Deceptive Domains: The $12.5 Billion Problem
Over the last six years, Business Email Compromise (BEC) attacks have cost global businesses over $12.5 billion with victims not only in all 50 states, but 150 countries around the world.
February 28, 2020 at 02:40 PM
9 minute read
Over the last six years, Business Email Compromise (BEC) attacks have cost global businesses over $12.5 billion with victims not only in all 50 states, but 150 countries around the world. FBI, Business E-Mail Compromise the 12 Billion Dollar Scam.
For all of its effectiveness, the scheme is remarkably simple. A fraudster, often using stolen credentials, gains access to a business's email and monitors the traffic. When he spots a financial transaction, the fraudster inserts himself into the conversation often using a typosquatted domain—an email address that looks like the victim business's, but with a small typo, an l instead of an I, a 0 instead of an O. Once in the conversation, the fraudster convinces the party sending the money to transfer it to an account he controls.
That typosquatted—fake—domain is critical to the scheme. Without it, the fraudster would be easily spotted as an interloper in an otherwise legitimate transaction.
The Problem of Fake Domains
The problem of fake domains is not limited to the business world, or BEC. Hacking groups associated with foreign intelligence use fake domains to spread disinformation. Brad Smith, Microsoft, We Are Taking New Steps Against Broadening Threats to Democracy, Aug. 20, 2018. Criminals use them to convince unsuspecting victims to open attachments and download malicious software. The infamous phishing email sent to the DNC, for instance, came from "googlemail.com" rather than "gmail.com". Gregory Krieg and Tal Kopan, Is This the Email That Hacked John Podesta's Account?, CNN (Oct. 30, 2016). Security researchers have found hundreds of thousands of fake domains, including ones designed to resemble Facebook, Twitter, Gucci and, worrisomely, financial institutions. Hackers Are Flooding the Internet With More Fake Domain Names. Here's How You Can Protect Yourself, PBS (Jan. 18, 2018).
Legitimate domain holders have limited weapons in defense. Once a domain is identified, the legitimate owner can request it be taken down based on trademark infringement or fraud. The registrars who control the domains, however, are often hesitant to oblige on the basis of a simple similarity to an existing mark. Rather, they require detailed and technical evidence before they are willing to act. Failing to obtain relief directly from the domain registrar, the aggrieved party can file a Uniform Domain-Name Dispute Resolution Policy (UDRP) arbitration claim against the domain name registrant before an approved dispute resolution service provider. That process, even if uncontested, however, may take months and cost the victim thousands of dollars and valuable lost time.
While the burden rests with the victim of the fraud, the law provides very little recourse against those best placed to detect it in the first place—the domain registrar who registered the domain on behalf of the fraudster.
The Role of the Domain Registrar
For a website or an email address to function properly, it needs a registered domain name, such as "apple.com" or "senate.gov". Anyone can pay a small fee to register a domain that is not already registered to someone else. The non-profit Internet Corporation for Assigned Names and Numbers (ICANN) manages the world-wide domain name system. It, in turn, delegates domain name registration to a large class of for-profit, certified registrars. A fraudster cannot create a fake domain without going through these registrars. They are the first line of defense in preventing malicious domain registrations. Yet they are generally not concerned about the fraud for two important reasons.
First, the business model for domain name registration is built on volume. A top-level domain name (one ending in .com for instance) can be had for less than $10 per year. Large volume domain name registrants are thus a key revenue source. At the same time, high pricing pressure pushes up the cost of expenses, reducing the resources available for anti-fraud and anti-abuse programs. For example, registrars often do not provide a phone number to report fraud or abuse. Such claims are directed to a generic email address or live chat function with little accountability in the conversation. In addition, registrars often place barriers to fraud-based takedown requests. For instance, they may require technically cumbersome proof, such as native email files, which many of the victims are unable to provide because the fraudulent email domain is not targeted at them but at their customers. As a result, there is little economic incentive for domain name registrars to provide a prompt and properly staffed process to takedown fake domains.
Second, and more importantly, the domain name registrars are essentially legally immune from monetary damages even if they have a poorly designed and staffed abuse prevention program. In 1999, Lockheed Martin sued Network Solutions Inc. (NSI) alleging that NSI contributorily infringed on Lockheed's mark by registering domain names substantially similar to its own. Lockheed Martin v. Network Solutions, 194 F.3d 980 (9th Cir. 1999). The Ninth Circuit rejected Lockheed's theory, establishing the still existing barrier to legal liability for registering fraudulent domains. Noting that the registrar simply added the infringing domain name to a registration list, the court held that "the infringement does not result from NSI's publication of the domain name list, but from the registrant's use of the name on a web site or other Internet form of communication in connection with goods or services." Id. at 985. The victim's only recourse, according to the court, was against the registrant of the domain names, not the domain name registrar. Domain name registrars can therefore allocate expenses away from fraud prevention programs secure in the knowledge that their legal liability is limited.
The current legal framework thus leaves registrars with little incentive to fight fraud, while simultaneously forcing legitimate domain holders to spend thousands to monitor for fake domains and litigate their reclaim. It also creates an artificial market in domain registration for typosquatted domains by incentivizing those with the resources to do so to register every conceivable version of their legitimate domain to prevent fraudsters from doing so themselves. And the benefits of that market flow directly to … the registrars.
A Path Forward
Of the many actors involved in fighting fake domains—the domain registrars, the rights holders, and government authorities—registrars are best placed to stop the fraud. The domain name registrars are capable of spotting much of the fraud before it occurs. They can take reasonable steps to validate the registration information using publicly available databases. They can algorithmically identify new domains that are remarkably close in appearance to those that are already registered using the lists they already maintain. And they can recognize registration patterns—such as a request for a substantial number of domains in a short period of time—that are classic red flags for fraud.
Meanwhile, the policy rationale that may have underpinned the Lockheed decision is no longer present. Domain name registrars are not as critical as they were in 1999. At the time of Lockheed, NSI was the sole registrar for .com, .net and .org. That year NSI gave up its monopoly and competition in the registration market began. Today, ICANN accredits hundreds of registrars. See Descriptions and Contact Information for ICANN-Accredited Registrars. Many of those companies have developed into mature and sophisticated organizations with the resources to help protect the domain registration process.
There are several ways domain owners and the government can work together with the registrars to fight fraud. For instance, ICAAN can adopt a "safe harbor" process: once a rights holder makes a prima facie case of fraud, the domain name registrar could be obligated to immediately suspend the domain name unless the registrant makes a probable showing of valid purposes. If the registrars' process to implement the safe harbor is found to be reasonable and fair, then they would not be liable for monetary damages. This regulatory framework is similar to the current "safe harbor" anti-copyright-infringement process provided by the Digital Millennium Copyright Act (DMCA), which went into effect in 2000, shortly after the Lockheed decision. Because the cyber fraudsters tend to register domains shortly before using them in fraud to defeat companies' domain monitoring processes, immediate suspension will be effective in combating many cyber-enabled frauds.
Alternatively, an appropriate body, such as the Federal Trade Commission or ICAAN itself can develop and enforce a "Fake Domains Red Flags Rule" for domain name registrars, similar to the current Red Flags Rule issued under the Fair and Accurate Credit Transaction Act of 2003 (the FACT Act). The FACT Act Red Flags Rule requires "financial institutions" and some "creditors" to have policies and procedures to identify and act on identity theft and related frauds. Indicia of fraud in domain registration, such as false identities, bulk registrations and typo-variants of existing domains, can be easily identified if registrars are similarly obligated to develop and adopt programs to detect them.
The 20-year-old Lockheed decision bestowed on the domain name registrants an extraordinary gift: a long period of legal peace. But it also created an unintended consequence in the proliferation of fake domains and a net cybercrime "tax" on society. As Washington is weighing different approaches to regulate cyberspace, it is time for a sensible regulatory framework that places some of the burden of fake domains on those best equipped to help combat this basic form of cybercrime.
Max Iori, Douglas B. Bloom and Xinping Zhu are attorneys in the legal department of Morgan Stanley. Douglas Bloom was formerly an Assistant U.S. Attorney for the Southern District of New York.
This content has been archived. It is available through our partners, LexisNexis® and Bloomberg Law.
To view this content, please continue to their sites.
Not a Lexis Subscriber?
Subscribe Now
Not a Bloomberg Law Subscriber?
Subscribe Now
NOT FOR REPRINT
© 2025 ALM Global, LLC, All Rights Reserved. Request academic re-use from www.copyright.com. All other uses, submit a request to [email protected]. For more information visit Asset & Logo Licensing.
You Might Like
View AllTrending Stories
- 1US DOJ Threatens to Prosecute Local Officials Who Don't Aid Immigration Enforcement
- 2Kirkland Is Entering a New Market. Will Its Rates Get a Warm Welcome?
- 3African Law Firm Investigated Over ‘AI-Generated’ Case References
- 4Gen AI and Associate Legal Writing: Davis Wright Tremaine's New Training Model
- 5Departing Attorneys Sue Their Former Law Firm
Who Got The Work
J. Brugh Lower of Gibbons has entered an appearance for industrial equipment supplier Devco Corporation in a pending trademark infringement lawsuit. The suit, accusing the defendant of selling knock-off Graco products, was filed Dec. 18 in New Jersey District Court by Rivkin Radler on behalf of Graco Inc. and Graco Minnesota. The case, assigned to U.S. District Judge Zahid N. Quraishi, is 3:24-cv-11294, Graco Inc. et al v. Devco Corporation.
Who Got The Work
Rebecca Maller-Stein and Kent A. Yalowitz of Arnold & Porter Kaye Scholer have entered their appearances for Hanaco Venture Capital and its executives, Lior Prosor and David Frankel, in a pending securities lawsuit. The action, filed on Dec. 24 in New York Southern District Court by Zell, Aron & Co. on behalf of Goldeneye Advisors, accuses the defendants of negligently and fraudulently managing the plaintiff's $1 million investment. The case, assigned to U.S. District Judge Vernon S. Broderick, is 1:24-cv-09918, Goldeneye Advisors, LLC v. Hanaco Venture Capital, Ltd. et al.
Who Got The Work
Attorneys from A&O Shearman has stepped in as defense counsel for Toronto-Dominion Bank and other defendants in a pending securities class action. The suit, filed Dec. 11 in New York Southern District Court by Bleichmar Fonti & Auld, accuses the defendants of concealing the bank's 'pervasive' deficiencies in regards to its compliance with the Bank Secrecy Act and the quality of its anti-money laundering controls. The case, assigned to U.S. District Judge Arun Subramanian, is 1:24-cv-09445, Gonzalez v. The Toronto-Dominion Bank et al.
Who Got The Work
Crown Castle International, a Pennsylvania company providing shared communications infrastructure, has turned to Luke D. Wolf of Gordon Rees Scully Mansukhani to fend off a pending breach-of-contract lawsuit. The court action, filed Nov. 25 in Michigan Eastern District Court by Hooper Hathaway PC on behalf of The Town Residences LLC, accuses Crown Castle of failing to transfer approximately $30,000 in utility payments from T-Mobile in breach of a roof-top lease and assignment agreement. The case, assigned to U.S. District Judge Susan K. Declercq, is 2:24-cv-13131, The Town Residences LLC v. T-Mobile US, Inc. et al.
Who Got The Work
Wilfred P. Coronato and Daniel M. Schwartz of McCarter & English have stepped in as defense counsel to Electrolux Home Products Inc. in a pending product liability lawsuit. The court action, filed Nov. 26 in New York Eastern District Court by Poulos Lopiccolo PC and Nagel Rice LLP on behalf of David Stern, alleges that the defendant's refrigerators’ drawers and shelving repeatedly break and fall apart within months after purchase. The case, assigned to U.S. District Judge Joan M. Azrack, is 2:24-cv-08204, Stern v. Electrolux Home Products, Inc.
Featured Firms
Law Offices of Gary Martin Hays & Associates, P.C.
(470) 294-1674
Law Offices of Mark E. Salomone
(857) 444-6468
Smith & Hassler
(713) 739-1250