Why Domain Protection Is A Key Pillar Of Cybersecurity

Cybersecurity is one of the most challenging areas of technology. In an era of (almost) digital everything, having a spotless and secure online identity has become essential for both businesses and individuals. 

Over the years, this risk has become a real governance issue for companies as it is interconnected with other risks: whether it is a loss of strategic data or an attack on reputation.

There are several types of threats that can make companies vulnerable and put their digital identity at risk, with phishing being particularly prevalent. Just last year, 76% of businesses reported being a victim of a phishing attack. Out of these, internationalised domain name (IDN) homograph attacks account for some of the most dangerous, sophisticated, and effective hacks. These work by hackers using domains that usurp the visual and legitimate identity of a domain, in particular by using characters that appear similar to the Latin alphabet. It is imperative that businesses are able to prevent such attacks.

Understanding Homograph Attacks And The Danger They Pose

A homograph domain is essentially a “look alike” domain. Domain names support international characters to be inclusive of all languages. The trouble arises when bad actors create domains by mixing characters that look similar with the intent of deceiving or defrauding a target. 

One reason as to why these are so dangerous is that there are potentially millions of homographic variations of names. Many phishing attacks are socially-engineered, meaning they rely on a person to trust that the scammer is actually legitimate. A domain name or email address that looks nearly identical to the legitimate name could easily convince a target to take a compromising action. 

The nature of the attack can vary, but the target is convinced because they believe the scammer is the trusted brand, business, or person. What if your boss emailed you a request for a funds transfer, from an email address that looked just like their primary email? We’d all like to think we’d catch the subtle difference in look, but depending on the way the characters are rendered online, the difference might be imperceptible. 

When it comes to IDN homograph attacks, the damage caused can be severe. Thus, prevention is far better than treatment or cure. 

Preserving Digital Identity Means Stability - And Can Even Be A Driver Of Growth

Cybersecurity has always been far more than just a concern over IT. Fighting against data breaches is also about protecting the private information of customers and staff, protecting against regulatory action, and maintaining reputations. 

During a homograph attack, an entire business ecosystem is put at risk, and it only takes one link in the chain to be affected to drag another into trouble. For example, a customer goes to a company's website to make a purchase. They checkout and enter bank details, as visually everything looks legitimate. The customer makes the purchase and only later realises they have been dealing with a malicious site. From that moment on, it is the company's brand that is tainted, since it is as easy for the customer to go to the real website as it is for the impostor. 

The above example may seem simplistic. Yet these circumstances occur regularly, causing great damage to both reputations and to the bottom line. 

Business success is no longer measured solely by economic results, but also by the overall 
image and reputation of the company. Thus, domain protection is key to not just brand protection, but in being able to secure further customer acquisition and growth. 

Acting Upstream And Throughout The Lifetime Of A Domain Name

By putting in place mechanisms to reduce the risks and impact of an attack, companies limit their operational threats. Selecting a domain name with homographic blocking is a key protective step.

An upstream solution can automate this protection from the moment the domain is registered. It does this by identifying all the  characters in the domain name, which then makes it near-impossible for scammers to use homographs to target customers or staff.

This solution must be applied during all the lifetime of the domain, otherwise it will not be a truly preventative measure. Companies would be wise to pick a provider that offers such a solution built in and which covers the lifetime of the domain, to offer complete protection as we see ever increasing and sophisticated homograph attacks. Investing in brand protection — for both customers and staff — is paramount. 

Despite the homograph attacks being known since 2001, it is still one of the major challenges in the cyber security and threat intelligence sector - with the sophistication of these attacks growing exponentially year on year. With risks falling not only on private and public sector companies but also on institutions and individuals, it is necessary for all stakeholders to be aware of the importance of protecting their domain name. 

Brian Lonergan is the Senior Director of Product at Identity Digital

You Might Also Read: 

Deactivated Domains Used For Spear-Phishing:

 

« DARPA Wants To Play With Artificial Intelligence
Artificial Intelligence Distorts Government Decision-Making »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

LogmeOnce

LogmeOnce

LogmeOnce provides users with solution to multiple Password problems, Single Sign-On (SSO), and Identity Management.

Qualys

Qualys

Qualys is a pioneer and leading provider of cloud security and compliance solutions.

CyberScout

CyberScout

Cyberscout delivers the latest cybersecurity education, protection and resolutions services. We also provide swift incident response services around the world.

OSIRIS Lab - NYU Tandon

OSIRIS Lab - NYU Tandon

The Offensive Security, Incident Response & Internet Security Lab (OSIRIS) is a security research environment where students analyze and understand how attackers take advantage of real systems.

ComCERT

ComCERT

ComCERT SA is an independent, private consulting company focusing in the assistance of its customers facing the dangers of cyber threats and security incidents.

Uppsala Security

Uppsala Security

Uppsala Security built the first crowdsourced Threat Intelligence platform known as the Sentinel Protocol, which is powered by blockchain technology.

Ogasec

Ogasec

Ogasec is a cybersecurity company formed by the merger between Aker and N-Stalker in 2017. Solutions include Security & Connectivity Networking, Application Security, and Managed Security Services.

Safe Security

Safe Security

Safe Security (formerly Lucideus) provides Cyber risk assessment services and platforms to multiple Fortune 500 companies and governments across the globe.

Virtue Security

Virtue Security

Virtue Security are specialists in web application penetration testing.

UST

UST

UST is a global provider of digital technology and transformation, IT services and solutions including managed security services.

D2 Network Associates (D2NA)

D2 Network Associates (D2NA)

D2NA help businesses deliver and achieve their goals, through innovative IT solutions, robust cyber security services and proactive IT managed services.

Novacoast

Novacoast

Novacoast helps organizations find, create & implement solutions for a powerful security posture through advisory, engineering, development & managed services.

Telesign

Telesign

Telesign connect, protect, and defend online experiences with sophisticated digital identity and programmable communications solutions.

Strategic Technology Solutions (STS)

Strategic Technology Solutions (STS)

Strategic Technology Solutions specialize in providing Cybersecurity and Managed IT Services to the legal industry.

Cypherleak

Cypherleak

Cypherleak provide Automated Cyber Risk Monitoring & Ai powered cyber recommendations.

BestDefense

BestDefense

BestDefense offers proactive cybersecurity solutions that adapt in real-time to outpace evolving threats and ensure resilient protection for your critical assets.