Phish-friendly domain registry ".top" put on notice
ICANN warned Jiangsu Bangning Science & Technology to improve phishing management for the ".top" domain by mid-August 2024, following its high usage in phishing attacks and inadequate responses.
Read original articleThe Internet Corporation for Assigned Names and Numbers (ICANN) has issued a warning to the Chinese company Jiangsu Bangning Science & Technology Co. Ltd., which operates the ".top" domain registry. The company has until mid-August 2024 to implement effective systems for managing phishing reports and suspending abusive domains, or it risks losing its license to sell domains. This action follows findings that ".top" was the second most common domain suffix used in phishing attacks over the past year, with over 117,000 phishing sites identified among its approximately 2.76 million registered domains. ICANN's letter criticized the registry for its inadequate response to phishing reports and lack of a proper investigation process for DNS abuse. The report from Interisle Consulting Group highlighted a significant increase in phishing sites, particularly those hosted on decentralized networks like the InterPlanetary File System (IPFS). The study noted that bulk registrations of domains for phishing purposes are prevalent, with some registrants acquiring thousands of domains in a short time. ICANN's enforcement actions have decreased in recent years, and many warnings have been linked to registrars failing to pay membership fees. Experts suggest that registrars could reduce phishing registrations by monitoring bulk domain registrations more closely. ICANN's ongoing investigations aim to ensure compliance among registries and registrars, although the organization has faced criticism for its enforcement effectiveness.
- Many users report receiving phishing emails and spam from ".top" domains, indicating widespread abuse.
- Commenters express skepticism about the effectiveness of ICANN's actions, suggesting that phishers will continue to exploit cheap domains regardless of warnings.
- There is a general consensus that the low cost of ".top" domains contributes to their popularity among phishers.
- Some users advocate for stricter regulations on TLDs to prevent abuse, while others argue against the responsibility of registries to police content.
- Several commenters share personal experiences with phishing attempts linked to ".top" and other low-quality TLDs, highlighting the ongoing issue of online security.
A few days later we started putting together a web page, and I noticed that .zip actually is available as a TLD. Impulsively I bought the domain, https://3dgs.zip/, launched it and printed it on a few shirts before heading off to a conference. Felt a bit weird that there is a .zip TLD, but I was in a rush and I didn’t ponder its existence any further.
But strange things started happening: setting up the domain for a GitHub page worked, but in the process downloaded a 0 Byte file called “3dgs.zip”, when submitting content one of the GitHub.com forms. And a few days later colleagues told me they had trouble accessing the site. After some DNS sleuthing and then some back-and-forth with our IT dept, it turned out that our organization has blocked the whole TLD - for every Windows user, out of phishing concerns of people being confused.
I’m no security person, so the reasoning felt a bit weird to me, as I guess the .zip TLD can’t hurt anybody; downloading a .zip might, which you can attach to any link name? But in any case I wasn’t able to find any .zip URL with a purpose, but lots of Reddit posts of angry sysadmins who bemoaned the influx of terrible TLDs with mostly phishing use and vowed to block them all. So they probably have a point in downright blocking the whole TLD.
Now I’m sitting here with my .zip url. Had to revert the page to use github.io, so people in my organization (and similarly thinking ones) would be able to access it. Guess I’m cured for a while, won’t be using any novelty TLDs anytime soon…
IMO this isn't a particularly big problem, it's cool to let people buy cheap domains. It also doesn't really save the phishers that much money. You aren't going to solve the problem by making domains more expensive, it might impact phishers' margins but they will continue phishing.
At times I have reported the impersonating domains, and I'd say that registrars have acted on under 5% of my complaints (within reasonable time). If they use a local domain name, it's easier to complain directly with our country's registry administrator.
My problem is often with registrars that are in random countries. It's encouraging that some action is being taken, and I think in future I should also lay complaints with ICANN.
I’m not really arguing for or against greater or fewer TLDs, but it does seem like an awkward situation.
This feels like a slippery slope from phishing to piracy to censoring unpopular political beliefs.
Luckily, she couldn't remember her username/password (she doesn't have one there) so she didn't enter anything, but I got a call.
The link was on .top
Their mission should be to create a system that makes it convenient for actors to identify each other across the Internet, so that they can communicate arbitrary data. ICANN should be agnostic to the contents of the communications.
I've see tons of phishing from those domains. Even the ones who eventually take down sites that I report, they don't look for other sites/domains from the same scammers or that have the same content, and they don't do anything to stop the same person from getting another domain and then putting the exact same content on it.
I shouldn't be hard for a company to identify most of these scammers. They are not subtle. Very basic automated checks to see what content is being served from new domains based on previously discovered phishing sites could catch a lot of it. Company's just aren't required by law to care so they don't.
Even big companies are terrible when it comes to phishing. I found out recently that for some google sites you can't even report the phishing site to Google without first signing into a google account. Why someone should have to hand over their personal info to Google in order to report a phishing site is beyond me. It's bad enough that Google refuses to respect RFC 2142 and accept reports at an abuse@ address. Internet standards exist to prevent exactly this kind of bullshit.
And this is why this is bullshit. Imagine them threatening to end .com over this. No? Then why bully others.
Might be useable as cheap domain used for hobby site, as personal dynamic dns domain but for email, nope.
I'd cough up $10 for .com .net .org and recent popular one the .me .io for best email deliverability instead of saving $5 and wondering whether my outgoing mail would arrive or not.