries to police content.
  • Several commenters share personal experiences with phishing attempts linked to ".top" and other low-quality TLDs, highlighting the ongoing issue of online security.
Link Icon 25 comments
By @w-m - 7 months
I have a story on using weird/fishy/phishy TLDs: Recently my colleagues and I started collecting information on all the available compression methods for 3D Gaussian Splatting (3DGS, a popular method for 3d scene representation). There were quite a few works in the area with naming conflicts already, so I thought to give it a unique short name to refer to - and came up with “3dgs.zip”.

A few days later we started putting together a web page, and I noticed that .zip actually is available as a TLD. Impulsively I bought the domain, https://3dgs.zip/, launched it and printed it on a few shirts before heading off to a conference. Felt a bit weird that there is a .zip TLD, but I was in a rush and I didn’t ponder its existence any further.

But strange things started happening: setting up the domain for a GitHub page worked, but in the process downloaded a 0 Byte file called “3dgs.zip”, when submitting content one of the GitHub.com forms. And a few days later colleagues told me they had trouble accessing the site. After some DNS sleuthing and then some back-and-forth with our IT dept, it turned out that our organization has blocked the whole TLD - for every Windows user, out of phishing concerns of people being confused.

I’m no security person, so the reasoning felt a bit weird to me, as I guess the .zip TLD can’t hurt anybody; downloading a .zip might, which you can attach to any link name? But in any case I wasn’t able to find any .zip URL with a purpose, but lots of Reddit posts of angry sysadmins who bemoaned the influx of terrible TLDs with mostly phishing use and vowed to block them all. So they probably have a point in downright blocking the whole TLD.

Now I’m sitting here with my .zip url. Had to revert the page to use github.io, so people in my organization (and similarly thinking ones) would be able to access it. Guess I’m cured for a while, won’t be using any novelty TLDs anytime soon…

By @nulld3v - 7 months
A big reason why .top is used so much is because it is so cheap. Phishers can rotate through many more domains using .top compared to other domains.

IMO this isn't a particularly big problem, it's cool to let people buy cheap domains. It also doesn't really save the phishers that much money. You aren't going to solve the problem by making domains more expensive, it might impact phishers' margins but they will continue phishing.

By @nevi-me - 7 months
This is encouraging. We have a big tender (procurement) scam in our country, and I receive at least 10 different emails daily about fake procurement requests (the central gov database was either leaked, or the criminals are working in tandem with its administrators).

At times I have reported the impersonating domains, and I'd say that registrars have acted on under 5% of my complaints (within reasonable time). If they use a local domain name, it's easier to complain directly with our country's registry administrator.

My problem is often with registrars that are in random countries. It's encouraging that some action is being taken, and I think in future I should also lay complaints with ICANN.

By @bluejekyll - 7 months
This really makes me wonder about the value of TLDs in general. Let’s say that “gmail” is a well known enough name that “gmail.com”, “gmail.org”, …, “gmail.top” should be reserved by default. If that’s the case, then the value of separate TLDs becomes interesting because two companies “abc.com” and “abc.top” would now have competing concerns. It seems like only small companies would then be open to phishing, and large ones would possibly be able to use trademark law across all TLDs. In fact large companies tend to try and reserve their name in all major TLDs.

I’m not really arguing for or against greater or fewer TLDs, but it does seem like an awkward situation.

By @TheCleric - 7 months
Based on the title I thought this was about the band and was very confused.
By @donatj - 7 months
Since when has it been the responsibility of the registry to police the content of its domains?

This feels like a slippery slope from phishing to piracy to censoring unpopular political beliefs.

By @glitcher - 7 months
Strange coincidence, moments ago I just received a phishing SMS about some bogus package that couldn't be delivered attempting to get me to visit a link on a ".top" address!
By @ffhhj - 7 months
Strange that .co doesn't even show up in the list. I have a 3 letter .co similar to another .com domain and constantly receive customer id's and internal communications.
By @iancmceachern - 7 months
Bummer, I was hoping this had something to do with the band
By @Seattle3503 - 7 months
Is there more info on the phishing websites hosted on IPFS? I'm curious how content is forwarded to unaugmented browsers.
By @denysvitali - 7 months
To be fair, it might be beneficial if they don't block them - I have never seen a legitimate use of the .top domain, so if that helps us get rid of the spam (by blocking the whole TLD on our systems) it's probably a win-win situation (?)
By @bmo-at - 7 months
Literally just received some .top spam last night, nothing new there but curiously it was addressed to the mailing list for all students in my department. Very sparse content too: Just a t.co link shortener address, which resolved to a .top domain (interestingly with an invalid https cert instead of going just with http). It was sent from an obviously compromised gmail address. Fellow students in other mailing lists got other shorteners with other domains, all resolving to the same russian ip address. Thats as far as I investigated.
By @kurthr - 7 months
Mother-in-Law just got a smishing text yesterday for a USPS scam.

Luckily, she couldn't remember her username/password (she doesn't have one there) so she didn't enter anything, but I got a call.

The link was on .top

By @reaperducer - 7 months
While I don't disagree with warning .top, I notice in the report that .lol and .bond have higher "Phishing Domain Scores" than .top. Hopefully they got a nastygram, too.
By @tomjen3 - 7 months
I am using a .top domain for my homelab (because it was cheap). How will existing domains be handled, assuming ICAN shuts down the registrar?
By @diego_sandoval - 7 months
An organization like ICANN should not be concerned with the specific uses people are giving to their domain names.

Their mission should be to create a system that makes it convenient for actors to identify each other across the Internet, so that they can communicate arbitrary data. ICANN should be agnostic to the contents of the communications.

By @autoexec - 7 months
Now do the same for .io .site and .cc

I've see tons of phishing from those domains. Even the ones who eventually take down sites that I report, they don't look for other sites/domains from the same scammers or that have the same content, and they don't do anything to stop the same person from getting another domain and then putting the exact same content on it.

I shouldn't be hard for a company to identify most of these scammers. They are not subtle. Very basic automated checks to see what content is being served from new domains based on previously discovered phishing sites could catch a lot of it. Company's just aren't required by law to care so they don't.

Even big companies are terrible when it comes to phishing. I found out recently that for some google sites you can't even report the phishing site to Google without first signing into a google account. Why someone should have to hand over their personal info to Google in order to report a phishing site is beyond me. It's bad enough that Google refuses to respect RFC 2142 and accept reports at an abuse@ address. Internet standards exist to prevent exactly this kind of bullshit.

By @Jerry2 - 7 months
They need to do exact same thing with .xyz TLD. It's gotten so bad that I had to block .xyz on our router.
By @bell-cot - 7 months
Daydream: Browsers and email programs are shipped with "Default Allow" lists, which include only the older & higher-quality TLD's. While users can add whatever TLD's they want to the lists, that default behavior destroys 99% of the value of new & crap-infested TLD's.
By @kgbcia - 7 months
I registered a top domain for ten years , total cost $28.
By @singpolyma3 - 7 months
> The warning comes amid the release of new findings that .top was the most common suffix in phishing websites over the past year, second only to domains ending in “.com.”

And this is why this is bullshit. Imagine them threatening to end .com over this. No? Then why bully others.

By @jusepal - 7 months
How these shady registry handle abuse is why i never use their dirt cheap tld for email. Most corporate firewall either outright reject them or blackhole into oblivion. Best case scenario is auto route to spam folder.

Might be useable as cheap domain used for hobby site, as personal dynamic dns domain but for email, nope.

I'd cough up $10 for .com .net .org and recent popular one the .me .io for best email deliverability instead of saving $5 and wondering whether my outgoing mail would arrive or not.