domain abuse activity reporting (daar) system€¦ · sis on domains that were identified as a...

13
Domain Abuse Activity Reporting (DAAR) System Report on data from 31 March 2020 Office of the CTO Security, Stability and Resiliency team March 2020

Upload: others

Post on 19-Jul-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Domain Abuse Activity Reporting (DAAR) System€¦ · sis on domains that were identified as a security threat on 31 March 2020 only. While no single snapshot can capture trends

Domain Abuse Activity Reporting (DAAR)SystemReport on data from 31 March 2020

Office of the CTO Security, Stability and Resiliency team

March 2020

Page 2: Domain Abuse Activity Reporting (DAAR) System€¦ · sis on domains that were identified as a security threat on 31 March 2020 only. While no single snapshot can capture trends

Contents

1 General Trends in New and Legacy TLDs 51.1 Distribution of Domains Identified as Security Threats . . . . . . . . . . . . . . . 6

2 Breakdown of Individual Security Threats 7

3 Normalized Metric: Percentage of Abuse 8

4 Percentage of Abuse: Breakdown of Individual Security Threats 9

Page 3: Domain Abuse Activity Reporting (DAAR) System€¦ · sis on domains that were identified as a security threat on 31 March 2020 only. While no single snapshot can capture trends

Executive Summary

This 31 March 2020 report from the Domain Abuse Activity Reporting (DAAR) system consid-ers 207,401,252 resolving domain names from 1178 generic Top-Level Domains (gTLDs), incomparison to 206,760,930 domains in 1185 gTLDs reported on 29 February 2020. The repu-tation feeds the DAAR system employs reported at least one security threat in 392 of the 1178gTLDs as of 31 March 2020 in comparison to 377 of the 1185 gTLDs identified on 29 February2020. As a result, this report provides an analysis for only the 206,849,551 domains within the392 gTLDs with at least one security threat.

Approximately 85 percent of the resolving domain names were in gTLDs launched before2010 (referred to hereafter as "Legacy gTLDs"). Of the 739,906 domains identified as securitythreats, 440,695 or 59.56 percent were in legacy gTLDs. The other 299,211 or 40.44 percentwere in the new gTLDs. In the February 2020 report, of 658,871 total domains identified assecurity threats 406,718 domains or 61.73 percent in legacy gTLDs and 252,153 domains or38.27 percent in new gTLDs. This represents an approximate change of 2.17 percent in thenumber of security threat domains identified in legacy gTLDs.

Domains identified as security threats are not uniformly distributed across the gTLDs analyzedin this report. In the case of new gTLDs, 90 percent of the domains identified as security threatswere in just 22 of those gTLDs. In the case of legacy gTLDs, 90 percent of the security threatdomains were in just 2 of those gTLDs.

3

Page 4: Domain Abuse Activity Reporting (DAAR) System€¦ · sis on domains that were identified as a security threat on 31 March 2020 only. While no single snapshot can capture trends

Preface

This monthly report to the ICANN Board of Directors highlights activities reported in the Do-main Abuse Activity Reporting (DAAR) System, providing a snapshot as of 31 March 2020.The DAAR system studies domain name registration and security threat behavior across top-level domain (TLD) registries. This is a point-in-time report that includes data for all TLDs forwhich data was available. The report provides aggregated statistics and timeseries analysisabout security threats of interest to DAAR1 reported. In other words, this report provides analy-sis on domains that were identified as a security threat on 31 March 2020 only. While no singlesnapshot can capture trends or anomalies, historical data collected over time will show trendsand can be used to identify anomalies for further study. For more information regarding dataused in the DAAR monthly report check DAAR Context Document [1].

The overarching purpose of DAAR is to give the ICANN community reliable, persistent, andunbiased data using an open and community-vetted methodology that can be used to help in-form policy discussions. To learn more about DAAR, visit the ICANN Domain Abuse ActivityReporting web page [2].

At this juncture, DAAR provides aggregated monthly gTLD registry reports only. Reportingabout registrar portfolios requires domain name registration data to identify which domains aresponsored by which registrars. A collection system that will collect and analyze the necessaryregistrar data remains under development. We expect to add registrar reporting in future re-ports. Inclusion of country code TLD (ccTLD) registries, where the ccTLD registry informationis voluntarily provided by the ccTLD administrator, is also planned for future releases.

1The security threats of interest to DAAR for this report are: spam, phishing, malware distribution, and botnetcommand and control.

4

Page 5: Domain Abuse Activity Reporting (DAAR) System€¦ · sis on domains that were identified as a security threat on 31 March 2020 only. While no single snapshot can capture trends

1 General Trends in New and Legacy TLDs

On 31 March 2020, DAAR collected zone data for legacy and new generic top-level domains(gTLDs)2. The table below summarizes the data captured on 31 March 2020 and indicates thechanges from the data reported for the previous month.

Table 1: Monthly snapshot comparisonDomains for which Domains for which one

DAAR is collecting data or more security threat incidents

TLDs Resolving domains TLDs Resolving domainsin those gTLDs in those gTLDs

29 February 2020 1185 206,760,930 377 206,081,90931 March 2020 1178 207,401,252 392 206,849,551+/- changes from -7 640,322 15 767,642previous month

As Figure 1 displays, approximately 85 percent of gTLD domain names were registered inlegacy gTLDs launched before 20103. Figure 2 shows that the distribution stays more or lesssimilar over time.

Legacy

84.7%

New

15.3%

Figure 1: Distribution of resolving gTLD domains in zone files

Jul. 19Aug. 19

Sep. 19Oct. 19

Nov. 19Dec. 19

Jan. 20Feb. 20

Mar. 200

20

40

60

80

100

Per

cent

age

of d

omai

ns in

gTL

Ds

LegacyNew

Figure 2: Distribution of resolving gTLD domains in zone files overtime

2 While DAAR can support analysis on country code TLDs (ccTLDs), at this time, no ccTLDs are included in DAARreports.

3 Certain legacy TLDs – specifically INT, EDU, MIL, GOV, and ARPA – do not appear in DAAR because they arenot under ICANN gTLD contract and as such, zone data from these TLDs has not been included.

5

Page 6: Domain Abuse Activity Reporting (DAAR) System€¦ · sis on domains that were identified as a security threat on 31 March 2020 only. While no single snapshot can capture trends

1.1 Distribution of Domains Identified as Security Threats

Figure 3 illustrates the proportion of domains identified as security threats in percentages inlegacy and new gTLDs. Of the 739,906 domains identified as security threats, 440,695 or 59percent were in legacy gTLDs, and 299,211 or 40 percent were in the new gTLDs. Figure 4displays this proportion overtime.

Legacy

59.6%

New

40.4%

Figure 3: Distribution of domains identified as security threats

Jul. 19

Aug. 19Sep. 19

Oct. 19

Nov. 19Dec. 19

Jan. 20Feb. 20

Mar. 20

0

20

40

60

80

100

Per

cent

age

of s

ecur

ity th

reat

dom

ains

in g

TLD

s

LegacyNew

Figure 4: Distribution of domains identified as security threats over time

Domains identified as security threats in gTLDs are not uniformly distributed, either in the legacyor new gTLDs. The following graphs provide the cumulative distribution of domains reportedas security threats for the legacy gTLDs and the new gTLDs respectively. Note that given thenumber of new gTLDs is many times larger than the legacy gTLDs, the X-axes of the two graphsare significantly different. As can be seen from Figure 5a, of the 299,211 domains identified assecurity threats reported in 376 new gTLDs:

• 40 percent were in the 2 most-exploited new gTLDs.

• 60 percent were in the 5 most-exploited new gTLDs.

• 80 percent were in the 12 most-exploited new gTLDs.

• 90 percent were in the 22 most-exploited new gTLDs.

For legacy gTLDs, Figure 5b displays the distribution of domains identified as security threatsacross legacy gTLDs. 1 legacy gTLD alone is responsible for 80 percent of domains identifiedas security threats and in total 2 legacy gTLDs bare more than 87 percent of all domains iden-tified as security threats.

6

Page 7: Domain Abuse Activity Reporting (DAAR) System€¦ · sis on domains that were identified as a security threat on 31 March 2020 only. While no single snapshot can capture trends

0 50 100 150 200 250 300 350Count of new gTLDs

20

40

60

80

100

Per

cent

age

of a

buse

d do

mai

ns

(a) new gTLDs

0 2 4 6 8 10 12 14Count of legacy gTLDs

80.0

82.5

85.0

87.5

90.0

92.5

95.0

97.5

100.0

(b) legacy gTLDs

Figure 5: Cumulative distribution of domains identified as security threats

Finally, the total amount of domains used for security threats is not the same over time. Figure 6displays the total number of domains identified as security threats over time accross legacy andnew gTLDs.

Jul. 19

Aug. 19Sep. 19

Oct. 19

Nov. 19Dec. 19

Jan. 20Feb. 20

Mar. 20

0

100000

200000

300000

400000

500000

Tota

l raw

cou

nt o

f sec

urity

thre

at d

omai

ns

LegacyNew

Figure 6: Total number of domains identified as security threats over time

2 Breakdown of Individual Security Threats

DAAR uses DNS Reputation Provider feeds to identify domain names reported to be associatedwith four kinds of security threats: phishing, malware distribution, botnet command-and-control,and spam. Figure 7 displays the breakdown of security threats from the DNS reputation dataDAAR is utilizing4.

Phishing Domains12.0%

Malware Domains3.7%

Spam Domains79.2%

Botnet C&C Domains

5.1%

Figure 7: Breakdown of domains identified as security threats across all DAAR threat types

4 The list of DNS Reputation Providers DAAR used for the generation of this report is included in the Appendix.

7

Page 8: Domain Abuse Activity Reporting (DAAR) System€¦ · sis on domains that were identified as a security threat on 31 March 2020 only. While no single snapshot can capture trends

Figure 8 shows the distribution of security threats across new and legacy gTLDs for these fourthreat types and figure 9 captures that over time.

Phishing Malware

Spam

Botnet C&C 0

20

40

60

80

100

% o

f dom

ains

iden

tifie

d as

sec

urity

thre

ats

LegacyNew

Figure 8: Proportion of domains identified as security threats within gTLD types

Jul. 1

9

Aug. 19

Sep. 19

Oct. 19

Nov. 19

Dec. 19

Jan. 2

0

Feb. 20

Mar. 20

0

20

40

60

80

100

% o

f dom

ains

iden

tifie

d as

sec

urity

thre

ats

Phishing

LegacyNew

Jul. 1

9

Aug. 19

Sep. 19

Oct. 19

Nov. 19

Dec. 19

Jan. 2

0

Feb. 20

Mar. 20

0

20

40

60

80

100Malware

LegacyNew

Jul. 1

9

Aug. 19

Sep. 19

Oct. 19

Nov. 19

Dec. 19

Jan. 2

0

Feb. 20

Mar. 20

0

20

40

60

80

100Spam

LegacyNew

Jul. 1

9

Aug. 19

Sep. 19

Oct. 19

Nov. 19

Dec. 19

Jan. 2

0

Feb. 20

Mar. 20

0

20

40

60

80

100Command & Control

LegacyNew

Figure 9: Proportion of domains identified as security threats within gTLD types over time

3 Normalized Metric: Percentage of Abuse

Figure 10 demonstrates the raw counts of domains identified as security threats (y-axis) versusdomains resolved in gTLD zone files (x-axis). We use a logarithmic scale for the x-axis andy-axis to assist in visualizing the diverse counts of these two variables.Raw counts of domains identified as security threats do not necessarily reflect the extent towhich a gTLD is the focus of exploitation by security threat actors, since each gTLD has differentnumber of domains registered. For this reason, we calculate a normalized value, a percentageof abuse (Pab). Pab represents the percentage of domains that are listed for being a securitythreat in at least one of the DNS Reputation feeds DAAR utilizes, normalized by the amount ofresolving domains within a given gTLD. For gTLDs, Pab is determined as follows:

Pab = (Number of domains identified as security threats in TLDNumber of resolving domains within TLD zone

) × 100

Pab can be used to provide “apples to apples” comparisons for the number of resolving domainsthat are identified as security threats over time or between gTLDs. This information could helpthe TLD operators determine whether their anti-abuse measures are effective as well as helpthe ICANN community in making informed policy decisions regarding security threat mitigation.

The average Pab for all 1178 gTLDs in DAAR for March 2020 is approximately 0.3 percent.

8

Page 9: Domain Abuse Activity Reporting (DAAR) System€¦ · sis on domains that were identified as a security threat on 31 March 2020 only. While no single snapshot can capture trends

Figure 11 illustrates the Pab in these gTLDs. Circle size indicates the non-normalized (raw)count of domains identified as security threats.Additionally, Figure 12 displays the average Pab across different gTLD types over time.

4 Percentage of Abuse: Breakdown of Individual Security Threats

Figure 13 displays Percentage of abuse for domains identified as security threats versus do-mains resolved in new and legacy gTLDs for each of the security threats of interest to DAAR.

1 2 3 4 5 6 7 8Raw count of domains resolved in gTLD [Log scale]

0

1

2

3

4

5

Raw

cou

nt o

f sec

urity

thre

at d

omai

ns in

gTL

D [L

og s

cale

]

LegacyNew

Figure 10: Raw counts of domains identified as security threat versus counts of resolved domains ingTLDs

0 2 4 6 8Domains resolved in TLD [Log scale]

5

0

5

10

15

20

25

30

Per

cent

age

of a

buse

[%] Legacy

New

Circle size indicates raw threat counts

Figure 11: Percentage of abuse for domains identified as security threats vs. counts of domains re-solved in gTLDs

Jul. 19

Aug. 19Sep. 19

Oct. 19

Nov. 19Dec. 19

Jan. 20Feb. 20

Mar. 20

0.0

0.2

0.4

0.6

0.8

Ave

rage

[%] o

f abu

se p

er g

TLD

type Legacy

New

Figure 12: Percentage of abuse for different gTLD types over time

9

Page 10: Domain Abuse Activity Reporting (DAAR) System€¦ · sis on domains that were identified as a security threat on 31 March 2020 only. While no single snapshot can capture trends

Each dots represents a gTLD provider. The bigger the size of the circle the higher the absolutecount of domains identified as security threats.

0 2 4 6 8

0

2

4

6

8

10

12

14

Per

cent

age

of a

buse

[%]

PhishingLegacyNew

0 2 4 6 8

0

5

10

15

20

MalwareLegacyNew

0 2 4 6 8Domains resolved in TLD [Log scale]

0

5

10

15

20

25

30

Per

cent

age

of a

buse

[%]

SpamLegacyNew

0 2 4 6 8Domains resolved in TLD [Log scale]

0.00

0.05

0.10

0.15

0.20

0.25

0.30Botnet C&C

LegacyNew

Circle size indicates raw threat counts [square root]

Figure 13: Percentage of abuse for domains identified as security threats vs. counts of resolved do-mains in gTLDs across different threat types

Finally, Figure 14 shows changes in the average percentage of abuse in legacy and new gTLDsfor each security threat of interest to DAAR.

10

Page 11: Domain Abuse Activity Reporting (DAAR) System€¦ · sis on domains that were identified as a security threat on 31 March 2020 only. While no single snapshot can capture trends

0.03

0.04

0.05

0.06

0.07

0.08

Ave

rage

[%] o

f abu

se p

er g

TLD

type

Phishing

LegacyNew

0.00

0.01

0.02

0.03

0.04

0.05

Ave

rage

[%] o

f abu

se p

er g

TLD

type

Malware

LegacyNew

0.0

0.2

0.4

0.6

0.8

1.0

Ave

rage

[%] o

f abu

se p

er g

TLD

type

Spam

LegacyNew

Jul. 19

Aug. 19Sep. 19

Oct. 19

Nov. 19Dec. 19

Jan. 20Feb. 20

Mar. 20

0.00

0.02

0.04

0.06

0.08

0.10

Ave

rage

[%] o

f abu

se p

er g

TLD

type

Command & Control

LegacyNew

Figure 14: Average percentage of abuse in gTLDs across different threat types over time

11

Page 12: Domain Abuse Activity Reporting (DAAR) System€¦ · sis on domains that were identified as a security threat on 31 March 2020 only. While no single snapshot can capture trends

References

[1] Understanding the Domain Abuse Activity Reporting (DAAR) Monthly Report. https://www.icann.org/en/system/files/files/daar-monthly-report-04feb19-en.pdf.Jan. 2019.

[2] ICANN Domain Abuse Activity Reporting. https://www.icann.org/octo-ssr/daar.Dec. 2018.

[3] SURBL. http://www.surbl.org/lists. Dec. 2018.

[4] Spamhaus. https://www.spamhaus.org. Dec. 2018.

[5] Spamhaus Domain Block List (DBL). https : / / www . spamhaus . org / faq / section /Spamhaus%20DBL#291. Dec. 2018.

[6] Anti-Phishing Working Group (APWG). https://www.apwg.org. Dec. 2018.

[7] PhishTank. https://www.phishtank.com. Dec. 2018.

[8] Malware Patrol. https://www.malwarepatrol.net/enterprise-threat-data/. Dec.2018.

[9] Abuse.ch. https://abuse.ch. Dec. 2018.

[10] Abuse.ch Feodo Tracker. https://feodotracker.abuse.ch. Dec. 2018.

[11] Abuse.ch Ransomware Tracker. https://ransomwaretracker.abuse.ch. Dec. 2018.

12

Page 13: Domain Abuse Activity Reporting (DAAR) System€¦ · sis on domains that were identified as a security threat on 31 March 2020 only. While no single snapshot can capture trends

Appendix

The table below provides a listing of the reputation providers and feeds used in the DAARsystem along with their corresponding threat types.

Reputation provider Feed used Threat typeSURBL [3] JwSpamSpy + Prolocation Spam

Sa-blacklist SpamSpamCop SpamAbuseButler SpamPhishing domains PhishingMalware domains Malware

Spamhaus [4] Domain Block List (DBL) [5] Spam - Phishing - Malware - Botnet C&CAnti-Phishing Working Group [6] Phishing URLs PhishingPhishTank [7] Phishing URLs PhishingMalware Patrol [8] Malware URLs Malware

Ransomware URLs MalwareBotnet C&C URLs Botnet C&C

Abuse.ch [9] FeodoTracker [10] MalwareRansomware Tracker [11] Malware

13