
Phish-Friendly Domain Registry '.top' Put On Notice (krebsonsecurity.com) 22
Investigative journalist and cybersecurity expert Brian Krebs writes: The Chinese company in charge of handing out domain names ending in ".top" has been given until mid-August 2024 to show that it has put in place systems for managing phishing reports and suspending abusive domains, or else forfeit its license to sell domains. The warning comes amid the release of new findings that .top was the most common suffix in phishing websites over the past year, second only to domains ending in ".com." On July 16, the Internet Corporation for Assigned Names and Numbers (ICANN) sent a letter to the owners of the .top domain registry. ICANN has filed hundreds of enforcement actions against domain registrars over the years, but in this case ICANN singled out a domain registry responsible for maintaining an entire top-level domain (TLD). Among other reasons, the missive chided the registry for failing to respond to reports about phishing attacks involving .top domains.
"Based on the information and records gathered through several weeks, it was determined that .TOP Registry does not have a process in place to promptly, comprehensively, and reasonably investigate and act on reports of DNS Abuse," the ICANN letter reads (PDF). ICANN's warning redacted the name of the recipient, but records show the .top registry is operated by a Chinese entity called Jiangsu Bangning Science & Technology Co. Ltd. Representatives for the company have not responded to requests for comment.
Domains ending in .top were represented prominently in a new phishing report released today by the Interisle Consulting Group, which sources phishing data from several places, including the Anti-Phishing Working Group (APWG), OpenPhish, PhishTank, and Spamhaus. Interisle's newest study examined nearly two million phishing attacks in the last year, and found that phishing sites accounted for more than four percent of all new .top domains between May 2023 and April 2024. Interisle said .top has roughly 2.76 million domains in its stable, and that more than 117,000 of those were phishing sites in the past year.
"Based on the information and records gathered through several weeks, it was determined that .TOP Registry does not have a process in place to promptly, comprehensively, and reasonably investigate and act on reports of DNS Abuse," the ICANN letter reads (PDF). ICANN's warning redacted the name of the recipient, but records show the .top registry is operated by a Chinese entity called Jiangsu Bangning Science & Technology Co. Ltd. Representatives for the company have not responded to requests for comment.
Domains ending in .top were represented prominently in a new phishing report released today by the Interisle Consulting Group, which sources phishing data from several places, including the Anti-Phishing Working Group (APWG), OpenPhish, PhishTank, and Spamhaus. Interisle's newest study examined nearly two million phishing attacks in the last year, and found that phishing sites accounted for more than four percent of all new .top domains between May 2023 and April 2024. Interisle said .top has roughly 2.76 million domains in its stable, and that more than 117,000 of those were phishing sites in the past year.
Re: (Score:2)
Seems unfair (Score:2)
.top is not the top offender, .com is. Just block new dot com domains from being issued. Also make all dot com owners pay a policing fee. Dot com owners have gotten away with far too much for far too long. They need to start paying up or face consequences.
Re: (Score:1)
It isn't about who gets the most complaints, it's about who ignores them complaints they get.
These are two different things, and the difference matters.
Re: (Score:2)
All I know is, this looks like bad news for my massive phishing botnet :(
block them (Score:4, Informative)
I block .top and a bunch of other newer/less-used TLDs in SMTP because we only get spam/phishing from them.
Re: (Score:2)
In terms of email, if it's not .com or a Western country TLD I really only see a need for allowing mail from China since so much is manufactured there.
For web sites in a bit more relaxed.
Re: (Score:2)
In other news, the ocean is wet (Score:5, Interesting)
For example: we're aware of just over 29 million
I strongly recommend blocking
I further recommend that you do the same thing for every one of the new TLDs, unless you have an operational reason to do otherwise. Several of us have been doing this on production networks for many years, and our aggregate experience is that the sporadic issues that this causes (all of which can be fixed by creating point exceptions) are very minor, particularly when weighed against the enormous reduction in attack surface that this strategy yields.
Let me note that we also do this with new TLDs as soon as they're announced. There's no point in waiting for them to go live: we know the abuse is coming, there's no reason to wait for it before taking action.
Re: (Score:2)
China bla bla (Score:1)
Yeah, I suspected this was only news because it mentions China and Americans love to hate China.
However, I didn't really know either way, but reading the consensus here, it seems my suspicions are correct.
It's just more anti-China hate.
So, since anti-China news is usually an attempt to distract, I wonder what we should be paying attention to, but aren't.
Re: (Score:2)
I thought this had something to do with Phish. (Score:3)
Oh well, it's time to hit them with the meatstick either way.
Time to register s.top (Score:2)
Blocked them years ago (Score:2)
I run several email servers all around the world and the .TOP TLD has been blocked for a few years now. We have been receiving literally ZERO legitimate emails from that TLD, so we simply blocked it among a few others.
Why are these TLDs needed? (Score:2)
When I was getting into the ISP business in the 90's, there was some entity pushing an addition to the root DNS. At the time, I think General Atomics was bowing out and Network Solutions was poised to be the insanely $$$ winner. (Hi Kim, hope you made millions from NS. And I probably dealt with you later getting my /19.)
Anyway, this "alternic?" asked us to use their root servers to go to the accepted .com, .mil, .org, and country codes to go to the usual servers, but they wanted to add all kinds of TLDs, e