Cybercrime

Sponsored
by

Noteworthy

Domain Research and Monitoring: Keeping an Eye on the Web for You

WHOIS History API: Powering Domain Investigations

Reverse WHOIS: A Powerful Process in Cybersecurity

Cybercrime / Most Commented

Lawyer-Impersonator Pleads Guilty over False C&Ds

As if there weren't enough problems with lawyers sending out improper cease-and-desists, Wired News reports that a Nevada man has pleaded guilty to impersonating a lawyer to extort domain registrants to turn over their domain names. "A Nevada man pleaded guilty Thursday to his plotting to steal domain names from their legitimate owners by impersonating a California intellectual property lawyer and send threatening letters to domain name owners in hopes of convincing them to turn over the domains to him..." more

Vint Cerf on Internet's Key Infrastructure

BBC News is running Vint Cerf's personal view on the Internet's future. From the article: "Improving the resilience and resistance to attack of key infrastructure such as the Domain Name System (the phone book of the internet) and the routing system will be major focal points for near-term internet development. Introducing DNSSEC (security for the Domain Name System) and the digital signing of address space by the Regional Internet Registries will assume much higher priority..." more

Cyberattacks on Estonia Further Explored

The distributed denial of service (DDoS) attack that brought down most of Estonia's internet infrastructure a few months ago, has been explored by Joshua Davis in a recent story at the Wired Magazine. "In the coming months, commentators around the world would look back at this moment and debate its significance. But for Aaviksoo, the meaning was clear. This was not the first botnet strike ever, nor was it the largest. But never before had an entire country been targeted on almost every digital front all at once, and never before had a government itself fought back..." more

DNS Attack: 10-Year-Old Security Problem Is Back Haunting Corporate IT

At the Black Hat conference, security researcher Dan Kaminsky showed how problems in the way browser software works with the Internet's Domain Name System (DNS) could be exploited to give attackers access to any resources behind the corporate firewall. The key problem is the way web browsers determine how to trust other computers, says Kaminsky. This decision is based on the Internet domain name of the computer, and that DNS information can be misused... more

Let's Be Careful Out There: Bogus Windows Domains

Last week, my colleagues over at Sunbelt Software discovered a bogus Windows domain being registered earlier this month (where the "w" in "windows" is actually two "v"s). Today, I've been alerted to the fact that are several additional Windows domains which have registered where the "w"s have been also been replaced with "v"s... more

Businesses Losing Battle Against DNS Attack, Says New Study

According to a new research study, companies are in struggle to keep their DNS (Domain Name Systems) protected from malicious attackers. Many businesses remain vulnerable, as over half the respondents reported having fallen victim to some form of malware attack. Over one third had been hit by a denial-of-service attack while over 44 percent had experienced either a pharming or cache poisoning attack. more

4,000 iPhone Domains Registered, Expected to Double Before Year's End

The Associated Press is reporting today that although the 'iPhone.com' domain name was grabbed long before January 9th, when Apple announced its new gadget, speculators have been registering thousands of iPhone-related domain names such as 'iPhoneJewelry.com' and 'TheAppleMaciPhone.com'. Although the registrations dropped to 25 per day for a while, they have picked up rapidly and more than 350 iPhone related domain names were registered in a day last week. more

Domain Names Can't Be Trespassed: Utube.com v. YouTube

Boy, this case got a lot of attention when it was first filed (which isn't surprising; YouTube lawsuits usually do). You may remember the story: the plaintiff is a dealer of used tube mills, used pipe mills and used pollforming machines. The plaintiff operated a website at utube.com. As you might expect, like most other industrial B2B vendors' websites, utube.com had a small but targeted audience. With the phenomenal and quick rise in popularity of YouTube, a lot of web users mistyped youtube.com and entered utube.com instead, causing utube.com to suddenly experience disproportionate popularity. Unfortunately for the plaintiff, few of these visitors were interested in pollforming machines... The plaintiff sued YouTube for trademark infringement... more

California Man Gets 6 Years in Prison for Phishing

A California man who was found guilty earlier this year for operating a sophisticated phishing scheme that attempted to deceive thousands of AOL users has now received a prison sentence of 70 months -- a fraction of the 101 years he could have been given. InformationWeek reports: "In the first jury conviction under the Can-Spam Act of 2003, Jeffrey Brett Goodin, of Azusa, Calif., was convicted of sending thousands of e-mails set up to appear to be from AOL's billing department to the company's users, prompting them to reply with personal and credit-card information. He then used the information to make unauthorized purchases, according to the U.S. Attorney's Office in Los Angeles." more

Defendant iREIT's Answer in the Verizon Case

Defendant iREIT filed its answer on May 25, 2007, to the recent complaint by Verizon alleging cybersquatting. As in the prior article, these are the public court documents and nothing has been proven by either side in a court of law. more

Business 2.0 Does Front Page Story on the Most Powerful Unknown Domainer

Business 2.0 Magazine is running a front page story on Kevin Ham, considered as one of the most powerful "domainer", and how he has managed to build a $300 million empire using everything from domain tasting to typo-squatting the entire nation of Cameroon. From the article, "Ham's people installed a line of software, called a 'wildcard,' that reroutes traffic addressed to any .cm domain name that isn't registered. In the case of Cameroon, a country of 18 million..." more

VoIP/IP Telephony in Estonia: Disrupted by Botnets?

With my post earlier this month about the possibility of SIP botnets [also featured here on CircleID], I've had a number of people asking about more information and wondering about the possible impacts. And while I will write more on botnets in general, as far as the potential impact of "botnets" in general, one need only look over at the current situation in Estonia... Now, perhaps Russia is behind the attack... perhaps not. There are obviously much larger political issues going on between the two states. more

IPv6 Flaw Could Amplify DDoS Attacks

This week, experts sent two drafts to the Internet Engineering Task Force (IETF) proposing different ways of fixing a problem in the way that Internet Protocol version 6 (IPv6) allows the source of network data to determine its path through the network. The drafts recommend that the IPv6 feature should either be eliminated or, at the very least, disabled by default. more

Ready or Not… Here Come the IRC-Controlled SIP/VoIP Attack Bots and Botnets!

A story... ZZZ Telemarketing (not a real name) is locked in a heated fight with their bitter rival, YYY Telemarketing (also not a real name), to win a very large lead generation contract with Customer X. Customer X has decided to run a test pitting the two companies against each other for a week to see who can generate the most leads. The ZZZ CEO has said to his staff that it is "do or die" for the company. If they fail to win the contract, they will have to shut down -- they need to do "whatever it takes" to win over YYY. A ZZZ staffer discovers that part of why YYY has consistently underbid them is because they are using SIP trunks to reduce their PSTN connection costs. But the staffer also discovers that YYY is using very cheap voice service providers who run over the public Internet with no security... more

Criminal Checks Needed for Domain Name Tasting, Kiting, Spying

International organisations should step in to prevent the "tasting," "kiting" and "spying" related to Internet domain names, say representatives from the US telecommunications and trademark industries. These new activities are dramatically altering online commerce and impacting legitimate businesses, and the United States Federal Trade Commission (FTC), World Intellectual Property Organization (WIPO) and the Internet Corporation for Assigned Names and Numbers (ICANN) should take action, they say. The US Anti-Cybersquatting Consumer Protection Act (ACPA) had too many loopholes given the actual trends in the domain name secondary market, said Sarah Deutsch, vice president and associate general counsel for Verizon, and Marilyn Cade, former AT&T lobbyist and now consultant on Internet and technology issues... more

Industry Updates

Typosquatting Data Feed Can Enhance Lloyds Bank's Typosquatting Protection

60+ PayPal Potential Typosquatting Domains Detected in the Beginning of June

Typosquatting Domains Every AppleID Owner Should Avoid

Shopping and the Pandemic: Increased Reliance on Mobile Apps 

Typosquatting Protection: A Look into Instagram-Themed Domain Names

Investigating Typo Domains Beyond Credit Suisse's Spying Scandal

IP Geolocation Intelligence: An Aid Against Location-Based Threats?

How to Avoid Phishing Campaigns Targeting CARES Act Recipients

Newly Registered Domains Database Shows Threat Actors Exploit the Need for N95 Masks amid the Pandem

Domain and IP Intelligence Checks Following the Launch of the COVID-19 Solidarity Response Fund

Under the Hood of 3M- and 3M Mask-Themed Recently Registered Domains

Domain Intelligence Shows Cybercriminals May Abuse Video-Conferencing Services' Brand Names

How Cyber Threat Intelligence Feeds Can Support MSSPs

Brand Monitor and Typosquatting Data Feed: Two Assets to Support Spear-Phishing Prevention

Combating COVID-19 Cybercrime – What Internet Infrastructure Providers Like Afilias Are Doing