DNS Abuse Responses
DNS Abuse Responses are the various tools, methods, collaboration, and philosophies spawning from DNS Abuse itself.
Overview edit
There are four time-related categories of responses to DNS Abuse:
- reactionary detection and removal of sources of abuse (necessarily after the fact),
- cotemporal efforts to mitigate the amount and likelihood of abuse or its impact,
- future-focused work on stopping abuse before it can happen, and
- ongoing allowance of abuse for ideological or jurisdictional reasons.
Response Options edit
Removal & Mitigation edit
Frameworks & Guides edit
- The Framework for Registry Operator to Respond to Security Threats was jointly published between the Public Safety Working Group (a consortium of law enforcement agencies from around the world) and gTLD registries in 2017. It describes what different actions a registry operator can take when it has identified a security threat. It also delineates an implicit hierarchy of notifiers where, for instance, a particular law enforcement agency might have a particularized expertise and set expected communications between law enforcement and registries when a security threat has been identified.
- The Framework to Address Abuse was developed by gTLD and ccTLD registry operators and registrars. It defines DNS Abuse and sets forth when a registry or registrar must take action, as well as those limited and egregious categories of website content abuse when a registry or registrar should take action.
- The DNS Operators’ Decision-Making Guide to Address Technical Abuse
- The on Domain Generating Algorithms Associated with Malware and Botnets
- SAC115
- Terms of Service (ToS) notice-and-takedown regimes for use/content abuse
- DNS Abuse Institute Roadmap
- Budapest Convention
- The CDM Program offers Automation in IT Security
Prevention edit
Evidentiary Collection edit
Points of View edit
Every type of Internet user has worries over DNS Abuse and the responses to it. For instance, there is an ongoing multistakeholder debate over where to draw the line between technical abuse and content abuse. Moreover, there are technical limits on what each type of stakeholder can do to stop abuse.
Academics edit
- [KOR Labs
- COMAR
- Some criminologists feel the capacity to regulate DNS abuse is very limited because:
- no single global entity is responsible for the regulation of all its aspects;
- the Multistakeholder Model of governance and the distributed administration model allows disagreements and discrepancies;
- much of what happens on the Internet is beyond the jurisdictional reach of the criminal law of individual nations; and
- regulation will continue to be reserved for the most egregious infringements. And so regulation will remain limited until a uniform set of policies to prevent abuse before it happens is enacted.[1]
- The Internet Governance Project at GA Tech focuses on privacy concerns and Internet Fragmentation in relation to IGO and governmental attempts to manage and mitigate cybercrime as well as content and technical abuse
Intergovernmental Organizations edit
IGO responses generally treat DNS Abuse as a facet of Cybercrime.
Objectives edit
Pro-Mitigation edit
In 2022, the European Commission published a study on DNS abuse, the results of which included several fundamental recommendations:
- More DNS Metadata for identifying resources and their attribution to intermediaries
- Improve Contact Information and Abuse Reporting
- Improve Prevention, Detection, and Mitigation of DNS Abuse via maliciously registered domain names
- Improve Detection and Mitigation of compromised domain names
- Increase the Protection of the DNS Operation
- Raise DNS Abuse Awareness, Knowledge Building, and Mitigation Collaboration
Pro-privacy edit
Government Responses edit
Government responses tend to focus on what can be adjudicated; include content abuse, such as child pornography; and outline how and when electronic evidence can be collected.
Domestic Legislation edit
U.S. Federal edit
American cybersecurity legislation thus far has focused on standardizing and formalizing preventative measures.[2] Congress passed
- FISMA[3][4]
- The Cybersecurity Enhancement Act of 2014 (CEA)
- The Cybersecurity and Infrastructure Security Agency Act of 2018
State edit
CISA edit
The CISA seeks to prevent future cyberattacks on critical infrastructure. Its CDM Program is a dynamic approach to fortifying the cybersecurity of civilian government networks and systems. Its Stop Ransomware Website is a one-stop shop for preparing for ransomware attacks among other forms of malware.
FBI edit
The FBI leads the National Cyber Investigative Joint Task Force (NCIJTF) and runs the public-facing Internet Crime Complaint Center (IC3) to collect cybercrime and electronic evidence of other types of crimes.
DOD edit
NIST edit
- NCCoE
- NICE
Responding to State-Sponsored Cyberattacks edit
Sanctions/Condemnations edit
- SolarWinds Hacking Attack: In an executive order issued on April 15, 2021, President Biden levied economic sanctions against Russian financial institutions, technology companies, and individuals that participated in this series of hacks that infiltrated nine federal agencies and over 100 private companies.[5]
- Microsoft Email Systems Hacking Attack: On July 19, 2021, the Biden administration formally condemned but did not inflict sanctions against the Chinese government for working with hackers to breach Microsoft email systems.[6]
Technical Community edit
Internet Governance Organizations edit
ICANN edit
ICANN has been steadfast in its focus on technical DNS abuse, what it calls "DNS security threats," and avoidance of policymaking around content abuse. ICANN has two missions related to DNS Abuse: maintaining the SSR of the DNS and engendering trust in the domain name industry. ICANN's determination of the org's definition for DNS Abuse is based on the work product of GAC and the base gTLD Registry Agreement. Thus, ICANN considers DNS security threats to be limited to attacks involving phishing, malware, botnet command and control, pharming, and spam as a vector.[7] As recently as ICANN 71, the ICANN board was criticized by members of the ALAC, the BC, and other Internet Governance bodies for not doing enough to steward contracted parties and non-contracted parties toward involvement in reducing abuse. However, ICANN and SSAC, in particular, have begun pointing to SAC115 and DAAR as evidence of their work on addressing DNS abuse. Parts of ICANN Organization, Board, and Community that are dedicated to resolving DNS Abuse issues:
- GDD Accounts and Services and OCTO have come to an agreement with RySG to change the Base gTLD Registry Agreement to enable ICANN org to use existing data provided by registries for research purposes such as DAAR.[8]
ICANN Organization edit
- Goran Marby formed the DNS Security Facilitation - Technical Study Group (DSFI-TSG) to investigate and determine what ICANN should and should not do based on the technical landscape about security threats and attack vectors, including the DNS, and its final report recommendations are now under review for implementation by the ICANN Org.
- OCTO monitors gTLD zone files and runs
- Contractual Compliance reprimands registrars or registries that do not maintain abuse contacts (or a webform) to receive abuse complaints or promptly investigate allegations of DNS Abuse in good faith and conducts audits.
- DAAR
- Domain Name Security Threat Information Collection and Reporting Project (DNSTICR)[9]
- ICANN Organization has developed an internal DNS Security Threat Mitigation Program,[10] which seeks to realize ICANN organization-wide coordination & collaboration on DNS abuse responses and, thus, acts as a hub for DAAR and DNSTICR, Compliance Audits and Abuse Complaints, Working with Contracted Parties, and Leading Educational Outreach.
ICANN Community edit
GNSO edit
The GNSO Council formed a "Small Team on DNS Abuse," to which the DNSAI sent a letter offering advice on how to respond to DNS Abuse in a way that is clearly within ICANN's remit.[11] Graeme Bunton explained that there is
near universal agreement...that malicious registrations used for the distribution of malware, phishing, or the operation of botnets are appropriately and reasonably addressed by registrars and registries...which means there is an opportunity to focus on this issue at the outset and make meaningful progress on abuse. ICANN’s [work] on Inter-Registrar Transfer Policy provides a model for an approach. I would propose three separate, sequential efforts, either narrowly scoped efforts or PDPs, for mitigating malicious registrations:
- Malicious Registrations used for the distribution of Malware;
- Malicious Registrations used for Phishing;
- Malicious Registrations used for the operation of Botnet command and control systems.
By restricting the work to malicious registrations...avoids actors outside of ICANN’s contractual regime, like hosting companies and content distribution networks and targets bad actors, and the impacts on legitimate registrants are correspondingly minimized.
Bunton also hopes that taking the "micro-PDP" approach will result in short, simple, easy to implement requirements.
- The CPH has developed a Trusted Notifier Framework
- The RrSG offers guidance on Appeal Mechanisms for DNS Abuse Mitigation, managing BEC Scams, Registrar Abuse Reporting, and Minimum requirements for WHOIS data requests.
- The BC is limited to removing content and sharing evidence with registries to suspend or take down sites. The BC also seeks to:
- require TLD registries, registrars, privacy or proxy providers and resellers to verify the accuracy of domain registration (WHOIS) data;
- encourage these same entities to develop and deploy new tools to identify domain names that could potentially infringe on their rights; and
- encourage these same entities to offer services allowing Intellectual Property rights holders to preventively block infringing domain name registrations.[12]
- The IPC is concerned with the year-on-year growth of online fraud recently due in large part to the Covid pandemic and with trust in the Internet
- The Registrar Stakeholder Group (RrSG) offers the acidtool free of charge to anyone trying to identify the appropriate party to report abuse to. This tool relies on public data provided by third parties and is provided for informational purposes only.
- The CPH has developed a Trusted Notifier Framework
GAC edit
ccNSO edit
SSAC edit
- The SSAC has published several documents on DNS Abuse measurement and mitigation
ALAC edit
IGF edit
DNS Abuse Institute edit
This newcomer is entirely focused on creating an interoperable framework to reduce DNS abuse. The DNSAI acknowledges there are two options for reducing security threats: proactive and reactive methods. The institute is currently putting more of its energy into developing reactive tools because they can be used by anti-abuse or compliance personnel without requiring integration in registration platforms and thus, broad buy-in should be easier to secure.[14]
Private Sector edit
Cybersecurity Providers edit
The cybersecurity industry is booming and is trying various approaches to protect networks and supply chains from data breaches and ransomware attacks. For instance, Prevailion's strategy is to hack the hackers, while McAfee remains the revenue leader by continuing to churn out cybersecurity software.[15]
- CleanDNS
- PhishLabs
- KnowBe4
- Cofense
- Cyber Risk Aware
- KnowBe4 (MediaPRO)
- SANS Institute
- Inspired eLearning
Registries and Registrars edit
- In March 2022, TWNIC and DotAsia signed an MOU of bilateral collaboration of information exchange and mutual recognition as Trusted Notifiers. When either TWNIC or DotAsia receives a notification via the Fast Track mechanism that they created, it will be able to immediately take appropriate actions under the domain name registration agreement to reduce the cybercrime impact.[16]
- Sebastian Felix Schwemer's 2020 analysis of 30 European ccTLD terms of services (ToS) showed several responses to use/content-related domain name abuse, including no related reservations, reactions to severe cases, and proactive screening.[17] Some ToSes do not contractually reserve to take down a domain name due to use or content, while others do reserve the right to take down a domain name but only in severe situations. Others have established "takedown regimes" akin to that of site operators, hosting providers, and registrants (per Article 14 of the E-Commerce Directive. EURid, .be, and SIDN have begun to screen abusive use by crawling content, using fuzzy hashes, or HTML structural similarity analysis; they are also working on early warning systems. Schwemer found that only 1/3 of ccTLD ToSes contained content/use provisions and that the discretion for registrars to take down domain names via a morality clause was higher than it was for ccTLD registries. This analysis also revealed the emergence of ccTLD registries' use of data validation in a new way. Registries have noticed a correlation between domain names engaging in unlawful activities and the provision of poor registration data. Because ToSes can reserve the right to terminate registrations based on wrong or inaccurate information, some ccTLD registries are using this term as a workaround.[18]
DNS Abuse Framework edit
This framework was developed by registries and registrars. The framework discourages a registry or registrar from taking action against domains, except in certain types of Website Content Abuse:
- child sexual abuse materials,
- illegal distribution of opioids online,
- human trafficking, or
- specific, credible incitements to violence
- Registrars and registry operators can
- include their own acceptable use policies or terms of use to set forth provisions to cover Website Content Abuses,
- contract Trusted Notifiers to monitor content and report abuse
- Registry Operators
- Have to determine whether the domain in question was maliciously registered or if the domain has been compromised. Registries cannot generally directly remediate a compromised domain; instead, it is up to the sponsoring registrar.[19] Conversely, if a domain has been maliciously registered, the registry has six options:
- Suspend the domain (most common)
- Refer to the sponsoring registrar
- Lock the domain
- Redirect a domain by changing the name servers
- Transfer the domain
- Delete the domain (generally considered an ineffective and extreme response)
- If a registry encounters unregistered domain names resulting from an automatic Domain Generation Algorithm (DGA), the operator can:
- Reserve the domains or
- create the domains in order to suspend or sinkhole the domains for victim identification
Reputation Industry edit
Commercial service providers, researchers, and non-profit organizations operate the most prominent RBLs that detect or receive notifications of security threats. Some key players include:
- Spamhaus,
- Cisco’s Talos email reputation system,
- the Anti-Phishing Working Group's RBL,
- Google Safe Browsing,
- SURBL, and
- ThreatStop.
End Users edit
End users, even those who work in the DNS industry, need help managing DNS Abuse mainly because of the timeless effectiveness of Social Engineering Attacks. For instance, at the end of 2020, GoDaddy notoriously tested its workers to see if they would share sensitive information after clicking on dubious links from a spoofed email.[20]
References edit
- ↑ Criminal misuse of the Domain Name System, Australian Institute of Criminology, 2018, pg 13
- ↑ CISA Act of 2018
- ↑ FISMA 2002, GSA
- ↑ FISMA 2014, CISA
- ↑ Biden's SolarWinds Executive Order, Vox
- ↑ US Govt Accuses China of Hacking Microsoft, NY Times
- ↑ Update on DNS Security Threats, ICANN Org
- ↑ ICANN Makes Progress on DNS Security Threat Analysis, ICANN Blogs
- ↑ Adding Linguistic Diversity to the DNSTICR project, ICANN Announcements
- ↑ DNS Security Threat Mitigation Program Update, ICANN Presentation, July 2021
- ↑ Responses to GNSO DNS Abuse Small Team Request for Input, GNSO Council Correspondence April 2022
- ↑ BC weighs in on DNS Abuse, Domain Name Wire
- ↑ DGAs, Malware, and Botnets Framework, RySG
- ↑ DNSAI Roadmap pg. 9
- ↑ Top 25 Cybersecurity Companies of 2020, The Software Report
- ↑ TWNIC and DotAsia establish fast track mechanism to fight DNS abuse, Digitimes
- ↑ Schwemer, The regulation of abusive activity and content: a study of registries’ terms of service
- ↑ Schwemer, The regulation of abusive activity and content: a study of registries’ terms of service
- ↑ RySG recommended options for registries
- ↑ GoDaddy Pranks Employees, DomainIncite