Why Domain Protection Is A Key Pillar Of Cybersecurity

Cybersecurity is one of the most challenging areas of technology. In an era of (almost) digital everything, having a spotless and secure online identity has become essential for both businesses and individuals. 

Over the years, this risk has become a real governance issue for companies as it is interconnected with other risks: whether it is a loss of strategic data or an attack on reputation.

There are several types of threats that can make companies vulnerable and put their digital identity at risk, with phishing being particularly prevalent. Just last year, 76% of businesses reported being a victim of a phishing attack. Out of these, internationalised domain name (IDN) homograph attacks account for some of the most dangerous, sophisticated, and effective hacks. These work by hackers using domains that usurp the visual and legitimate identity of a domain, in particular by using characters that appear similar to the Latin alphabet. It is imperative that businesses are able to prevent such attacks.

Understanding Homograph Attacks And The Danger They Pose

A homograph domain is essentially a “look alike” domain. Domain names support international characters to be inclusive of all languages. The trouble arises when bad actors create domains by mixing characters that look similar with the intent of deceiving or defrauding a target. 

One reason as to why these are so dangerous is that there are potentially millions of homographic variations of names. Many phishing attacks are socially-engineered, meaning they rely on a person to trust that the scammer is actually legitimate. A domain name or email address that looks nearly identical to the legitimate name could easily convince a target to take a compromising action. 

The nature of the attack can vary, but the target is convinced because they believe the scammer is the trusted brand, business, or person. What if your boss emailed you a request for a funds transfer, from an email address that looked just like their primary email? We’d all like to think we’d catch the subtle difference in look, but depending on the way the characters are rendered online, the difference might be imperceptible. 

When it comes to IDN homograph attacks, the damage caused can be severe. Thus, prevention is far better than treatment or cure. 

Preserving Digital Identity Means Stability - And Can Even Be A Driver Of Growth

Cybersecurity has always been far more than just a concern over IT. Fighting against data breaches is also about protecting the private information of customers and staff, protecting against regulatory action, and maintaining reputations. 

During a homograph attack, an entire business ecosystem is put at risk, and it only takes one link in the chain to be affected to drag another into trouble. For example, a customer goes to a company's website to make a purchase. They checkout and enter bank details, as visually everything looks legitimate. The customer makes the purchase and only later realises they have been dealing with a malicious site. From that moment on, it is the company's brand that is tainted, since it is as easy for the customer to go to the real website as it is for the impostor. 

The above example may seem simplistic. Yet these circumstances occur regularly, causing great damage to both reputations and to the bottom line. 

Business success is no longer measured solely by economic results, but also by the overall 
image and reputation of the company. Thus, domain protection is key to not just brand protection, but in being able to secure further customer acquisition and growth. 

Acting Upstream And Throughout The Lifetime Of A Domain Name

By putting in place mechanisms to reduce the risks and impact of an attack, companies limit their operational threats. Selecting a domain name with homographic blocking is a key protective step.

An upstream solution can automate this protection from the moment the domain is registered. It does this by identifying all the  characters in the domain name, which then makes it near-impossible for scammers to use homographs to target customers or staff.

This solution must be applied during all the lifetime of the domain, otherwise it will not be a truly preventative measure. Companies would be wise to pick a provider that offers such a solution built in and which covers the lifetime of the domain, to offer complete protection as we see ever increasing and sophisticated homograph attacks. Investing in brand protection — for both customers and staff — is paramount. 

Despite the homograph attacks being known since 2001, it is still one of the major challenges in the cyber security and threat intelligence sector - with the sophistication of these attacks growing exponentially year on year. With risks falling not only on private and public sector companies but also on institutions and individuals, it is necessary for all stakeholders to be aware of the importance of protecting their domain name. 

Brian Lonergan is the Senior Director of Product at Identity Digital

You Might Also Read: 

Deactivated Domains Used For Spear-Phishing:

 

« DARPA Wants To Play With Artificial Intelligence
Artificial Intelligence Distorts Government Decision-Making »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Wilson Sonsini Goodrich & Rosati (WSGR)

Wilson Sonsini Goodrich & Rosati (WSGR)

WSGR is the premier provider of legal services to technology, life sciences, and growth enterprises worldwide. Practice areas include cybersecurity and data protection.

Cleafy

Cleafy

Cleafy are a team of fraud hunters, cybersecurity experts, data scientists, and software engineers. Our purpose is to make people’s life easier and free from the threats in the digital ecosystem.

Logically Secure

Logically Secure

Logically Secure provide penetration testing and security assessment services.

Software Engineering Institute (SEI)

Software Engineering Institute (SEI)

At the CERT Division of SEI we study and solve cybersecurity problems, research security vulnerabilities in software, and develop information and training to help improve cybersecurity.

CERT NZ

CERT NZ

CERT NZ supports businesses, organisations and individuals affected by cyber security incidents, and provide trusted and authoritative information and advice.

Ellipsis Technologies

Ellipsis Technologies

Ellipsis Technologies is a diversified technology company that develops innovative security software for websites and online applications.

Cybertonica

Cybertonica

Cybertonica is a FinTech company which detects and prevents fraudulent transactions and reduces risk for financial services organisations.

Halcyon Knights

Halcyon Knights

Halcyon Knights is a specialist executive search and IT recruitment agency in the APAC region. Areas of specialisation include cybersecurity.

Pentera Security

Pentera Security

Pentera (formerly Pcysys) is focused on the inside threat. Our automated penetration-testing platform mimics the hacker's attack - automating the discovery of vulnerabilities.

DCX Technology

DCX Technology

Recognized as a leader in security services, DXC Technology help clients prevent potential attack pathways, reduce cyber risk and improve threat detection and incident response.

Onsist

Onsist

Onsist brand protection services provide proactive defense against fraudulent use of your brand online.

OwnZap Infosec

OwnZap Infosec

OwnZap Infosec aims to digitally shield the cyberspace by offering services like Penetration Testing and Red Teaming, Infrastructure Security Testing, and Vulnerability Assessments.

IronClad Encryption (ICE)

IronClad Encryption (ICE)

Ironclad Encryption is Dynamic Encryption. The encryption sequence changes continuously so there is never a correlation between data sent and data received.

FourNet

FourNet

FourNet is an award-winning provider of cloud and managed services; we work closely with our clients to enable digital transformation across their organisation.

Information Security Officers Group (ISOG)

Information Security Officers Group (ISOG)

ISOG's mission is to strengthen information security through awareness and education programs, promoting community and fellowship among information security leaders.

WinMagic

WinMagic

At WinMagic, we’re dedicated to making authentication and encryption solutions that protect data without causing user friction so that everyone can work freely and securely.