You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 7 Next »

Topic :  DNS and Domain Abuse in the Digital Economy

The roundtable will discuss how  DNS and Domain name abuse from security and business perspectives and how it affects both end users and the digital economy.

The DNS remains the backbone of the Internet. It is a tried and tested system that is globally distributed and extremely scalable. People are continuing to explore new and creative uses for the DNS. DNS is facilitating the growth of the broader digital economy, digital transformation, and Cybersecurity. This session will discuss these issues anchoring digital asset information in domain name and the latest technological developments as it relates to domain abuse, resulting from new  domains that are designed to fool people into thinking they are files generated by their systems or files they have requested such as as .zip, .mov, .image, .photo. The problem lies in its association with a commonly used file format. .zip is universally recognized as a compressed file format, .MOV is also a commonly used file format to represent a movie and its usage as a TLD could lead to confusion and potential misuse. TLDs are the letters that come after the dot at the end of the domain name in an Internet address, like example.com, example.org, and example.zip. File extensions are the three letters that came after the dot at the end of a file name, like example.docx, example.ppt, and example.zip, example.mov, example.gif. The key to it all is misdirection. The attack chain is there to confuse and mislead users and security software. Criminals make extensive use of open redirects for example web pages that will redirect you  anywhere you want to go to make it look as if their malicious URLs are actually links to Google, Twitter or other respectable sites. Here are some of the potential cybersecurity issues associated  with the .zip TLD: Phishing attacks: The .zip or .mov TLD could be used to trick users into  believing they’re downloading a legitimate .zip file or movie when, in fact, they’re being redirected  to a malicious

site. This tactic could significantly increase the success rate of phishing attacks. Malware distribution: Attackers could potentially use the .zip or .mov TLD to host and distribute malware. Given the association of .zip and .mov with downloadable files,users might be more  inclined to download files from these domains, inadvertently infecting their systems. Confusion and misdirection: The .zip and .mov TLD could be used to create confusion, making it easier for cybercriminals to misdirect users and mask their activities. Target Groups: Cross- Community


Date: Tuesday 05 May (16:15-17:30 AST) (21:15-22:30 UTC)


DRAFT AGENDA (TBC)

  1. Welcome Opening Remarks and Guest Speakers Introductions - Greg Shatan, NARALO Chair (10  mins)
    1. Reg Levy- Tu Cows
    2. Graham Bunton  - PIR
    3. Steve Crocker - CEO Shinkuro, Inc.
    4. Ram Mohan - Chief Strategy Officer at Identity Digital
  1. Roundtable discussion DNS and Domain Abuse in the Digital Economy" with speakers: (35 mins) - Moderated by Greg Shatan
  2. Takeaways - Greg Shatan, NARALO Chair  (5 mins)



  • No labels