Thursday, 24 August 2023

Un-.zip-ping and un-.box-ing the risks associated with new TLDs

Introduction

A few weeks on from the launch of the .zip domain extension (an example of a 'top-level domain', or TLD), and just as the .box TLD is set to launch, we consider the cybersecurity and infringement risks presented by the new registrations.

.zip is one of the most recent in a long line of new TLDs launched since the start of the new-gTLD programme in 2012[1], entering its General Availability phase (in which domain registrations are open to all) on 10-May-2023[2].

The reason for concern with this particular extension is the potential for confusion with a digital file suffix commonly used for compressed or archive data files ('zip files') and the possibility that this confusion may be exploited by bad actors to drive Internet users to their own content, distribute malware, and/or create brand infringements.

These types of abuse can be manifested in a range of different ways:

  • Many platforms and e-mail clients will automatically convert certain types of string into URLs, so a legitimate filename such as document.zip could be interpreted as a URL which, when clicked, may drive users to the corresponding domain name if registered[3,4]. Similarly, if a user searches for a non-existent zip-file name, file explorer applications may instead perform an online search directing the user to a corresponding .zip domain name.
  • The DNS queries associated with a link-click can provide information to the site owner on the name of the file being requested, which could correspondingly result in a leakage of sensitive information[5]. This may be particularly effective if the second-level name ('SLD') of the registered domain (i.e. the part of the domain name before the dot) is a file extension (such as .doc) in its own right - e.g. a domain such as doc.zip might allow the site owner to see that a file such as sensitivedocumentname.doc.zip has been requested.
  • The TLD presents the possibility for a link to a potentially malicious .zip domain to easily be disguised as a link to a zip file on a trusted website[6], or as content embedded in a malicious e-mail.
  • Domains hosted on the .zip TLD may be more likely to be trusted by users based on their familiarity with regular zip files.
  • Conversely, as the .zip extension becomes more well-known, users may unknowingly download a zip file - which can contain arbitrary content of unknown legitimacy - thinking that they are simply clicking on a link to a regular website[7].

Domains on the .zip extension are being offered by Google Domains[8], together with a number of others - including .mov, which launched on the same day, and is subject to similar security concerns due to the possibility of confusion with the video-file format suffix. Despite the claim that the domain extension is intended to represent content from providers who are "fast, efficient, and ready to move", the risks - combined with other Google offerings which are attractive to would-be attackers, such as a whois privacy service and subdomain forwarding - mean that the domains on this new TLD may warrant careful scrutiny.

In a similar vein, the .box domain extension is set to enter its Sunrise phase - where brand owners can apply for new domains, prior to General Availability - on 09-Aug-2023[9]. Whilst not a file suffix in the same way as .zip, the .box extension is also likely to be subject to abuse, in part due to the possible scope for confusion with content relating to the Dropbox hosting and file-sharing service. Other brand names incorporating the term 'box' (such as Xbox and Birchbox) may also find themselves particularly targeted by attacks, and we anticipate that this additional new TLD may also be worth closely watching once general registrations commence.

.zip registrations in the first two months of activity

The .zip extension has seen a rapid growth in the numbers of registrations in the weeks since its launch - in part, presumably, due to its attractiveness to bad actors. Within the first month, it was already the most popular of Google’s eight new registration offerings by a significant margin[10]. However, it is worth noting that some of the registered domains feature warnings of the potential for abuse, or have been registered so as to block use by bad actors.

In this article, we use DNS zone-file information to conduct a comprehensive study of registered domains across the TLD, to analyse potential indicators of intention for nefarious use. This work follows on from previous studies, which already found five active phishing sites - targeting the Microsoft, Google, and Okta brands - within a week of launch of the TLD[11] and numerous other domains featuring keywords (such as 'install' or 'update', other brand-related terms, or long, non-sensical strings) of concern, due to the potential of their association with filenames or downloadable tools, and/or the corresponding phishing and malware risks.

As of 21-Jul-2023, there were 29,664 distinct .zip domains registered. 266 of these comprised just a string which is also used as a filename suffix[12] as the SLD, with the following common examples all found to have been registered: apk, css, doc, docx, exe, htm, html, gz, jpeg, jpg, mov, mp3, mp4, php, ppt, pptx, rar, sql, tar, tmp, wav, xls, xlsx, xml, and zip itself (as apk.zip, css.zip, etc.).

The following statistics illustrate the numbers of domains with SLDs featuring keywords of particular interest or concern:

  • 359 domains feature the term 'file', 280 'update', 170 'install', 112 'download', and 53 'invoice'.
  • The top four most valuable global brands in 2023[13] are all technology brands, and therefore compelling candidates for infringements using the .zip extension. Of these, 'apple' features in 12 domains, 'google' in 49, 'microsoft' in 49, and 'amazon' in 7. Other related product names also feature in the dataset, with 82 'windows' domains and 31 'chrome'.

Overall, this yields a dataset of 1,093 domains (3.7% of the total) containing one or more of the above high-risk keywords. Of these, 415 (38.0%) return an HTTP status code of 200 (i.e. some sort of live website response). Some of these provide a relatively light-hearted proof-of-concept illustration of the risk of misdirection, with twenty-three (including archivedfile[.]zip, chrome-browser[.]zip, emergencyupdate[.]zip, and important-files[.]zip) re-directing to videos of Rick Astley's 'Never Gonna Give You Up' - the Internet practice known as 'Rickrolling'[14] - although a number of more concerning examples were identified, such as those outlined below, each of which has the potential to be distributing malicious content:

  • Figure 1(i): Microsoft-related domain name resolving to a website displaying a 'file explorer'-style page referencing downloadable files
  • Figure 1(ii): Website which automatically downloads an archive file named quarterly_figures_q2_2023.invoicestuff.zip
  • Figure 1(ii): Website purportedly offering the download of a number of software applications

(i)

(ii)

(iii)

Figure 1: Examples of live websites with content of potential concern hosted on .zip domain names

Altogether, 38 of the domains in the dataset of 1,093 high-risk domains included the keyword 'login' at some location within their HTML (site content), indicating possible use for phishing activity.

Other examples of domains re-directing to apparently-unrelated third-party sites were also identified - these may be taking advantage of misdirection tactics, even if not explicitly malicious.

However, very few of the domains appear to have been registered by official brand owners for legitimate use or to protect customers, with just four re-directing to URLs on the microsoft.com site, two on google.com, one on office.com, one on ubuntu.com, one on malwarebytes.com, one on archive.org, and one on square-enix.com.

Another key observation is the fact that the dataset of all .zip domains contains disproportionately many names consisting of long, apparently non-sensical strings of characters, compared with the general domain population. These types of domains have been noted previously as commonly being associated with phishing activity, through such tactics as the construction of deceptive URLs. The observation can be shown quantitatively by calculating the distribution of domain-name entropy values ('Shannon entropy', a method of quantifying the amount of randomness, or unpredictability, of a SLD string) within the .zip dataset, compared with the distribution amongst a set of all domain name registrations from a particular day, from a previous study[15] (Figure 2).

Figure 2: Distribution of domain-name entropy values for the dataset of .zip domains (red), compared with a set of general domains from a previous study (blue)

This analysis shows that the .zip domain distribution is significantly more weighted towards the high-entropy end of the spectrum (with a second peak at values above 4, and an average entropy value across the whole dataset of 3.39), compared with the domains from the general dataset (average entropy = 2.86).

Within the set of .zip domains, virtually all of the domains with entropy values about 3.85 (14,659 domains, or 49.4% of the total) consist visually of apparently-random strings (see Table 1).

Domain name
 
Entropy value
                            
  g0kfctpdb18t7vkidqj2me5ls9rjo46g.zip 4.6875
  r5s0mo4tl315achnpvrkie76j84unba2.zip 4.6875
  abcdefghijklmnopqrstuvwxy.zip 4.6439
  98lgdq7c064nmbs1olvuejsnvhbt82ri.zip 4.6250
  cph1ukfm2n1bvd8jsaqetc3o47a7lfq6.zip 4.6250
  cr9qpcoiaklt1f53m6bj0u07r3eud2k4.zip 4.6250
  g4umroti85bj0vfes01d3oqau2n74fpj.zip 4.6250
  hj23qhtvgcsd4pqcs765r8meuf014dba.zip 4.6250
  ke6h76jnpefh2s2aivau98mc453ogtb7.zip 4.6250
  l5eujm8vksnetqd1714fm2o3a3hgrpkd.zip 4.6250
  mlf7v0nmbhia9rgil68jsp15qk2s0ech.zip 4.6250
  piuvk9qg4indoljemab245fks3cn075b.zip 4.6250
  1cd7as0m8kpv1l0j5tnfqih2ot5tqge3.zip 4.6014
  3uav01gor6482mj2t6k9bp50ofkl7qio.zip 4.6014
  9q7f61obtugmpn8tj0i3r1bcmahsk5ft.zip 4.6014
  apnv6golm5r3kp4f3jst744qbuh218n6.zip 4.6014
  lms1acrubko51qqht7lf94138v0i0ndh.zip 4.6014
  obdpfj3t963u7rltac095lmp1hi3g82q.zip 4.6014
  so5eip1av0krpe3pthq7dnngd3bumfcl.zip 4.6014
  to7liok38ijgud5hchs0rvmtiab9e2fe.zip 4.6014

Table 1: Top 20 .zip domains by entropy values

None of the above domains was found to resolve to any live content as of the time of analysis (24-Jul-2023).

Conclusions

By the nature of its potential confusion with a filename suffix, the .zip TLD presents significant risk for both brand owners and Internet users, in terms of the possibility for brand infringements and potential association with phishing activity and malware distribution - and the risk for brand damage which this entails. Already, the registration patterns across this domain extension are indicative that the TLD is likely to be popular with bad actors, by virtue of the keywords and domain-name structures observed in the current dataset, together with the presence of live content of concern in some cases. We also anticipate that the .box domain extension, set to see its initial launch on 09-Aug, may also transpire to be subject to similar types of abuse.

These observations highlight the importance of brand owners taking a proactive approach to monitoring and enforcement with domains, allowing timely detection of - and action against - threatening registrations, through a programme of brand protection which is able to tackle new TLDs as soon as they launch, and identify new domain registrations on a daily basis.

References

[1] https://newgtlds.icann.org/en/program-status/delegated-strings

[2] https://tld-list.com/launch-schedule

[3] https://circleid.com/posts/20230517-new-google-domains-spark-cybersecurity-concerns-risks-and-reactions-to-.zip-and-.mov-top-level-domains

[4] https://tech.slashdot.org/story/23/05/19/1228215/google-pushes-new-domains-onto-the-internet-and-the-internet-pushes-back

[5] https://blog.talosintelligence.com/zip-tld-information-leak/

[6] https://medium.com/@bobbyrsec/the-dangers-of-googles-zip-tld-5e1e675e59a5

[7] https://www.iptwins.com/en/2023/05/25/domain-names-in-zip-beware-of-security-threats/

[8] https://domains.google/tld/zip/

[9] https://newgtlds.icann.org/en/program-status/sunrise-claims-periods

[10] https://blog.talosintelligence.com/zip-tld-information-leak/

[11] https://www.netcraft.com/blog/phishing-attacks-already-using-the-zip-tld/

[12] https://gist.github.com/securifera/e7eed730cbe1ce43d0c29d7cd2d582f4

[13] https://www.kantar.com/inspiration/brands/revealed-the-worlds-most-valuable-brands-of-2023

[14] https://en.wikipedia.org/wiki/Rickrolling

[15] https://www.linkedin.com/pulse/investigating-use-domain-name-entropy-clustering-results-barnett/

This article was first published on 22 August 2023 at:

https://www.iamstobbs.com/opinion/un-.zip-ping-and-un-.box-ing-the-risks-associated-with-new-tlds

Tuesday, 1 August 2023

X (trade)marks the spot: *not* a textbook example of a successful rebranding exercise

by David Barnett and Ernie Bell

It is fair to say that Elon Musk’s rebranding of Twitter as 'X' (announced on Monday 24 July 2023) - attempting to reimagine it as a 'super app' analogous to Tencent's WeChat[1] - has not gone smoothly. From a purely practical point of view, the removal of the physical lettering from the headquarters in San Francisco was interrupted by police when it emerged that appropriate permissions had not been sought, leaving the building just reading 'er'[2].

Conventional wisdom (rightly) dictates that a new brand name should ideally be novel and distinctive. This not only aids with the acquisition of relevant intellectual property protection, but also makes the subsequent process of monitoring for, and enforcing against, brand infringements much more straightforward. The new X brand is neither of these things, with even the logo itself appearing very similar to a standard Unicode[3] digital character[4,5] (Figure 1). The Executive Creative Director at Monotype (the font-set in question) has publicly commented that Musk's 'X' is not taken from their 'Special Alphabets 4'[6,7]; however, it would have been a risky strategy to not to do proper due diligence and clear this matter with Unicode prior to launch. Elon Musk had asked his followers to find an 'X' logo "good enough" to rebrand Twitter[8] and they obliged. This type of 'crowdsourcing' is definitely not the recommended way of creating the intellectual property which a brand owner intends to use as the public face of their organisation. Many questions arise as to ownership, use, goodwill, royalties, rights of enforcement and the many more legal challenges which can result from using someone else's intellectual property.

Figure 1: The new profile page for Twitter / X (top), and a description page for Unicode character U+1D54F (bottom)

Furthermore, in IP parlance, a single letter has 'no semantic content'. Nevertheless, this has not prevented a number of 'domain brokers' and other speculators from attempting to take advantage of the buzz and monetise a range of Internet assets - even those which are apparently totally irrelevant - containing the 'x' (Figure 2).

Figure 2: Example of a posting by a domain broker attempting to monetise (purportedly) X-related domain names

The situation is further complicated by the fact that a number of other companies - including Meta and Microsoft - already have intellectual property rights covering the same letter (relevant to the Xbox brand in the latter case), with over 900 active US trademarks already registered, making it unclear how Twitter / X might be able to defend this brand[9,10].

It is also important to bear in mind that the Twitter brand has a great deal of legacy familiarity and goodwill associated with it, which Musk risks losing - with associated damage to brand value - following the renaming[11].

Beyond this, the online landscape is - frankly - a mess. The launch of a new brand should generally be preceded by the acquisition of relevant online 'real estate' (potentially anonymously, to avoid the pre-emptive leakage of information relating to the brand's identity). The relevant content might include domain names - both 'core' domains to be used for the general infrastructure of the website and business, and 'strategic' domains comprising defensive registrations and names to be used for future extensions of the business - and other relevant assets, such as social-media profiles.

However, at the time of launch, Twitter was not even in possession of the @x username on its own platform, subsequently seizing it from its long-term owner without warning or compensation[12]. Of course, social media sites make it very clear that they have the right to revoke username handles at any time, but this example could set a concerning precedent for other sites to do the same, as and when they may choose to rebrand. We note that, three days after the supposed brand launch, Twitter / X had not rebranded its official presence on the Meta platforms Facebook and Instagram, which may cause some brand confusion. Additionally, the main corporate website was also showing a confusing mix of branding (Figure 3), and the mobile app was still branded as Twitter.

Figure 3: The desktop log-in page of Twitter / X as of 27 July 2023

Additionally, as of the day of launch, the x.com domain - despite having been acquired by the organisation - had not seen the relevant DNS changes successfully propagated across the Internet, meaning that many users were seeing just a GoDaddy parking page featuring sponsored ads for third-party websites and services. It has also been noted that a number of other relevant domain names - including examples such as xsafety.com, which could potentially be confused with official Twitter / X sites - are currently owned by third parties or listed for sale[13]. Beyond these, any unregistered relevant domain names are ripe for purchase by cybersquatters, who may attempt to sell them back to the official corporation, or by other bad actors for phishing, malware distribution, brand impersonation or other types of attack or infringement.

Indeed, zone-file analysis of the set of .com domains only (the most popular domain extension by a significant margin)[14], and considering only domains with 'x' at the start, gives some indication of the scale of the problem. As of 27 July 2023 (three days after Twitter's rebrand), the .com zone file contains around 1.04 million registered domain names beginning with 'x' (excluding internationalised domain names, which are encoded as (Punycode) strings beginning 'xn--'). Of these, around 6,500 were not present in the zone file on 21 July (three days before the rebranding) and have therefore been registered in the intervening six-day period. Of course, many of these are clearly unrelated to the Twitter / X brand, but many do feature keywords suggesting that they may have been registered with the rebranding in mind - to take advantage of the online buzz, misdirect users, or to cybersquat - or could be confused with domains falling into these categories.

At least 300 new domains were found to be of potential high relevance, including examples featuring keywords such as 'app', 'download', 'musk', 'coin', 'invest', 'help' or 'service'. Of these, around one in five were found to have active MX (mail exchange) records, indicating that they have been configured to be able to send and receive e-mails and - even in the absence of any live site content - could potentially be associated with phishing activity.

Furthermore, however, many of the high-relevance domains were found already to resolve to live websites, including several examples which appear potentially to be infringing against the X brand, and some which may be associated with active scams. Some examples are shown in Figure 4.

Figure 4: Examples of potentially infringing new domain registrations relating to the X brand (top to bottom: xcoinerc[.]com; x-coin-x[.]com; xdogeeth[.]com; xelonerc[.]comxbluetoken[.]com; xpay-project[.]comxmoontoken[.]com; xwifecoin[.]com)

The experiences surrounding the X rebrand illustrate a number of key points an organisation should bear in mind when considering the launch of a new brand name. Some of the most significant lessons include:

  • Select the brand name carefully, and ideally choose one which is distinctive and not under prior use by third parties. Marks which are more distinctive generally afford greater degrees of protection.
  • Ensure that IP rights are protected through the registration of appropriate trademarks in relevant classes and jurisdictions. Although rights generally arise through the use of a mark in the course of trade, applications can be submitted on the basis of intention to use.
  • Ensure that key online assets - including branded domain names and social-media profile handles - are acquired, available for use, and configured correctly.
  • Following the launch of the brand, continued proactive ongoing monitoring for infringements, and enforcement against concerning content, is crucial.

References

[1] https://www.cnbc.com/2023/07/26/elon-musks-x-rebrand-reignites-goal-to-turn-twitter-into-chinas-wechat.html

[2] https://www.theguardian.com/technology/2023/jul/25/elon-musk-x-rebrand-twitter-sign-removal

[3] https://home.unicode.org/

[4] https://www.hitc.com/en-gb/2023/07/25/twitters-mathematical-double-struck-capital-x-logo-mocked-for-unicode-resemblance/

[5] https://twitter.com/EliotHiggins/status/1683427725892042753

[6] https://www.ft.com/content/da262b2a-f39a-466b-9b2f-2f8fa84f0117

[7] https://www.businessinsider.com/elon-musk-made-new-x-twitter-logo-says-will-change-again-2023-7

[8] https://www.theverge.com/2023/7/26/23809087/elon-musk-x-logo-twitter-trademark

[9] https://www.reuters.com/technology/problem-with-x-meta-microsoft-hundreds-more-own-trademarks-new-twitter-name-2023-07-25/

[10] https://www.cbsnews.com/news/twitter-trademark-x-com-rebrand/

[11] https://www.linkedin.com/posts/vaibhavsisinty_elon-musk-just-killed-twitter-he-is-rebranding-activity-7089862486773956608--uJy

[12] https://techcrunch.com/2023/07/26/twitter-now-x-took-over-the-x-handle-without-warning-or-compensating-its-owner/

[13] https://www.forbes.com/sites/barrycollins/2023/07/24/the-x-rated-problem-with-twitters-new-name-for-millions-of-users/

[14] https://research.domaintools.com/statistics/tld-counts/

This article was first published on 1 August 2023 at:

https://www.iamstobbs.com/opinion/x-trademarks-the-spot-not-a-textbook-example-of-a-successful-rebranding-exercise

Unregistered Gems Part 6: Phonemizing strings to find brandable domains

Introduction The UnregisteredGems.com series of articles explores a range of techniques to filter and search through the universe of unregis...