The Star Malaysia - Star2

Danger of domains

Scammers have found a simple but sneaky way to steer users to bogus sites with malware.

- By TIM JOHNSON – McClatchy Washington Bureau/ Tribune News Service

All I need to do is register a website that looks like my target and then send that to a handful of employees or people affiliated with the organisati­on or potentiall­y even customers. And then I can trap them.

Tom Richards

Hackers are spoofing Internet addresses to lure surfers to fake websites to steal their credential­s and plant malware on their devices.

IT IS easier than ever to get waylaid on the Internet, diverted to dangerous territory where scam artistes await with traps baited for the unsuspecti­ng user.

It’s all about devious misdirecti­on, fumble-fingered typing and how our brains can confuse what our eyes see. Big money can await the clever scamster, and costs are rising for corporatio­ns and politician­s who do not take heed.

Extensions everywhere

The problems lie in the inner workings of the Internet, and touches on issues like the vast expansion of the combinatio­n of words, dots and symbols that comprise Internet addresses.

It’s no longer just .com, .net, .org and a handful of others. Now, there are 1,900 new extensions, known as top-level domains, things like .beer, .camera, .city, .dating, .party and .shop.

“We see a ton of them being used maliciousl­y,” said Mikko Hypponen, chief research officer at Finnish security company F-Secure, who called the new endings “a big headache”.

The problems revolve around what computer scientists refer to as “spoofing” of the Domain Name System (DNS), which has been called the phone book of the Internet.

It’s been going on for a while, and touches on what users type into the address bar of a browser window or click on at a website. There are new ways to make phony addresses look real.

“Creating a spoofed domain name, or even hijacking a domain name, has become a lot easier today,” said Israel Barak, chief informatio­n security officer at Cybereason, a cybersecur­ity firm based in Boston, Massachuse­tts.

Just a few years ago, spoofing an Internet address, say, microsoft.com, was primitive.

“You would have to maybe change that ‘i’ to a 1. I’m going to be M1crosoft with a 1 today, or even change the ‘o’ to a zero, or change the ‘t’ to a seven. For senior citizens with fuzzy vision like I’m starting to get, you might squint at that and say,

‘Looks like Microsoft to me’,” said Paul Vixie, chief executive of Farsight Security, a San Mateo, California, company.

An Internet pioneer, Vixie has been involved in its governance for three decades. He is an architect of some of the protocols used in the DNS system and advises the non-profit Internet Corporatio­n for Assigned Names and Numbers, the Los Angeles non-profit that serves as the guardrails for the borderless global Internet.

But Vixie said the Internet is still in its Wild West phase. He compared the online world today to the era of highways before seatbelts and airbags.

“It just takes us some time to catch up. First, you innovate, you kill a lot of people or steal a lot of money, whatever it is, and then somebody comes along and says we got to secure this somehow. We’re still in that first phase here,” Vixie said.

Bridge too far

To bridge the gap between English-speaking and non-Englishspe­aking worlds, Internet organisers have incorporat­ed domain names utilising characters covering 139 modern and historic scripts.

It’s not just major scripts like the Cyrillic alphabet and Chinese characters. It’s also Runic, Buhid, Rejang and dozens of other obscure language scripts.

Scamsters have had a field day with parts of those scripts. They’ve inserted look-alike characters into Internet addresses, sending users to bogus and malicious, websites. Vixie said numerous distinct characters look like the Roman letter “i”.

“They are completely visually the same down to the last pixel on your screen to the real lower-case ‘i’. So there is no way that you’re going to tell the difference,” he said.

Inserting such exotic characters into a link is one technique criminals employ to send users to look-alike sites that may appear to be a bank website, a Gmail troublesho­oting page or some other page that asks for a username and password. Other techniques are also used.

In some cases, adversarie­s target employees of a corporatio­n, nuclear plant, military unit or other high-value facility where they seek a digital foothold. The hackers send the targets tailored emails with the malicious links.

“It’s easy, it’s cheap,” said Tom Richards, co-founder and chief strategy officer for GroupSense, a Virginia cyber threat intelligen­ce firm.

As a hacker, Richards said, “All I need to do is register a website that looks like my target and then send that to a handful of employees or people affiliated with the organisati­on or potentiall­y even customers. And then I can trap them. I can send them malware. I can get them to fill out a form.

“It’s embarrassi­ngly effective.”

Too many to purchase

Not so long ago, companies would buy common domain names that were almost like their normal websites, but off by a letter to ensure clumsy typists wouldn’t go astray.

So, in the case of Walgreens. com, if you type in walgreen.com or walgrens.com it will still take you to the drugstore chain’s site.

With the proliferat­ion of new domain names, the task has grown more difficult.

“It is getting harder and harder for companies. There are just so many combinatio­ns,” said Steve Manzuik, director of security research at Duo Security, an Ann Arbor, Michigan, vendor of Cloud-based security services.

Some cybersecur­ity experts suggest that average Internet users need to get savvier about phony websites, reading the components of what is in the address bar, like domain names and suffix paths. Others say that expects too much of average Internet users.

Most users see “dots and slashes and question marks. They don’t know what this means,” said Rich Smith, director of Duo Labs, the advanced security research team at Duo.

 ??  ??
 ?? — Photos: 123rf.com ?? Hackers tend to target employees to seek a digital foothold in corporatio­ns, nuclear plants, military units and other high-value facilities.
— Photos: 123rf.com Hackers tend to target employees to seek a digital foothold in corporatio­ns, nuclear plants, military units and other high-value facilities.
 ??  ?? It’s no longer just .com, .net, .org and a handful of others. Now, there are 1,900 new extensions and many are being used maliciousl­y.
It’s no longer just .com, .net, .org and a handful of others. Now, there are 1,900 new extensions and many are being used maliciousl­y.

Newspapers in English

Newspapers from Malaysia