SlideShare a Scribd company logo
1 of 38
Download to read offline
What the Redaction of WHOIS Data Means for Cybersecurity
Privacy or Accountability
Content
1: Executive Summary
2: WHOIS After the GDPR: Who Can See Who?
3: Redaction of Contact Emails: The Data
4: Redaction of Contact Emails: The Implications
5: Conclusion
Executive Summary
Executive Summary
WHOIS data has usually been the starting point for security
professionals, incident responders, and forensic investigators when
a suspected cyber attack takes place. WHOIS registrant,
administrative, and technical details are deemed reliable by
investigators, as using fake registrant credentials when purchasing a
domain is a violation of the Internet Corporation for Assigned
Names and Numbers (ICANN) terms of service.
By making it a requirement for domain owners to
provide their email address and other personal
details and making them publicly accessible, the
ICANN has somehow given them the accountability
to use their websites ethically and legally. While this
policy has neither eradicated nor even prevented
cybercrime completely, it does provide a valuable
resource for forensic investigation and threat
prevention
Executive Summary
A registrant’s email address, for instance, allows investigators to directly contact the owner of a
domain without having to go through other channels. Email addresses are also a handy resource
for domain disputes and complaints about copyright infringement, among other things.
WHOIS data, in its totality, is an abundant reservoir that aids organizations in strengthening their
cybersecurity posture.
These publicly available records have been used to trace sources of malware, detect and
investigate fraud, as well as tracking down cyber attackers.
The Premise
In this comprehensive study, however, we found a significant number of redacted domain
registrant email addresses. One justification for this could be the ICANN’s adherence to laws
such as the General Data Protection Regulation (GDPR). But how does privacy protection affect
cybersecurity processes that range from threat detection and prevention to incident response
and investigation?
The odds are that cybercriminals are taking advantage of the anonymity the option provides and
are increasingly using anonymously registered domains maliciously to attack organizations.
With this premise in mind, this paper examines the evolution of WHOIS
data availability, the volume of records with redacted email addresses,
and the implications of information redaction.
 .com
 .org
 .net
 .biz
 .info
This study covers 1,334 top-level domains (TLDs) and 285,238,124 domains within these
TLDs. We examined five of the original or old generic TLDs (gTLDs), namely
Sources of Data
 .top
 .club
 .loan
 .vip
 .shop
 .work
 .ltd
 .app
 .live
 .win
 .blog
 .life
 .cloud
 .online
 .stream
 .world
 .bid
 .link
 .wang
 .site
 .today
 .rocks
 .trade
 .xyz
 .email
 .review
We also looked at email redaction among the top 25 new gTLDs:
Sources of Data
 .fr
 .au
 .it
 .ca
 .us
 .in
 .asia
 .hk
 .sg
 .nyc
For the country-code TLDs (ccTLDs), the paper examined the following:
Sources of Data
Sources of Data
Aside from email redaction in these TLDs, we also took into
consideration the monthly Domain Abuse Activity Reporting of
the ICANN to obtain information on the number of domains
that are possibly abused.
WHOIS After GDPR: Who Can See Who?
WHOIS is a search and response protocol that allows anyone
to look up the details of a domain’s owner. It answers the
question, “Who is responsible for this domain?” – hence the
name. This information is called WHOIS data and may include
the name, email address, phone number and address of the
registrant as well as the domain’s administrative, technical,
and billing contacts.
WHOIS data is stored in different databases maintained by
various registrars and registries, all of whom need ICANN
accreditation to operate.
WHOIS After GDPR: Who Can See Who?
WHOIS After GDPR: Who Can See Who?
Registrars have been required to publish their registrants’ WHOIS data since the 1980s, but that changed in May
2018, when the ICANN introduced the Temporary Specification for gTLD Registration Data as a way for registry
operators to comply with the GDPR without forsaking its policies.
Registrars are still required to collect
registration data from domain owners, but
divulging personal data is only allowed to
users with legitimate reasons.
Legitimate and proportionate purposes
include those related to “law enforcement,
competition, consumer protection, trust,
security, stability, resiliency, malicious
abuse, sovereignty, and rights protection.”
Since the contact information of
registrants is no longer publicly available,
registrars are required to put up a generic
email address or an online contact form,
so interested people still have a way to
get in touch with the registrant.
NOTE: While all these restrictions are under a temporary guideline, the ICANN’s proposal for permanent GDPR compliance suggests
that access to full WHOIS data is set by using a tiered or layered framework, depending on the legitimate purpose of queries.
The critical points of this new policy are outlined below:
The Data
In line with this development, we checked
285,238,124 domains distributed across more
than 1,333 gTLDs and found that only 77,918,723
domains (27.32%) have registrant email
addresses. The rest — exactly 207,319,401
(72.68%) — did not include any email addresses.
WHOIS Registrant Email Address Redaction Comparison: Old gTLDs, New
gTLDs, and ccTLDs
We found that 67.55% (more than 106 million) of
.com domains, 95.10% (almost 19 million) of .org
domains, and 67.49% (close to 16 million) .net
domains do not have registrant email addresses.
Almost all of the .biz and .info domains do not
have registrant email addresses either.
Old gTLD Total Domain Count Domains with Redacted Email
Addresses
Domains with Nonredacted
Email Addresses
.com 157,261,416 106,236,954 51,024,462
.org 198,64,606 18,890,454 974,152
.net 23,601,444 15,929,125 7,672,319
.biz 3,664,389 3,659,863 4,526
.info 9,069,995 9,063,340 6,655
This table shows the exact number of domains with redacted and non-redacted
email addresses for each old gTLD.
WHOIS Registrant Email Address Redaction Comparison: Old gTLDs, New
gTLDs, and ccTLDs
WHOIS Registrant Email Address Redaction Comparison: Old gTLDs, New
gTLDs, and ccTLDs
We also examined the 25 most popular new
gTLDs and found that a majority (more than
99%) do not have registrant email addresses.
.Wang and .top domains were the least
redacted, on the other hand. Only 0.37% of
.wang and 12.49% of .top domains do not have
registrant email addresses.
WHOIS Registrant Email Address Redaction Comparison: Old gTLDs, New
gTLDs, and ccTLDs
Looking at the ccTLDs, meanwhile, revealed that five of the most used ccTLDs have close to 100% email address
redaction, particularly for .au, .it, .in, .asia, and .nyc domains. More than a third (77.66%) of .ca domains do not have
registrant email addresses, while the rest — particularly .fr, .us, .hk, and .sg domains — indicate email contact details.
Redaction of Contact Emails: The Implications
Redaction of Contact Emails: The Implications
With the majority of registrant email addresses and other personal
information hidden from the public and accessible only to authenticated
users, the starting point for cybersecurity incident response and
investigation — WHOIS data — becomes unavailable.
Privacy protection for domain registrants somehow sent the
wrong message to people with ill intentions: they are less
accountable for domain ownership. The anonymity that private
registration provides has given attackers confidence to obtain
domains for their attacks without divulging their true identities
and locations. Indeed, our research has revealed recently that
there is a tremendous amount of typosquatted domains
registered every day, and all of them have redacted WHOIS
data.
Implication #1: Cybercriminals Are Gaining Confidence
Implication #1: Cybercriminals Are Gaining Confidence
In the guise of protecting their privacy, cybercriminals can more easily
register domains for typosquatting or URL hijacking. For example, they
may register misspelled variations or internationalized versions of popular
domains to take advantage of people who are prone to making typos
when accessing sites.
Several typosquatted domains can predominate in phishing campaigns.
Because some misspellings are easy to miss, victims have often given out
their credentials before realizing they are on the wrong page. The more
popular a website is, the more likely it is to be spoofed. Banks, credit card
providers, online invoicing companies, media outfits, and other reputable
institutions make up the list of most-spoofed entities.
For instance, when we key in PayPal
(the second most-spoofed site) using Brand
Monitor, the tool alerts us instantly that 280
misspelled variants of the brand would be
included in our tracker.
Adversaries can use any of these domains
to launch phishing campaigns targeting
PayPal users.
Implication #1: Cybercriminals Are Gaining Confidence
Implication #1: Cybercriminals Are Gaining Confidence
We ran a WHOIS search for one of the misspelled domains — paypal[.]con — and found that it is
available for registration.
That means any enterprising cybercriminal can easily create a fake PayPal page on this domain and
use it for phishing attacks. He/she is likely to get less careful typists to visit it too, given that “n” and
“m” lie next to each other on the keyboard.
Brand Monitor and WHOIS Search are part of
our Domain Research Suite, which site owners
can use to detect, investigate, and defend against
threats such as typosquatting, website spoofing,
and phishing.
Implication #2: When It Comes To gTLDs, Old Does NOT Mean Reputable
The misspelled domain paypol[.]com (notice the
typo “o” instead of the second “a”) uses a legacy
gTLD, but that does not mean it is legitimate or
trustworthy. This fact leads us to a critical point in
our data analysis: A domain’s TLD is no longer a
reliable indicator of its reputability.
In the past, when people ask how they can
determine if a website is reliable, they were often
advised to look at its gTLD. Our data, however,
shows that the majority of the domains sporting
the oldest gTLDs do not have any email addresses.
And so if these end up used in attacks, conducting
a forensic investigation would be more
challenging. Of course, the mere fact that the
registrant's data are redacted does not mean itself
that a domain is malicious.
Implication #2: When It Comes To gTLDs, Old Does NOT Mean Reputable
We also examined the ICANN’s latest Domain Abuse
Activity Reporting (DAAR) report (DAAR) report and
found that more than 30% of all gTLDs had at least
one security threat from January to October 2019.
Implication #2: When It Comes To gTLDs, Old Does NOT Mean Reputable
That translates to more than 193 million domains
possibly being used each month maliciously. The peak so
far this year was seen in October. A total of 197,100,986
domains within 364 gTLDs had ties to security threats.
So where do these security threats come from?
We’ve recently conducted a research on the role
new gTLDs in cybercrime showing that while the
number of malicious domains remains relatively
constant in legacy gTLDs, a clear upward trend in
their absolute is observable in the new ones.
However, while we see a constant rise in the
number of new gTLDs used in cyber attacks, the
old ones are not exempted either. There is no
longer a clear dividing line between new and old
gTLDs when it comes to reputability and
reliability, as cybercriminals bombard the
Internet with thousands of new domains each
day.
Implication #2: When It Comes To gTLDs, Old Does NOT Mean Reputable
As more and more domains are used maliciously,
the attack surface also grows. As such, security
teams and forensic investigators need to employ
more sophisticated methods to combat cybercrime
and attacks.
The key to strengthening any organization’s
security posture is real-time incident detection
and response. Whether an organization
employs a Threat Intelligence Platform (TIP), a
Security Information and Event Management
(SIEM) tool, or a Security Orchestration,
Automation, and Response (SOAR) solution,
these all require one thing — quality data to
analyze and act on.
Implication #3: Security Teams Need to Beef Up Their
Cybersecurity Posture with Data Feeds
Implication #3: Security Teams Need to Beef Up Their Cybersecurity
Posture with Data Feeds
Even if personal data is redacted
from WHOIS records, domain
research and monitoring tools such
as the Domain Research Suite can
still return useful results that can
serve as security teams’ starting
points for in-depth investigations.
One such tool is WHOIS History
Search, which returns a domain’s
entire ownership history, including
WHOIS data, before redaction.
Implication #3: Security Teams Need to Beef Up Their Cybersecurity
Posture with Data Feeds
In our Whois History Search Tool, we chose the misspelled variant of
paypal.com—paypol[.]com — because its current WHOIS record does not
have a registrant email address.
Among the data that WHOIS History
Search provides are the domain’s
historical records arranged by date (from
newest to oldest):
 14 November 2019
 24 September 2018
 12 July 2018
 13 January 2018
 26 September 2017
 10 August 2017
 28 December 2016
 23 April 2016
 08 April 2015
 30 September 2014
 28 March 2014
 24 November 2013
 24 July 2013
 10 April 2013
 17 September 2012
 06 March 2012
We looked at each record and found that the email address for the first three has been redacted. But the records from 13
January 2018 onward can give investigators and incident response teams a starting point for their inquiries.
As it turns out, the domain’s registrant remained the same from when the domain was created on 17 September 2012 up
until 13 January 2018. The registrant details were only redacted when it changed hands.
Implication #3: Security Teams Need to Beef Up Their Cybersecurity
Posture with Data Feeds
Note that a similar result for
paypol[.]com could also have been found
by using our command-line WHOIS tool:
Conclusion
Conclusion
Privacy protection is a global concern as cybercrime, such as
identity theft, continues to rise to alarming levels. But when
it comes to WHOIS data, the ICANN’s dilemma of balancing
between protecting registrants’ privacy and making them
accountable for their properties is evident. The latter
requires making WHOIS data publicly available even if for
registrars and the ICANN it means paying hefty fines.
If the ICANN redacts registrants’ personal details to protect
their privacy and comply with policies like the GDPR, the
result could be somewhat unintended. Cybercriminals would
gain more confidence because they would be harder to
trace. Crimes using malicious domains could rise, and
incident response teams and forensic investigators would
find it even more difficult to solve cases.
Although the ICANN’s current stance leans more toward
making domain owners accountable for their actions, it has
temporarily instructed registrars to redact registrants’
personal data from WHOIS records.
Conclusion
In light of this, security teams and forensic investigators
need to find ways to glean more insights from WHOIS
records. They can use tools such as Brand Monitor and
Domain Monitor, for instance, to get real-time alerts
related to their brands, thus enabling them to protect
against potential abusers. They can also rely on WHOIS
History Search to get more insights into any domain
despite current restrictions.
Thank You!
For any inquiries please mail us at: support@whoisxmlapi.com

More Related Content

What's hot

Cyber Claims: GDPR and business email compromise drive greater frequencies
Cyber Claims: GDPR and business email compromise drive greater frequenciesCyber Claims: GDPR and business email compromise drive greater frequencies
Cyber Claims: GDPR and business email compromise drive greater frequenciesΔρ. Γιώργος K. Κασάπης
 
NASA Cyber Security Webinar: Phishing Detection Strategies
NASA Cyber Security Webinar: Phishing Detection StrategiesNASA Cyber Security Webinar: Phishing Detection Strategies
NASA Cyber Security Webinar: Phishing Detection StrategiesPaubox, Inc.
 
What Cybercriminals Want: Company Data – by United Security Providers
What Cybercriminals Want: Company Data – by United Security ProvidersWhat Cybercriminals Want: Company Data – by United Security Providers
What Cybercriminals Want: Company Data – by United Security ProvidersUnited Security Providers AG
 
E security and payment 2013-1
E security  and payment 2013-1E security  and payment 2013-1
E security and payment 2013-1Abdelfatah hegazy
 
Application security meetup data privacy_27052021
Application security meetup data privacy_27052021Application security meetup data privacy_27052021
Application security meetup data privacy_27052021lior mazor
 
A Survey Paper on Identity Theft in the Internet
A Survey Paper on Identity Theft in the InternetA Survey Paper on Identity Theft in the Internet
A Survey Paper on Identity Theft in the Internetijtsrd
 
Dealing with Data Breaches Amidst Changes In Technology
Dealing with Data Breaches Amidst Changes In TechnologyDealing with Data Breaches Amidst Changes In Technology
Dealing with Data Breaches Amidst Changes In TechnologyCSCJournals
 
Deconstructing A Phishing Scheme
Deconstructing A Phishing SchemeDeconstructing A Phishing Scheme
Deconstructing A Phishing SchemeChristopher Duffy
 
Data breaches - Is Your Law Firm in Danger
Data breaches - Is Your Law Firm in DangerData breaches - Is Your Law Firm in Danger
Data breaches - Is Your Law Firm in DangerZitaAdlTrk
 
Cyber Risks - Legal innovation 2018
Cyber Risks - Legal innovation 2018Cyber Risks - Legal innovation 2018
Cyber Risks - Legal innovation 2018Gary Chambers
 
Anonymous email 26 aug14
Anonymous email 26 aug14Anonymous email 26 aug14
Anonymous email 26 aug14Naval OPSEC
 
Study on Phishing Attacks and Antiphishing Tools
Study on Phishing Attacks and Antiphishing ToolsStudy on Phishing Attacks and Antiphishing Tools
Study on Phishing Attacks and Antiphishing ToolsIRJET Journal
 
GDPR - What you need to know about the General Data Protection Regulation
GDPR - What you need to know about the General Data Protection RegulationGDPR - What you need to know about the General Data Protection Regulation
GDPR - What you need to know about the General Data Protection RegulationLauren Olson
 
Understanding GDPR in the context of WooCommerce
Understanding GDPR in the context of WooCommerceUnderstanding GDPR in the context of WooCommerce
Understanding GDPR in the context of WooCommerceChris Lema
 
Anatomy of a Spear Phishing Attack
Anatomy of a Spear Phishing AttackAnatomy of a Spear Phishing Attack
Anatomy of a Spear Phishing AttackMark Mair
 
FBI And Cyber Crime | Crime Stoppers International
FBI And Cyber Crime | Crime Stoppers International FBI And Cyber Crime | Crime Stoppers International
FBI And Cyber Crime | Crime Stoppers International Scott Mills
 
Driving Payment Innovation - Know Your Enemy
Driving Payment Innovation - Know Your EnemyDriving Payment Innovation - Know Your Enemy
Driving Payment Innovation - Know Your EnemyFirst Atlantic Commerce
 

What's hot (20)

Cyber Claims: GDPR and business email compromise drive greater frequencies
Cyber Claims: GDPR and business email compromise drive greater frequenciesCyber Claims: GDPR and business email compromise drive greater frequencies
Cyber Claims: GDPR and business email compromise drive greater frequencies
 
NASA Cyber Security Webinar: Phishing Detection Strategies
NASA Cyber Security Webinar: Phishing Detection StrategiesNASA Cyber Security Webinar: Phishing Detection Strategies
NASA Cyber Security Webinar: Phishing Detection Strategies
 
What Cybercriminals Want: Company Data – by United Security Providers
What Cybercriminals Want: Company Data – by United Security ProvidersWhat Cybercriminals Want: Company Data – by United Security Providers
What Cybercriminals Want: Company Data – by United Security Providers
 
E security and payment 2013-1
E security  and payment 2013-1E security  and payment 2013-1
E security and payment 2013-1
 
Application security meetup data privacy_27052021
Application security meetup data privacy_27052021Application security meetup data privacy_27052021
Application security meetup data privacy_27052021
 
A Survey Paper on Identity Theft in the Internet
A Survey Paper on Identity Theft in the InternetA Survey Paper on Identity Theft in the Internet
A Survey Paper on Identity Theft in the Internet
 
Dealing with Data Breaches Amidst Changes In Technology
Dealing with Data Breaches Amidst Changes In TechnologyDealing with Data Breaches Amidst Changes In Technology
Dealing with Data Breaches Amidst Changes In Technology
 
Deconstructing A Phishing Scheme
Deconstructing A Phishing SchemeDeconstructing A Phishing Scheme
Deconstructing A Phishing Scheme
 
Data breaches - Is Your Law Firm in Danger
Data breaches - Is Your Law Firm in DangerData breaches - Is Your Law Firm in Danger
Data breaches - Is Your Law Firm in Danger
 
B istr main-report_v18_2012_21291018.en-us
B istr main-report_v18_2012_21291018.en-usB istr main-report_v18_2012_21291018.en-us
B istr main-report_v18_2012_21291018.en-us
 
B intelligence report-08-2013.en-us
B intelligence report-08-2013.en-usB intelligence report-08-2013.en-us
B intelligence report-08-2013.en-us
 
Cyber Risks - Legal innovation 2018
Cyber Risks - Legal innovation 2018Cyber Risks - Legal innovation 2018
Cyber Risks - Legal innovation 2018
 
Anonymous email 26 aug14
Anonymous email 26 aug14Anonymous email 26 aug14
Anonymous email 26 aug14
 
Study on Phishing Attacks and Antiphishing Tools
Study on Phishing Attacks and Antiphishing ToolsStudy on Phishing Attacks and Antiphishing Tools
Study on Phishing Attacks and Antiphishing Tools
 
GDPR - What you need to know about the General Data Protection Regulation
GDPR - What you need to know about the General Data Protection RegulationGDPR - What you need to know about the General Data Protection Regulation
GDPR - What you need to know about the General Data Protection Regulation
 
Understanding GDPR in the context of WooCommerce
Understanding GDPR in the context of WooCommerceUnderstanding GDPR in the context of WooCommerce
Understanding GDPR in the context of WooCommerce
 
Hacker Hunters Case Study
Hacker Hunters Case StudyHacker Hunters Case Study
Hacker Hunters Case Study
 
Anatomy of a Spear Phishing Attack
Anatomy of a Spear Phishing AttackAnatomy of a Spear Phishing Attack
Anatomy of a Spear Phishing Attack
 
FBI And Cyber Crime | Crime Stoppers International
FBI And Cyber Crime | Crime Stoppers International FBI And Cyber Crime | Crime Stoppers International
FBI And Cyber Crime | Crime Stoppers International
 
Driving Payment Innovation - Know Your Enemy
Driving Payment Innovation - Know Your EnemyDriving Payment Innovation - Know Your Enemy
Driving Payment Innovation - Know Your Enemy
 

Similar to What the Redaction of WHOIS Data Means for Cybersecurity

UK Cyber Vulnerability Index 2013
UK Cyber Vulnerability Index 2013UK Cyber Vulnerability Index 2013
UK Cyber Vulnerability Index 2013Martin Jordan
 
Fintech Cyber Security Survey Hong Knog 2018
Fintech Cyber Security Survey Hong Knog 2018Fintech Cyber Security Survey Hong Knog 2018
Fintech Cyber Security Survey Hong Knog 2018Entersoft Security
 
Online Brand Protection: Fighting Domain Name Typosquatting, Website Spoofing...
Online Brand Protection:Fighting Domain Name Typosquatting, Website Spoofing...Online Brand Protection:Fighting Domain Name Typosquatting, Website Spoofing...
Online Brand Protection: Fighting Domain Name Typosquatting, Website Spoofing...WhoisXML API
 
Top Law Firm Cyber Attacks Throughout History
Top Law Firm Cyber Attacks Throughout HistoryTop Law Firm Cyber Attacks Throughout History
Top Law Firm Cyber Attacks Throughout HistoryProtected Harbor
 
List of data breaches and cyber attacks in january 2022
List of data breaches and cyber attacks in january 2022List of data breaches and cyber attacks in january 2022
List of data breaches and cyber attacks in january 2022ndcmanagement
 
Case 11. What exactly occurred Twitter is one of popular soci.docx
Case 11. What exactly occurred Twitter is one of popular soci.docxCase 11. What exactly occurred Twitter is one of popular soci.docx
Case 11. What exactly occurred Twitter is one of popular soci.docxtidwellveronique
 
Running head SOCIAL ENGINEERING1SOCIAL ENGINEERING 6As a .docx
Running head SOCIAL ENGINEERING1SOCIAL ENGINEERING 6As a .docxRunning head SOCIAL ENGINEERING1SOCIAL ENGINEERING 6As a .docx
Running head SOCIAL ENGINEERING1SOCIAL ENGINEERING 6As a .docxtodd521
 
Hacker Defense: How to Make Your Law Firm a Harder Target
Hacker Defense: How to Make Your Law Firm a Harder TargetHacker Defense: How to Make Your Law Firm a Harder Target
Hacker Defense: How to Make Your Law Firm a Harder TargetLexisNexis
 
Edu 03 assingment
Edu 03 assingmentEdu 03 assingment
Edu 03 assingmentAswani34
 
Combating Phishing Attacks
Combating Phishing AttacksCombating Phishing Attacks
Combating Phishing AttacksRapid7
 
3rd Party Cyber Security: Manage your ecosystem!
3rd Party Cyber Security: Manage your ecosystem!3rd Party Cyber Security: Manage your ecosystem!
3rd Party Cyber Security: Manage your ecosystem!NormShield, Inc.
 
Information security management v2010
Information security management v2010Information security management v2010
Information security management v2010joevest
 
SS236 Unit 8 Assignment Rubric Content 70 Points Do.docx
 SS236 Unit 8 Assignment Rubric Content 70 Points Do.docx SS236 Unit 8 Assignment Rubric Content 70 Points Do.docx
SS236 Unit 8 Assignment Rubric Content 70 Points Do.docxaryan532920
 
New regulations and the evolving cybersecurity technology landscape
New regulations and the evolving cybersecurity technology landscapeNew regulations and the evolving cybersecurity technology landscape
New regulations and the evolving cybersecurity technology landscapeUlf Mattsson
 
PHISHING URL DETECTION USING LSTM BASED ENSEMBLE LEARNING APPROACHES
PHISHING URL DETECTION USING LSTM BASED ENSEMBLE LEARNING APPROACHESPHISHING URL DETECTION USING LSTM BASED ENSEMBLE LEARNING APPROACHES
PHISHING URL DETECTION USING LSTM BASED ENSEMBLE LEARNING APPROACHESIJCNCJournal
 
Phishing URL Detection using LSTM Based Ensemble Learning Approaches
Phishing URL Detection using LSTM Based Ensemble Learning ApproachesPhishing URL Detection using LSTM Based Ensemble Learning Approaches
Phishing URL Detection using LSTM Based Ensemble Learning ApproachesIJCNCJournal
 
Detecting malicious URLs using binary classification through ada boost algori...
Detecting malicious URLs using binary classification through ada boost algori...Detecting malicious URLs using binary classification through ada boost algori...
Detecting malicious URLs using binary classification through ada boost algori...IJECEIAES
 
Eamonn O Raghallaigh Major Security Issues In E Commerce
Eamonn O Raghallaigh   Major Security Issues In E CommerceEamonn O Raghallaigh   Major Security Issues In E Commerce
Eamonn O Raghallaigh Major Security Issues In E CommerceEamonnORagh
 

Similar to What the Redaction of WHOIS Data Means for Cybersecurity (20)

UK Cyber Vulnerability Index 2013
UK Cyber Vulnerability Index 2013UK Cyber Vulnerability Index 2013
UK Cyber Vulnerability Index 2013
 
Fintech Cyber Security Survey Hong Knog 2018
Fintech Cyber Security Survey Hong Knog 2018Fintech Cyber Security Survey Hong Knog 2018
Fintech Cyber Security Survey Hong Knog 2018
 
Online Brand Protection: Fighting Domain Name Typosquatting, Website Spoofing...
Online Brand Protection:Fighting Domain Name Typosquatting, Website Spoofing...Online Brand Protection:Fighting Domain Name Typosquatting, Website Spoofing...
Online Brand Protection: Fighting Domain Name Typosquatting, Website Spoofing...
 
Top Law Firm Cyber Attacks Throughout History
Top Law Firm Cyber Attacks Throughout HistoryTop Law Firm Cyber Attacks Throughout History
Top Law Firm Cyber Attacks Throughout History
 
Data Breach Detection: Are you ready for GDPR?
Data Breach Detection: Are you ready for GDPR?Data Breach Detection: Are you ready for GDPR?
Data Breach Detection: Are you ready for GDPR?
 
List of data breaches and cyber attacks in january 2022
List of data breaches and cyber attacks in january 2022List of data breaches and cyber attacks in january 2022
List of data breaches and cyber attacks in january 2022
 
Case 11. What exactly occurred Twitter is one of popular soci.docx
Case 11. What exactly occurred Twitter is one of popular soci.docxCase 11. What exactly occurred Twitter is one of popular soci.docx
Case 11. What exactly occurred Twitter is one of popular soci.docx
 
Running head SOCIAL ENGINEERING1SOCIAL ENGINEERING 6As a .docx
Running head SOCIAL ENGINEERING1SOCIAL ENGINEERING 6As a .docxRunning head SOCIAL ENGINEERING1SOCIAL ENGINEERING 6As a .docx
Running head SOCIAL ENGINEERING1SOCIAL ENGINEERING 6As a .docx
 
Hacker Defense: How to Make Your Law Firm a Harder Target
Hacker Defense: How to Make Your Law Firm a Harder TargetHacker Defense: How to Make Your Law Firm a Harder Target
Hacker Defense: How to Make Your Law Firm a Harder Target
 
Edu 03 assingment
Edu 03 assingmentEdu 03 assingment
Edu 03 assingment
 
Combating Phishing Attacks
Combating Phishing AttacksCombating Phishing Attacks
Combating Phishing Attacks
 
3rd Party Cyber Security: Manage your ecosystem!
3rd Party Cyber Security: Manage your ecosystem!3rd Party Cyber Security: Manage your ecosystem!
3rd Party Cyber Security: Manage your ecosystem!
 
Information security management v2010
Information security management v2010Information security management v2010
Information security management v2010
 
SS236 Unit 8 Assignment Rubric Content 70 Points Do.docx
 SS236 Unit 8 Assignment Rubric Content 70 Points Do.docx SS236 Unit 8 Assignment Rubric Content 70 Points Do.docx
SS236 Unit 8 Assignment Rubric Content 70 Points Do.docx
 
New regulations and the evolving cybersecurity technology landscape
New regulations and the evolving cybersecurity technology landscapeNew regulations and the evolving cybersecurity technology landscape
New regulations and the evolving cybersecurity technology landscape
 
Social Media Security
Social Media SecuritySocial Media Security
Social Media Security
 
PHISHING URL DETECTION USING LSTM BASED ENSEMBLE LEARNING APPROACHES
PHISHING URL DETECTION USING LSTM BASED ENSEMBLE LEARNING APPROACHESPHISHING URL DETECTION USING LSTM BASED ENSEMBLE LEARNING APPROACHES
PHISHING URL DETECTION USING LSTM BASED ENSEMBLE LEARNING APPROACHES
 
Phishing URL Detection using LSTM Based Ensemble Learning Approaches
Phishing URL Detection using LSTM Based Ensemble Learning ApproachesPhishing URL Detection using LSTM Based Ensemble Learning Approaches
Phishing URL Detection using LSTM Based Ensemble Learning Approaches
 
Detecting malicious URLs using binary classification through ada boost algori...
Detecting malicious URLs using binary classification through ada boost algori...Detecting malicious URLs using binary classification through ada boost algori...
Detecting malicious URLs using binary classification through ada boost algori...
 
Eamonn O Raghallaigh Major Security Issues In E Commerce
Eamonn O Raghallaigh   Major Security Issues In E CommerceEamonn O Raghallaigh   Major Security Issues In E Commerce
Eamonn O Raghallaigh Major Security Issues In E Commerce
 

Recently uploaded

Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Call Girls in Nagpur High Profile
 
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...Neha Pandey
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableSeo
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceDelhi Call girls
 
CALL ON ➥8923113531 🔝Call Girls Lucknow Lucknow best sexual service Online
CALL ON ➥8923113531 🔝Call Girls Lucknow Lucknow best sexual service OnlineCALL ON ➥8923113531 🔝Call Girls Lucknow Lucknow best sexual service Online
CALL ON ➥8923113531 🔝Call Girls Lucknow Lucknow best sexual service Onlineanilsa9823
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGAPNIC
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Sheetaleventcompany
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...APNIC
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLimonikaupta
 
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.soniya singh
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...Diya Sharma
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.soniya singh
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girladitipandeya
 
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.soniya singh
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Servicesexy call girls service in goa
 

Recently uploaded (20)

Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
 
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
 
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
 
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
Russian Call Girls in %(+971524965298  )#  Call Girls in DubaiRussian Call Girls in %(+971524965298  )#  Call Girls in Dubai
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
 
@9999965857 🫦 Sexy Desi Call Girls Laxmi Nagar 💓 High Profile Escorts Delhi 🫶
@9999965857 🫦 Sexy Desi Call Girls Laxmi Nagar 💓 High Profile Escorts Delhi 🫶@9999965857 🫦 Sexy Desi Call Girls Laxmi Nagar 💓 High Profile Escorts Delhi 🫶
@9999965857 🫦 Sexy Desi Call Girls Laxmi Nagar 💓 High Profile Escorts Delhi 🫶
 
CALL ON ➥8923113531 🔝Call Girls Lucknow Lucknow best sexual service Online
CALL ON ➥8923113531 🔝Call Girls Lucknow Lucknow best sexual service OnlineCALL ON ➥8923113531 🔝Call Girls Lucknow Lucknow best sexual service Online
CALL ON ➥8923113531 🔝Call Girls Lucknow Lucknow best sexual service Online
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOG
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
 
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
 
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
 
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
 

What the Redaction of WHOIS Data Means for Cybersecurity

  • 1. What the Redaction of WHOIS Data Means for Cybersecurity Privacy or Accountability
  • 2. Content 1: Executive Summary 2: WHOIS After the GDPR: Who Can See Who? 3: Redaction of Contact Emails: The Data 4: Redaction of Contact Emails: The Implications 5: Conclusion
  • 4. Executive Summary WHOIS data has usually been the starting point for security professionals, incident responders, and forensic investigators when a suspected cyber attack takes place. WHOIS registrant, administrative, and technical details are deemed reliable by investigators, as using fake registrant credentials when purchasing a domain is a violation of the Internet Corporation for Assigned Names and Numbers (ICANN) terms of service. By making it a requirement for domain owners to provide their email address and other personal details and making them publicly accessible, the ICANN has somehow given them the accountability to use their websites ethically and legally. While this policy has neither eradicated nor even prevented cybercrime completely, it does provide a valuable resource for forensic investigation and threat prevention
  • 5. Executive Summary A registrant’s email address, for instance, allows investigators to directly contact the owner of a domain without having to go through other channels. Email addresses are also a handy resource for domain disputes and complaints about copyright infringement, among other things. WHOIS data, in its totality, is an abundant reservoir that aids organizations in strengthening their cybersecurity posture. These publicly available records have been used to trace sources of malware, detect and investigate fraud, as well as tracking down cyber attackers.
  • 6. The Premise In this comprehensive study, however, we found a significant number of redacted domain registrant email addresses. One justification for this could be the ICANN’s adherence to laws such as the General Data Protection Regulation (GDPR). But how does privacy protection affect cybersecurity processes that range from threat detection and prevention to incident response and investigation? The odds are that cybercriminals are taking advantage of the anonymity the option provides and are increasingly using anonymously registered domains maliciously to attack organizations. With this premise in mind, this paper examines the evolution of WHOIS data availability, the volume of records with redacted email addresses, and the implications of information redaction.
  • 7.  .com  .org  .net  .biz  .info This study covers 1,334 top-level domains (TLDs) and 285,238,124 domains within these TLDs. We examined five of the original or old generic TLDs (gTLDs), namely Sources of Data
  • 8.  .top  .club  .loan  .vip  .shop  .work  .ltd  .app  .live  .win  .blog  .life  .cloud  .online  .stream  .world  .bid  .link  .wang  .site  .today  .rocks  .trade  .xyz  .email  .review We also looked at email redaction among the top 25 new gTLDs: Sources of Data
  • 9.  .fr  .au  .it  .ca  .us  .in  .asia  .hk  .sg  .nyc For the country-code TLDs (ccTLDs), the paper examined the following: Sources of Data
  • 10. Sources of Data Aside from email redaction in these TLDs, we also took into consideration the monthly Domain Abuse Activity Reporting of the ICANN to obtain information on the number of domains that are possibly abused.
  • 11. WHOIS After GDPR: Who Can See Who?
  • 12. WHOIS is a search and response protocol that allows anyone to look up the details of a domain’s owner. It answers the question, “Who is responsible for this domain?” – hence the name. This information is called WHOIS data and may include the name, email address, phone number and address of the registrant as well as the domain’s administrative, technical, and billing contacts. WHOIS data is stored in different databases maintained by various registrars and registries, all of whom need ICANN accreditation to operate. WHOIS After GDPR: Who Can See Who?
  • 13. WHOIS After GDPR: Who Can See Who? Registrars have been required to publish their registrants’ WHOIS data since the 1980s, but that changed in May 2018, when the ICANN introduced the Temporary Specification for gTLD Registration Data as a way for registry operators to comply with the GDPR without forsaking its policies. Registrars are still required to collect registration data from domain owners, but divulging personal data is only allowed to users with legitimate reasons. Legitimate and proportionate purposes include those related to “law enforcement, competition, consumer protection, trust, security, stability, resiliency, malicious abuse, sovereignty, and rights protection.” Since the contact information of registrants is no longer publicly available, registrars are required to put up a generic email address or an online contact form, so interested people still have a way to get in touch with the registrant. NOTE: While all these restrictions are under a temporary guideline, the ICANN’s proposal for permanent GDPR compliance suggests that access to full WHOIS data is set by using a tiered or layered framework, depending on the legitimate purpose of queries. The critical points of this new policy are outlined below:
  • 14. The Data In line with this development, we checked 285,238,124 domains distributed across more than 1,333 gTLDs and found that only 77,918,723 domains (27.32%) have registrant email addresses. The rest — exactly 207,319,401 (72.68%) — did not include any email addresses.
  • 15. WHOIS Registrant Email Address Redaction Comparison: Old gTLDs, New gTLDs, and ccTLDs We found that 67.55% (more than 106 million) of .com domains, 95.10% (almost 19 million) of .org domains, and 67.49% (close to 16 million) .net domains do not have registrant email addresses. Almost all of the .biz and .info domains do not have registrant email addresses either.
  • 16. Old gTLD Total Domain Count Domains with Redacted Email Addresses Domains with Nonredacted Email Addresses .com 157,261,416 106,236,954 51,024,462 .org 198,64,606 18,890,454 974,152 .net 23,601,444 15,929,125 7,672,319 .biz 3,664,389 3,659,863 4,526 .info 9,069,995 9,063,340 6,655 This table shows the exact number of domains with redacted and non-redacted email addresses for each old gTLD. WHOIS Registrant Email Address Redaction Comparison: Old gTLDs, New gTLDs, and ccTLDs
  • 17. WHOIS Registrant Email Address Redaction Comparison: Old gTLDs, New gTLDs, and ccTLDs We also examined the 25 most popular new gTLDs and found that a majority (more than 99%) do not have registrant email addresses. .Wang and .top domains were the least redacted, on the other hand. Only 0.37% of .wang and 12.49% of .top domains do not have registrant email addresses.
  • 18. WHOIS Registrant Email Address Redaction Comparison: Old gTLDs, New gTLDs, and ccTLDs Looking at the ccTLDs, meanwhile, revealed that five of the most used ccTLDs have close to 100% email address redaction, particularly for .au, .it, .in, .asia, and .nyc domains. More than a third (77.66%) of .ca domains do not have registrant email addresses, while the rest — particularly .fr, .us, .hk, and .sg domains — indicate email contact details.
  • 19. Redaction of Contact Emails: The Implications
  • 20. Redaction of Contact Emails: The Implications With the majority of registrant email addresses and other personal information hidden from the public and accessible only to authenticated users, the starting point for cybersecurity incident response and investigation — WHOIS data — becomes unavailable.
  • 21. Privacy protection for domain registrants somehow sent the wrong message to people with ill intentions: they are less accountable for domain ownership. The anonymity that private registration provides has given attackers confidence to obtain domains for their attacks without divulging their true identities and locations. Indeed, our research has revealed recently that there is a tremendous amount of typosquatted domains registered every day, and all of them have redacted WHOIS data. Implication #1: Cybercriminals Are Gaining Confidence
  • 22. Implication #1: Cybercriminals Are Gaining Confidence In the guise of protecting their privacy, cybercriminals can more easily register domains for typosquatting or URL hijacking. For example, they may register misspelled variations or internationalized versions of popular domains to take advantage of people who are prone to making typos when accessing sites. Several typosquatted domains can predominate in phishing campaigns. Because some misspellings are easy to miss, victims have often given out their credentials before realizing they are on the wrong page. The more popular a website is, the more likely it is to be spoofed. Banks, credit card providers, online invoicing companies, media outfits, and other reputable institutions make up the list of most-spoofed entities.
  • 23. For instance, when we key in PayPal (the second most-spoofed site) using Brand Monitor, the tool alerts us instantly that 280 misspelled variants of the brand would be included in our tracker. Adversaries can use any of these domains to launch phishing campaigns targeting PayPal users. Implication #1: Cybercriminals Are Gaining Confidence
  • 24. Implication #1: Cybercriminals Are Gaining Confidence We ran a WHOIS search for one of the misspelled domains — paypal[.]con — and found that it is available for registration. That means any enterprising cybercriminal can easily create a fake PayPal page on this domain and use it for phishing attacks. He/she is likely to get less careful typists to visit it too, given that “n” and “m” lie next to each other on the keyboard.
  • 25. Brand Monitor and WHOIS Search are part of our Domain Research Suite, which site owners can use to detect, investigate, and defend against threats such as typosquatting, website spoofing, and phishing.
  • 26. Implication #2: When It Comes To gTLDs, Old Does NOT Mean Reputable The misspelled domain paypol[.]com (notice the typo “o” instead of the second “a”) uses a legacy gTLD, but that does not mean it is legitimate or trustworthy. This fact leads us to a critical point in our data analysis: A domain’s TLD is no longer a reliable indicator of its reputability. In the past, when people ask how they can determine if a website is reliable, they were often advised to look at its gTLD. Our data, however, shows that the majority of the domains sporting the oldest gTLDs do not have any email addresses. And so if these end up used in attacks, conducting a forensic investigation would be more challenging. Of course, the mere fact that the registrant's data are redacted does not mean itself that a domain is malicious.
  • 27. Implication #2: When It Comes To gTLDs, Old Does NOT Mean Reputable We also examined the ICANN’s latest Domain Abuse Activity Reporting (DAAR) report (DAAR) report and found that more than 30% of all gTLDs had at least one security threat from January to October 2019.
  • 28. Implication #2: When It Comes To gTLDs, Old Does NOT Mean Reputable That translates to more than 193 million domains possibly being used each month maliciously. The peak so far this year was seen in October. A total of 197,100,986 domains within 364 gTLDs had ties to security threats.
  • 29. So where do these security threats come from? We’ve recently conducted a research on the role new gTLDs in cybercrime showing that while the number of malicious domains remains relatively constant in legacy gTLDs, a clear upward trend in their absolute is observable in the new ones. However, while we see a constant rise in the number of new gTLDs used in cyber attacks, the old ones are not exempted either. There is no longer a clear dividing line between new and old gTLDs when it comes to reputability and reliability, as cybercriminals bombard the Internet with thousands of new domains each day. Implication #2: When It Comes To gTLDs, Old Does NOT Mean Reputable
  • 30. As more and more domains are used maliciously, the attack surface also grows. As such, security teams and forensic investigators need to employ more sophisticated methods to combat cybercrime and attacks. The key to strengthening any organization’s security posture is real-time incident detection and response. Whether an organization employs a Threat Intelligence Platform (TIP), a Security Information and Event Management (SIEM) tool, or a Security Orchestration, Automation, and Response (SOAR) solution, these all require one thing — quality data to analyze and act on. Implication #3: Security Teams Need to Beef Up Their Cybersecurity Posture with Data Feeds
  • 31. Implication #3: Security Teams Need to Beef Up Their Cybersecurity Posture with Data Feeds Even if personal data is redacted from WHOIS records, domain research and monitoring tools such as the Domain Research Suite can still return useful results that can serve as security teams’ starting points for in-depth investigations. One such tool is WHOIS History Search, which returns a domain’s entire ownership history, including WHOIS data, before redaction.
  • 32. Implication #3: Security Teams Need to Beef Up Their Cybersecurity Posture with Data Feeds In our Whois History Search Tool, we chose the misspelled variant of paypal.com—paypol[.]com — because its current WHOIS record does not have a registrant email address. Among the data that WHOIS History Search provides are the domain’s historical records arranged by date (from newest to oldest):  14 November 2019  24 September 2018  12 July 2018  13 January 2018  26 September 2017  10 August 2017  28 December 2016  23 April 2016  08 April 2015  30 September 2014  28 March 2014  24 November 2013  24 July 2013  10 April 2013  17 September 2012  06 March 2012
  • 33. We looked at each record and found that the email address for the first three has been redacted. But the records from 13 January 2018 onward can give investigators and incident response teams a starting point for their inquiries. As it turns out, the domain’s registrant remained the same from when the domain was created on 17 September 2012 up until 13 January 2018. The registrant details were only redacted when it changed hands.
  • 34. Implication #3: Security Teams Need to Beef Up Their Cybersecurity Posture with Data Feeds Note that a similar result for paypol[.]com could also have been found by using our command-line WHOIS tool:
  • 36. Conclusion Privacy protection is a global concern as cybercrime, such as identity theft, continues to rise to alarming levels. But when it comes to WHOIS data, the ICANN’s dilemma of balancing between protecting registrants’ privacy and making them accountable for their properties is evident. The latter requires making WHOIS data publicly available even if for registrars and the ICANN it means paying hefty fines. If the ICANN redacts registrants’ personal details to protect their privacy and comply with policies like the GDPR, the result could be somewhat unintended. Cybercriminals would gain more confidence because they would be harder to trace. Crimes using malicious domains could rise, and incident response teams and forensic investigators would find it even more difficult to solve cases. Although the ICANN’s current stance leans more toward making domain owners accountable for their actions, it has temporarily instructed registrars to redact registrants’ personal data from WHOIS records.
  • 37. Conclusion In light of this, security teams and forensic investigators need to find ways to glean more insights from WHOIS records. They can use tools such as Brand Monitor and Domain Monitor, for instance, to get real-time alerts related to their brands, thus enabling them to protect against potential abusers. They can also rely on WHOIS History Search to get more insights into any domain despite current restrictions.
  • 38. Thank You! For any inquiries please mail us at: support@whoisxmlapi.com