7 out of 10 newly registered domains (NRDs) are either malicious, suspicious or not safe for work, say Palo Alto Networks researchers, and advise organizations to block access to them with URL filtering.

“While this may be deemed a bit aggressive by some due to potential false-positives, the risk from threats via NRDs is much greater. At the bare minimum, if access to NRDs are allowed, then alerts should be set up for additional visibility,” they noted.

What is an NRD?

The researchers consider a domain to be “newly registered” if it’s been registered or had a change in ownership within the last 32 days.

Newly registered domains can, of course, be benign, but the fact that over 70 percent of them are malicious or otherwise potentially harmful to organizations and their members should definitely spur admins to consider blocking access to them at the network level.

Here’s another reason for this move: most NRDs used for malicious purposes are “alive” for a very short while – a few hours or days – and security vendors might not spot them and react in time to block them.

Other interesting facts

Malicious or potentially harmful NDRs are set up to serve as C&C channels; distribute malware, potentially unwanted programs and adware; host phishing pages and scam pages; send email spam. “Not safe for work” domains host content that might be objectionable in an enterprise setting (adult content, gambling, etc.).

Threat actors use various techniques for their malicious domains to fly under the radar of automatic detection tools. For example, a phishing domain might be using a CAPTCHA so that crawlers don’t access the actual phishing page.

The creation of malicious NDRs can be automated. Domains that serve as a C&C channel or for data exfiltration are often generated/registered on demand, by using domain generation algorithms. Phishing pages, on the other hand, are often set up on typosquatted domains (e.g., and the phishers are counting on users tendency to mistype actual (popular) URLs they want to visit.

Palo Alto Networks says that their system identifies, on average, about 200,000 NRDs every day.

While malicious NDRs ending in and .uk are the most numerous, country code top-level domains for Tonga, Kiribati and Norfolk Island have the highest malicious NDR rate:

“We would even go as far as to recommend blocking complete TLDs that are mainly utilized by bad actors. Of course, each organization must understand what their tolerance is for potential false-positives when blocking whole TLDs,” the researchers

Culled from Infosec News Ireland

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.