Feeds

Cybercrook? Bent on mischief? WE'LL GET YOU, vow Facebook and pals

Secure Domain Foundation will pull rug from under web miscreants

Seven Steps to Software Security

Internet heavyweights have teamed up to form a non-profit organisation designed to supply internet infrastructure operators with free tools and intelligence in the fight against cybercrime.

Facebook, security intelligence firm Crowdstrike, Verisign, ESET Anti-Virus, Verizon and the Anti-Phishing Working Group, among others, are putting their support behind the Secure Domain Foundation) (SDF).

Cybercrooks have long used domain names to control botnets, distribute malware, and compromise unsuspecting visitors. The SDF’s free API product will give "credit ratings" for customers based on security reputation and contact data validation.

Domain name transactions such as new account creation, domain registration, and record updates can be queried against this trustworthiness database to flag up potential problems.

The database of malicious domains and bad actors has been in development for two years. Domain registrars are being invited to incorporate this contact data validation services into their domain registration processes.

SDF was founded by security researcher Chris Davis, who was involved in the successful Mariposa botnet takedown operation four years ago and Norm Ritchie, a domain industry expert and one of seven keyholders of the secure root zone.

“ICANN has recently mandated that domain registrars must validate postal addresses, phone numbers, and email addresses that are provided as contact information during the domain registration process,” said Norm Ritchie, chairman of the SDF.

“Many new gTLD registries have pledged to take a more proactive role in combating domain abuse within their TLDs. The SDF provides an entirely free service that not only validates the contact registration data provided but also lets the registrar and registry know if we have seen that data used previously in relation to cyber crime.”

The SDF plans to provide free-of-charge tools, technology, research, and security intelligence to Internet domain name registrars, registries, ccTLD operators, and gTLD operators. The organisation hopes to expand its services to hosting providers, DNS operators, CERTS, law enforcement and other Internet infrastructure operators over coming months.

SDF will act as a “brains trust” analysing thousands of malware samples daily before teaming up with domain registrars and other to shut down the criminals’ command and control infrastructures.

“Beyond our current offering of tools and services, we are also dedicated to raising the cost and risk of cyber crime,” said Chris Davis, president of the SDF.

“With our partners, we analyse hundreds of thousands of malware samples daily and actively engage with registries, registrars and hosting providers to shut down the criminal command and control infrastructure. Our staff and volunteer researchers and analysts work tirelessly to provide criminal attribution intelligence to the proper global law enforcement organisations and help to bring these criminals to justice.”

Chris Davis, co-founder of SDF and director of intel partnerships at CrowdStrike, acknowledged that abuse will continue despite SDF's efforts because cybercriminals often use bulletproof hosting from unscrupulous providers or hacked systems. What SDF can do is make life more difficult for bot-herders and other crooks.

"Right now there is essentially no 'barrier to entry' for a bad guy to set up something like a botnet command and control infrastructure," Davis explained. "Our hope is, if we can start in the domain space and make life harder, we can expand this model towards hosting providers and other infrastructure type orgs.

"One of our goals is to publicly name and shame or spotlight malicious and/or apathetic providers. We have on our roadmap – a plan to provide DNS RPZ feeds to allow users to easily block those providers," he added. ®

Mobile application security vulnerability report

More from The Register

next story
Yorkshire cops fail to grasp principle behind BT Fon Wi-Fi network
'Prevent people that are passing by to hook up to your network', pleads plod
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
NEW, SINISTER web tracking tech fingerprints your computer by making it draw
Have you been on YouPorn lately, perhaps? White House website?
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
Black Hat anti-Tor talk smashed by lawyers' wrecking ball
Unmasking hidden users is too hot for Carnegie-Mellon
Attackers raid SWISS BANKS with DNS and malware bombs
'Retefe' trojan uses clever spin on old attacks to grant total control of bank accounts
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Reducing security risks from open source software
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.