Unzipped! The Hidden Dangers Behind .Zip Domains | Threat SnapShot

Unzipped! The Hidden Dangers Behind .Zip Domains | Threat SnapShot

Phishing attacks got a little more interesting last year with the addition of.zip as a domain name. Attackers started using it in phishing campaigns, playing on a user's assumption that they were downloading the popular archive file. And how would you tell the difference at a glance, when the URL looked something like "https://github.com∕kubernetes∕kubernetes∕archive∕refs∕tags∕@v1271.zip"? Because of Unicode support and the ability to include basic authentication in URLs, attackers can use characters like U+2044 (⁄) and U+2215 (∕) and the "@"" sign to craft doppelganger URLs that look like legitimate ones and may trick an unsuspecting user. In this week's Threat SnapShot, we'll take a closer look at how attackers have used the.zip domain for phishing, as well as detection and hunting strategies you can use to keep your organization safe.

References:

SnapAttack Content: