Why Domain Protection Is A Key Pillar Of Cybersecurity

Cybersecurity is one of the most challenging areas of technology. In an era of (almost) digital everything, having a spotless and secure online identity has become essential for both businesses and individuals. 

Over the years, this risk has become a real governance issue for companies as it is interconnected with other risks: whether it is a loss of strategic data or an attack on reputation.

There are several types of threats that can make companies vulnerable and put their digital identity at risk, with phishing being particularly prevalent. Just last year, 76% of businesses reported being a victim of a phishing attack. Out of these, internationalised domain name (IDN) homograph attacks account for some of the most dangerous, sophisticated, and effective hacks. These work by hackers using domains that usurp the visual and legitimate identity of a domain, in particular by using characters that appear similar to the Latin alphabet. It is imperative that businesses are able to prevent such attacks.

Understanding Homograph Attacks And The Danger They Pose

A homograph domain is essentially a “look alike” domain. Domain names support international characters to be inclusive of all languages. The trouble arises when bad actors create domains by mixing characters that look similar with the intent of deceiving or defrauding a target. 

One reason as to why these are so dangerous is that there are potentially millions of homographic variations of names. Many phishing attacks are socially-engineered, meaning they rely on a person to trust that the scammer is actually legitimate. A domain name or email address that looks nearly identical to the legitimate name could easily convince a target to take a compromising action. 

The nature of the attack can vary, but the target is convinced because they believe the scammer is the trusted brand, business, or person. What if your boss emailed you a request for a funds transfer, from an email address that looked just like their primary email? We’d all like to think we’d catch the subtle difference in look, but depending on the way the characters are rendered online, the difference might be imperceptible. 

When it comes to IDN homograph attacks, the damage caused can be severe. Thus, prevention is far better than treatment or cure. 

Preserving Digital Identity Means Stability - And Can Even Be A Driver Of Growth

Cybersecurity has always been far more than just a concern over IT. Fighting against data breaches is also about protecting the private information of customers and staff, protecting against regulatory action, and maintaining reputations. 

During a homograph attack, an entire business ecosystem is put at risk, and it only takes one link in the chain to be affected to drag another into trouble. For example, a customer goes to a company's website to make a purchase. They checkout and enter bank details, as visually everything looks legitimate. The customer makes the purchase and only later realises they have been dealing with a malicious site. From that moment on, it is the company's brand that is tainted, since it is as easy for the customer to go to the real website as it is for the impostor. 

The above example may seem simplistic. Yet these circumstances occur regularly, causing great damage to both reputations and to the bottom line. 

Business success is no longer measured solely by economic results, but also by the overall 
image and reputation of the company. Thus, domain protection is key to not just brand protection, but in being able to secure further customer acquisition and growth. 

Acting Upstream And Throughout The Lifetime Of A Domain Name

By putting in place mechanisms to reduce the risks and impact of an attack, companies limit their operational threats. Selecting a domain name with homographic blocking is a key protective step.

An upstream solution can automate this protection from the moment the domain is registered. It does this by identifying all the  characters in the domain name, which then makes it near-impossible for scammers to use homographs to target customers or staff.

This solution must be applied during all the lifetime of the domain, otherwise it will not be a truly preventative measure. Companies would be wise to pick a provider that offers such a solution built in and which covers the lifetime of the domain, to offer complete protection as we see ever increasing and sophisticated homograph attacks. Investing in brand protection — for both customers and staff — is paramount. 

Despite the homograph attacks being known since 2001, it is still one of the major challenges in the cyber security and threat intelligence sector - with the sophistication of these attacks growing exponentially year on year. With risks falling not only on private and public sector companies but also on institutions and individuals, it is necessary for all stakeholders to be aware of the importance of protecting their domain name. 

Brian Lonergan is the Senior Director of Product at Identity Digital

You Might Also Read: 

Deactivated Domains Used For Spear-Phishing:

 

« DARPA Wants To Play With Artificial Intelligence
Artificial Intelligence Distorts Government Decision-Making »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Rubicon Workflow Solutions

Rubicon Workflow Solutions

Rubicon is a leading provider of managed IT support and strategic services, specialising in creative and mixed platform environments.

Venable

Venable

Venable is an American Lawyer 100 law firm with nine offices across the USA, Practice areas include Cybersecurity.

CYBER 1

CYBER 1

CYBER 1 provides cyber security solutions to customers wanting to be resilient against new and existing threats.

Sopra Steria

Sopra Steria

Sopra Steria is a leading European information technology consultancy.

Guardian360

Guardian360

The Guardian360 platform offers unrivalled insight into the security of your applications and IT infrastructure.

Israel Aerospace Industries (IAI)

Israel Aerospace Industries (IAI)

IAI offers a holistic approach that provides defense forces, governments, critical infrastructures and large enterprises with end-to-end cyber security & monitoring tools.

Auxilium Cyber Security

Auxilium Cyber Security

Auxilium Cyber Security is independent information security consultancy company providing cyber security services tailored to meet the evolving needs of organizations worldwide.

Chronicle

Chronicle

Chronicle products combine intelligence about global threats in the wild, threats inside your network, and unique signals about both.

CyberEdBoard

CyberEdBoard

CyberEdBoard is a private, peer-to-peer education and networking community focused on cybersecurity, technology, business processes and risk management.

Digital Craftsmen Ltd

Digital Craftsmen Ltd

We're ISO27001 & Cyber Essentials Cybersecurity experts, delivering full cloud security and managed services. We take a bespoke approach for each client from hosting, optimising & securing them online

Cymune

Cymune

At Cymune we help businesses to fight against cybercrime, protect patented data and diminish security risks.

Apura Cybersecurity Intelligence

Apura Cybersecurity Intelligence

Apura is a Brazilian company that develops advanced products and provides specialized services in information security and cyber defense.

Strobes Security

Strobes Security

Strobes is among the world’s first cybersecurity platforms specifically designed for end-to-end continuous threat exposure management.

Nihka Technology Group

Nihka Technology Group

Nihka offers full end-to-end ICT solutions from business optimisation, data centre modernisation, cloud connection and management, and ICT security.

ZEST Security

ZEST Security

The ZEST platform natively integrates into your technology stack to make efficient risk remediation possible.

CyberMass

CyberMass

CyberMass provides Cyber Advisory/Consulting, Professional and Managed Services offering complete cybersecurity as a service protection to businesses.