The problem of “spoofing” the Domain Name System, or DNS, which has been called the phone book of the internet, touches on what users type into the address bar of a browser window or click on at a website. There are new ways to make phony addresses look real.
LAS VEGAS — It’s easier than ever to get waylaid on the internet, diverted to dangerous territory where scam artists await with traps baited for the unsuspecting user.
It’s all about devious misdirection, fumble-fingered typing and how our brains can confuse what our eyes see. Big money can await the clever scamster, and costs are rising for corporations and politicians who do not take heed.
The problems lie in the inner workings of the internet, and touch on issues like the vast expansion of the combination of words, dots and symbols that comprise internet addresses.
It’s no longer just .com, .net., .org and a handful of others. Now, there are 1,900 new extensions, known as top-level domains, things like .beer, .camera, .city, .dating, .party and .shop.
Most Read Nation & World Stories
- Sports on TV & radio: Local listings for Seattle games and events
- ‘Needle spiking’ of women in Britain stirs alarm over new kind of assault
- Cheney’s consultants are given an ultimatum: Drop her, or be dropped
- Inside the world of Buy Nothing, where dryer lint is a hot commodity
- California travel blogger among 2 killed in Mexico's Tulum
“We see a ton of them being used maliciously,” said Mikko Hypponen, chief research officer at Finnish security company F-Secure, who called the new endings “a big headache.”
The problems revolve around what computer scientists refer to as “spoofing” of the Domain Name System, or DNS, which has been called the phone book of the internet. It’s been going on for a while, and touches on what users type into the address bar of a browser window or click on at a website. There are new ways to make phony addresses look real.
“Creating a spoofed domain name, or even hijacking a domain name, has become a lot easier today,” said Israel Barak, chief information security officer at Cybereason, a cybersecurity firm based in Boston.
Just a few years ago, spoofing an internet address, say, microsoft.com, was primitive.
“You would have to maybe change that ‘i’ to a 1. I’m going to be M1crosoft with a 1 today, or even change the ‘o’ to a zero, or change the ‘t’ to a seven. For senior citizens with fuzzy vision like I’m starting to get, you might squint at that and say, ‘Looks like Microsoft to me,’ ” said Paul Vixie, chief executive of Farsight Security, a San Mateo, California, company.
An internet pioneer, Vixie has been involved in its governance for three decades. He is an architect of some of the protocols used in the DNS system and advises the nonprofit Internet Corp. for Assigned Names and Numbers, the Los Angeles nonprofit that serves as the guardrails for the borderless global internet.
But Vixie said the internet is still in its Wild West phase. He compared the online world today to the era of highways before seat belts and air bags.
To bridge the gap between English-speaking and non-English-speaking worlds, internet organizers have incorporated domain names using characters covering 139 modern and historic scripts. It’s not just major scripts like the Cyrillic alphabet and Chinese characters. It’s also Runic, Buhid, Rejang and dozens of other obscure language scripts.
Scamsters have had a field day with parts of those scripts. They’ve inserted look-alike characters into internet addresses, sending users to bogus malicious, websites.
Vixie said numerous distinct characters look like the Roman letter “i.”
“They are completely visually the same down to the last pixel on your screen to the real lowercase ‘i.’ So there is no way that you’re going to tell the difference,” he said.
Inserting such exotic characters into a link is one technique criminals employ to send users to look-alike sites that may appear to be a bank website, a Gmail troubleshooting page or some other page that asks for a username and password. Other techniques are also used.
In some cases, adversaries target employees of a corporation, nuclear plant, military unit or other high-value facility where they seek a digital foothold. The hackers send the targets tailored emails with the malicious links.
“It’s easy [and] it’s cheap,” said Tom Richards, co-founder and chief strategy officer for GroupSense, a Virginia cyberthreat intelligence firm.
As a hacker, Richards said, “All I need to do is register a website that looks like my target and then send that to a handful of employees or people affiliated with the organization or potentially even customers. And then I can trap them. I can send them malware. I can get them to fill out a form.
“It’s embarrassingly effective.”
Not so long ago, companies would buy common domain names that were almost like their normal websites, but off by a letter to ensure clumsy typists wouldn’t go astray. So, in the case of Walgreens.com, if you type in walgreen.com or walgrens.com it will still take you to the drugstore chain’s site.
Some cybersecurity experts suggest that average internet users need to get savvier about phony websites, reading the components of what is in the address bar, like domain names and suffix paths.
Others say that expects too much of average internet users.
Most users see “dots and slashes and question marks. They don’t know what this means,” said Rich Smith, director of Duo Labs, the advanced security research team at Duo.