{"id":16512,"date":"2023-08-03T10:31:01","date_gmt":"2023-08-03T10:31:01","guid":{"rendered":"https:\/\/gridinsoft.com\/blogs\/?p=16512"},"modified":"2023-08-03T10:41:52","modified_gmt":"2023-08-03T10:41:52","slug":"are-zip-domains-safe","status":"publish","type":"post","link":"https:\/\/gridinsoft.com\/blogs\/are-zip-domains-safe\/","title":{"rendered":"Are .zip Domains Safe to Use and Visit?"},"content":{"rendered":"<p>The Internet has become our second home. Every time we surf the Internet, we scammed. And this time, cybercriminals did not miss their chance to deceive us using a new &#8220;.zip&#8221; domain.<\/p>\n<h2>What&#8217;s a .zip domain?<\/h2>\n<p>Some time ago, Google allowed new Top Level Domain (TLD) names for registration. Those are .zip, .mov, and .phd. Now everyone can buy a domain with the .zip extension, just like purchasing domains with .com or .org extensions. However, the <strong>security community has expressed concerns<\/strong> about the potential risks associated with these new TLD.<\/p>\n<p>Experts have discovered that <strong>cybercriminals are using .zip domains<\/strong> to deceive users into believing that they are downloadable files when they are URLs. Research indicates that one-third of the top 30 .zip domains can be blocked by our threat detection <strong>engines utilize the names of prominent tech companies<\/strong>, including Microsoft, Google, Amazon, and Paypal, to fool people into thinking they are trustworthy files associated with these reputable companies.<\/p>\n<p><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/08\/GS_Blog_Top-Blocked-.zip-Domains_790x752px.webp\" alt=\"top 30 .zip domains blocked\" width=\"790\" height=\"752\" class=\"aligncenter size-full wp-image-16516\" title=\"\" srcset=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/08\/GS_Blog_Top-Blocked-.zip-Domains_790x752px.webp 790w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/08\/GS_Blog_Top-Blocked-.zip-Domains_790x752px-300x286.webp 300w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/08\/GS_Blog_Top-Blocked-.zip-Domains_790x752px-768x731.webp 768w\" sizes=\"auto, (max-width: 790px) 100vw, 790px\" \/><\/p>\n<p>Earlier, such concerns appeared about TLDs like .xyz, .online, .biz, .info, .ru, .life, and .site. However, they were mostly true \u2013 the vast majority of sites using these <a href=\"https:\/\/gridinsoft.com\/blogs\/zip-and-mov-for-phishing\/\">domains were used in phishing<\/a>, shopping scams and pop-up advertisements spam. This time, however, <strong>things could be worse<\/strong>. <\/p>\n<h2>Security Risks of .Zip Domain <\/h2>\n<p>These .zip <strong>domains are blurring the lines between a file and a website<\/strong> and making it harder to tell what&#8217;s what. One primary concern is the potential for file mix-ups, which can make it hard to tell apart local and remote sources, posing a security threat. Cybercriminals have created a prototype email that considers the possibility that the attachment and the <strong>link could lead to different places<\/strong>. This ensures better accuracy and avoids confusion for the recipient.<\/p>\n<figure id=\"attachment_16517\" aria-describedby=\"caption-attachment-16517\" style=\"width: 554px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/08\/Screen-of-fake-email.webp\" alt=\"Security Risks of .Zip Domain \" width=\"554\" height=\"574\" class=\"size-full wp-image-16517\" title=\"\" srcset=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/08\/Screen-of-fake-email.webp 554w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/08\/Screen-of-fake-email-290x300.webp 290w\" sizes=\"auto, (max-width: 554px) 100vw, 554px\" \/><figcaption id=\"caption-attachment-16517\" class=\"wp-caption-text\">Email that Cybercriminals might have crafted for use<\/figcaption><\/figure>\n<p>This is an <a href=\"https:\/\/gridinsoft.com\/blogs\/mcafee-scam-email\/\">example of a common scam<\/a> created by cybercriminals. They send an email with an attachment named <code>\"attachment.zip,\"<\/code> claiming it is a necessary software update. The email contains a link that seems to open the attachment but actually <strong>leads to a remote URL<\/strong>. It&#8217;s a sneaky tactic used to deceive unsuspecting users.<\/p>\n<h2>The Browser file archiver<\/h2>\n<p>There is a phishing kit called <code>\"file archiver in the browser\"<\/code> that uses ZIP domains to trick users into running malicious files. This attack makes <strong>fake WinRAR or Windows File Explorer<\/strong> windows appear in the browser, making it seem like the user is using actual software. Also, to make it even more convincing, the attackers are using a .zip domain. A security researcher recently discovered this phishing tactic.<\/p>\n<figure id=\"attachment_16519\" aria-describedby=\"caption-attachment-16519\" style=\"width: 796px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/08\/Fake-in-browser-WinRar-screen.webp\" alt=\"The Browser file archiver\" width=\"796\" height=\"450\" class=\"size-full wp-image-16519\" title=\"\" srcset=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/08\/Fake-in-browser-WinRar-screen.webp 796w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/08\/Fake-in-browser-WinRar-screen-300x170.webp 300w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/08\/Fake-in-browser-WinRar-screen-768x434.webp 768w\" sizes=\"auto, (max-width: 796px) 100vw, 796px\" \/><figcaption id=\"caption-attachment-16519\" class=\"wp-caption-text\">Fake in-browser WinRar screen pretending to open a ZIP archive<\/figcaption><\/figure>\n<p>With the toolkit, it is possible to create a fake WinRar window within the browser that appears to open a ZIP archive and show its contents when accessing a .zip domain. But, this <strong>can be used to deceive users<\/strong>.<br \/>\nIn conclusion, threat actors may use this phishing toolkit to steal credentials and distribute malware.<\/p>\n<h2>What are .zip domain phishing risks?<\/h2>\n<p>Security researchers have warned that domains using the &#8220;.zip&#8221; top-level and similar domains <strong>increase the chances of exposing sensitive information<\/strong> due to <a href=\"https:\/\/gridinsoft.com\/blogs\/dns-spoofing-vs-dns-hijacking\/\">accidental DNS<\/a> or web requests. With the new .zip TLDs, internet browsers and messaging applications like Telegram recognize strings that end with .zip as URLs and automatically create hyperlinks.<\/p>\n<p><p>It has been found that <strong>these domains are susceptible to abuse<\/strong>, as evidenced by Silent Push Labs. This cyber intelligence firm recently detected a phishing page at microsoft-office[.]zip. This page designed to steal Microsoft Account credentials.<\/p>\n<p>\nhttps:\/\/twitter.com\/silentpush_labs\/status\/1657370708173783041?s=20<\/p>\n<p>There is a debate among developers, security researchers, and IT administrators regarding the recent developments. Some believe the <strong>concerns surrounding the ZIP and MOV top-level domains (TLDs) are unfounded<\/strong>. In contrast, others think these TLDs pose an avoidable risk in an already precarious online environment.<\/p>\n<p><h2>Recommendations<\/h2>\n<p>Be cautious of websites with a .zip Top-Level Domain (TLD), as they may contain harmful content.<\/p>\n<ul>\n<li><strong>Monitor your company&#8217;s web traffic<\/strong> and observe any unusual activities related to .zip TLDs. Above all, keep a close eye on these activities to ensure the safety and security of your company&#8217;s online presence.<\/li>\n<li><strong>To enhance protection<\/strong> against possible threats, it&#8217;s advisable to introduce email filters that target messages containing .zip TLDs in their content. <\/li>\n<li><strong>Keep your antivirus software updated<\/strong> to ensure it&#8217;s working at its best against any new threats. Make sure to check for updates to stay protected regularly.<\/li>\n<li>It&#8217;s essential <strong>to stay informed about emerging threats<\/strong> to stay safe from potential dangers. Also, Regularly reading security bulletins and reports can help you avoid these threats.<\/li>\n<\/ul>\n<p style=\"padding-top:15px;padding-bottom:15px;\"><a href=\"\/download\/antimalware\" rel=\"nofollow\"><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"\/blogs\/wp-content\/uploads\/2022\/07\/env02.webp\" alt=\"Are .zip Domains Safe to Use and Visit?\" width=\"798\" height=\"336\" class=\"aligncenter size-full\" title=\"\"><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Internet has become our second home. Every time we surf the Internet, we scammed. And this time, cybercriminals did not miss their chance to deceive us using a new &#8220;.zip&#8221; domain. What&#8217;s a .zip domain? Some time ago, Google allowed new Top Level Domain (TLD) names for registration. Those are .zip, .mov, and .phd. [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":16527,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","_sitemap_exclude":false,"_sitemap_priority":"","_sitemap_frequency":"","footnotes":""},"categories":[15],"tags":[619,40,131],"class_list":{"0":"post-16512","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security-news","8":"tag-cybersecurity","9":"tag-online-security","10":"tag-phishing"},"featured_image_src":"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/08\/GS_Blog_banner_Are-.zip-Domains-Safe-to-Use-and-Visit__1280x674.webp","author_info":{"display_name":"Stephanie Adlam","author_link":"https:\/\/gridinsoft.com\/blogs\/author\/adlam\/"},"_links":{"self":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/16512","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/comments?post=16512"}],"version-history":[{"count":14,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/16512\/revisions"}],"predecessor-version":[{"id":16528,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/16512\/revisions\/16528"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/media\/16527"}],"wp:attachment":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/media?parent=16512"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/categories?post=16512"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/tags?post=16512"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}