TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Deceptive example for malicious usage of .zip domain

88 pointsby lhoffalmost 2 years ago

10 comments

yathernalmost 2 years ago
Cool trick - they&#x27;re using HTTP auth URLs[1] so that the @ sign is doing a lot of the heavy lifting (plus some clever unicode slashes). It&#x27;s an old school phishing trick, with the additional layer of looking like a genuine zip file.<p>Not sure if this trick would be too effective in real life, Firefox and likely others will give you warnings when logging into a site like this, as this form of HTTP auth is way deprecated. However, this is the strongest example against .zip I&#x27;ve seen yet though, from someone who didn&#x27;t buy into the initial panic.<p>Side note - I&#x27;m using .zip for something legitimate! <a href="https:&#x2F;&#x2F;HN.zip" rel="nofollow noreferrer">https:&#x2F;&#x2F;HN.zip</a> is a little weekend project for an offline-caching read-only Hacker News (I lose reception in the Subway a lot so it makes it easier to navigate). It&#x27;s not done yet though - still pretty rough around the edges. Maybe in a week or two I&#x27;ll do a Show HN and see if anyone cares.<p>[1] <a href="https:&#x2F;&#x2F;developer.mozilla.org&#x2F;en-US&#x2F;docs&#x2F;Web&#x2F;HTTP&#x2F;Authentication#access_using_credentials_in_the_url" rel="nofollow noreferrer">https:&#x2F;&#x2F;developer.mozilla.org&#x2F;en-US&#x2F;docs&#x2F;Web&#x2F;HTTP&#x2F;Authentica...</a>
评论 #36438092 未加载
评论 #36437459 未加载
评论 #36437265 未加载
评论 #36439535 未加载
评论 #36443239 未加载
watashiatoalmost 2 years ago
Here&#x27;s the original source by the author: <a href="https:&#x2F;&#x2F;scribe.rip&#x2F;@bobbyrsec&#x2F;the-dangers-of-googles-zip-tld-5e1e675e59a5" rel="nofollow noreferrer">https:&#x2F;&#x2F;scribe.rip&#x2F;@bobbyrsec&#x2F;the-dangers-of-googles-zip-tld...</a><p>While I think that we really don&#x27;t need a .zip domain, this trick falls apart when not shown as an image. Hovering over either URL should tip you off. Firefox shows the actual link in the bottom left.
评论 #36435858 未加载
评论 #36440993 未加载
评论 #36440444 未加载
its-summertimealmost 2 years ago
&gt; The new &quot;.zip&quot; domain is being used almost solely for malware.<p>Citation?
blooalienalmost 2 years ago
As an &quot;old school&quot; web developer, the `@` sign in the URL was an <i>instant</i> dead giveaway to me, but I&#x27;m willing to bet almost <i>nobody</i> outside of those sorts of &quot;old school&quot; tech circles is gonna even notice that.
lostmsualmost 2 years ago
I am not sure what this does that cant be made with a href tag with text and a tooltip.
评论 #36435621 未加载
cxralmost 2 years ago
From Google&#x27;s domain delegation application (&lt;<a href="https:&#x2F;&#x2F;gtldresult.icann.org&#x2F;applicationstatus&#x2F;applicationdetails&#x2F;535" rel="nofollow noreferrer">https:&#x2F;&#x2F;gtldresult.icann.org&#x2F;applicationstatus&#x2F;applicationde...</a>&gt;):<p>&gt; <i>28. Abuse Prevention and Mitigation [...] all registered domain names will be subject to a Domain Name Anti-Abuse Policy (“Abuse Policy”). The Abuse Policy will provide CRR with broad power to suspend, cancel, or transfer domain names that violate the Abuse Policy. We plan to post the Abuse Policy on a publicly facing website at nic.zip⁄abuse</i><p>The policy document in question cannot, in fact, be found at that* address (because they&#x27;re using a wildcard URL-rewriting redirect for nic.zip that ends up pointing to a bogus URL on registry.google).<p>* Actually, anyone familiar with IANA applications will be aware that the applications posted publicly end up, coincidentally enough, mangling all references to URLs because slashes get transformed into U+2044 FRACTION SLASH, so if you actually tried to dereference <i>that</i>, you&#x27;ll end up on a path dealing in punycode TLDs—specifically &quot;xn--zipabuse-g03d&quot; in this case, which has not (yet) been delegated to anyone.
GuB-42almost 2 years ago
The trick here is the &quot;@&quot; in the URL, which makes everything before it a user name.<p>It is an old trick, and browsers tend to throw a fit before opening URLs with user names.
评论 #36435628 未加载
throw7almost 2 years ago
<a href="https:&#x2F;&#x2F;github.com&#x2F;kubernetes&#x2F;kubernetes&#x2F;archive&#x2F;refs&#x2F;tags&#x2F;@v1271.zip">https:&#x2F;&#x2F;github.com&#x2F;kubernetes&#x2F;kubernetes&#x2F;archive&#x2F;refs&#x2F;tags&#x2F;@...</a><p>I get a: &quot;404: Not Found&quot; from the site &quot;codeload.github.com&quot;
评论 #36437984 未加载
NoMoreNicksLeftalmost 2 years ago
Can&#x27;t wait for the .exe domain.
评论 #36437836 未加载
tedunangstalmost 2 years ago
How is this different from paypal.com@notpaypal.com?
评论 #36435552 未加载