{"id":614,"date":"2014-09-25T19:37:41","date_gmt":"2014-09-25T17:37:41","guid":{"rendered":"http:\/\/www.dotnice.com\/?post_type=post&#038;p=614"},"modified":"2017-02-18T07:19:11","modified_gmt":"2017-02-18T07:19:11","slug":"threatpost-researchers-work-at-predicting-malicious-domains","status":"publish","type":"post","link":"https:\/\/stg.dotnice.com\/en\/threatpost-researchers-work-at-predicting-malicious-domains\/","title":{"rendered":"Threatpost: Researchers Work At Predicting Malicious Domains"},"content":{"rendered":"<p>\u201cA typical phishing or Web-based malware attack usually isn\u2019t terribly complex,\u201d says a report on Threat Post. \u201cBut they need a few things in order to work, and one of the key components often is a malicious domain. Researchers spend a lot of time identifying and taking these domains down, but some researchers now are trying to stay a step ahead of the game by predicting which domains will be used for malicious purposes.\u201d<br \/>\nAccording to the report, \u201cLike bored tweens at the mall, malicious domains tend to cluster together, showing up in large groups at certain hosting providers. Often, these are so-called bulletproof hosting companies that aren\u2019t overly concerned with what kind of activity is emanating from the domains on its platform.\u201d<br \/>\nDozens of domains are often registered at a time, \u201ctypically with nonsensical alphanumeric URLs, and use them as needed, discarding them whenever they\u2019re identified as malicious.\u201d<br \/>\nTo counter these attackers, researchers at Palo Alto Networks have been looking at their behaviours. And as a result they have \u201cidentified a few things that can help them predict which domains may end up being malicious at some point. They found that one domains are identified as malicious and blacklisted by reputation services, the attackers will abandon them. Then, after a period of time, the domain is removed from the reputation systems and other blacklists and will fall back into a pool of domains that are useful to attackers. In research presented at the Virus Bulletin conference here Wednesday, Wei Xu, Yanxin Zhang and Kyle Sanders of Palo Alto said that they have developed a formula that enables them to predict which of those domains will be used by attackers again.\u201d<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u201cA typical phishing or Web-based malware attack usually isn\u2019t terribly complex,\u201d says a report on Threat Post. \u201cBut they need a few things in order to work, and one of the key components often is a malicious domain. Researchers spend a lot of time identifying and taking these domains down, but some researchers now are &hellip; <a href=\"https:\/\/stg.dotnice.com\/en\/threatpost-researchers-work-at-predicting-malicious-domains\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Threatpost: Researchers Work At Predicting Malicious Domains<\/span><\/a><\/p>\n","protected":false},"author":5,"featured_media":615,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[73,72,76],"class_list":["post-614","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","tag-malware-web-based","tag-phishing","tag-threatpost"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Threatpost: Researchers Work At Predicting Malicious Domains - dotNice<\/title>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Threatpost: Researchers Work At Predicting Malicious Domains - dotNice\" \/>\n<meta property=\"og:description\" content=\"\u201cA typical phishing or Web-based malware attack usually isn\u2019t terribly complex,\u201d says a report on Threat Post. \u201cBut they need a few things in order to work, and one of the key components often is a malicious domain. Researchers spend a lot of time identifying and taking these domains down, but some researchers now are &hellip; Continue reading Threatpost: Researchers Work At Predicting Malicious Domains\" \/>\n<meta property=\"og:url\" content=\"https:\/\/stg.dotnice.com\/en\/threatpost-researchers-work-at-predicting-malicious-domains\/\" \/>\n<meta property=\"og:site_name\" content=\"dotNice\" \/>\n<meta property=\"article:published_time\" content=\"2014-09-25T17:37:41+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2017-02-18T07:19:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/stg.dotnice.com\/media\/threatpost.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"288\" \/>\n\t<meta property=\"og:image:height\" content=\"85\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Francesca Cardillo\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Francesca Cardillo\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/stg.dotnice.com\\\/en\\\/threatpost-researchers-work-at-predicting-malicious-domains\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/stg.dotnice.com\\\/en\\\/threatpost-researchers-work-at-predicting-malicious-domains\\\/\"},\"author\":{\"name\":\"Francesca Cardillo\",\"@id\":\"https:\\\/\\\/stg.dotnice.com\\\/en\\\/#\\\/schema\\\/person\\\/2369e3278b83c07479a70d4f659d59dd\"},\"headline\":\"Threatpost: Researchers Work At Predicting Malicious Domains\",\"datePublished\":\"2014-09-25T17:37:41+00:00\",\"dateModified\":\"2017-02-18T07:19:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/stg.dotnice.com\\\/en\\\/threatpost-researchers-work-at-predicting-malicious-domains\\\/\"},\"wordCount\":291,\"image\":{\"@id\":\"https:\\\/\\\/stg.dotnice.com\\\/en\\\/threatpost-researchers-work-at-predicting-malicious-domains\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/stg.dotnice.com\\\/app\\\/uploads\\\/threatpost.jpg\",\"keywords\":[\"malware web-based\",\"phishing\",\"threatpost\"],\"articleSection\":[\"News\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/stg.dotnice.com\\\/en\\\/threatpost-researchers-work-at-predicting-malicious-domains\\\/\",\"url\":\"https:\\\/\\\/stg.dotnice.com\\\/en\\\/threatpost-researchers-work-at-predicting-malicious-domains\\\/\",\"name\":\"Threatpost: Researchers Work At Predicting Malicious Domains - dotNice\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/stg.dotnice.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/stg.dotnice.com\\\/en\\\/threatpost-researchers-work-at-predicting-malicious-domains\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/stg.dotnice.com\\\/en\\\/threatpost-researchers-work-at-predicting-malicious-domains\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/stg.dotnice.com\\\/app\\\/uploads\\\/threatpost.jpg\",\"datePublished\":\"2014-09-25T17:37:41+00:00\",\"dateModified\":\"2017-02-18T07:19:11+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/stg.dotnice.com\\\/en\\\/#\\\/schema\\\/person\\\/2369e3278b83c07479a70d4f659d59dd\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/stg.dotnice.com\\\/en\\\/threatpost-researchers-work-at-predicting-malicious-domains\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/stg.dotnice.com\\\/en\\\/threatpost-researchers-work-at-predicting-malicious-domains\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/stg.dotnice.com\\\/en\\\/threatpost-researchers-work-at-predicting-malicious-domains\\\/#primaryimage\",\"url\":\"https:\\\/\\\/stg.dotnice.com\\\/app\\\/uploads\\\/threatpost.jpg\",\"contentUrl\":\"https:\\\/\\\/stg.dotnice.com\\\/app\\\/uploads\\\/threatpost.jpg\",\"width\":288,\"height\":85},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/stg.dotnice.com\\\/en\\\/threatpost-researchers-work-at-predicting-malicious-domains\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/stg.dotnice.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Threatpost: Researchers Work At Predicting Malicious Domains\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/stg.dotnice.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/stg.dotnice.com\\\/en\\\/\",\"name\":\"dotNice\",\"description\":\"digital brand protection\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/stg.dotnice.com\\\/en\\\/?s=%7Bsearch_term_string%7D\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/stg.dotnice.com\\\/en\\\/#\\\/schema\\\/person\\\/2369e3278b83c07479a70d4f659d59dd\",\"name\":\"Francesca Cardillo\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/23b77d63ee7341a9ee265d93346d7174368be444367be87200c83d09864d617e?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/23b77d63ee7341a9ee265d93346d7174368be444367be87200c83d09864d617e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/23b77d63ee7341a9ee265d93346d7174368be444367be87200c83d09864d617e?s=96&d=mm&r=g\",\"caption\":\"Francesca Cardillo\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Threatpost: Researchers Work At Predicting Malicious Domains - dotNice","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Threatpost: Researchers Work At Predicting Malicious Domains - dotNice","og_description":"\u201cA typical phishing or Web-based malware attack usually isn\u2019t terribly complex,\u201d says a report on Threat Post. \u201cBut they need a few things in order to work, and one of the key components often is a malicious domain. Researchers spend a lot of time identifying and taking these domains down, but some researchers now are &hellip; Continue reading Threatpost: Researchers Work At Predicting Malicious Domains","og_url":"https:\/\/stg.dotnice.com\/en\/threatpost-researchers-work-at-predicting-malicious-domains\/","og_site_name":"dotNice","article_published_time":"2014-09-25T17:37:41+00:00","article_modified_time":"2017-02-18T07:19:11+00:00","og_image":[{"width":288,"height":85,"url":"https:\/\/stg.dotnice.com\/media\/threatpost.jpg","type":"image\/jpeg"}],"author":"Francesca Cardillo","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Francesca Cardillo","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/stg.dotnice.com\/en\/threatpost-researchers-work-at-predicting-malicious-domains\/#article","isPartOf":{"@id":"https:\/\/stg.dotnice.com\/en\/threatpost-researchers-work-at-predicting-malicious-domains\/"},"author":{"name":"Francesca Cardillo","@id":"https:\/\/stg.dotnice.com\/en\/#\/schema\/person\/2369e3278b83c07479a70d4f659d59dd"},"headline":"Threatpost: Researchers Work At Predicting Malicious Domains","datePublished":"2014-09-25T17:37:41+00:00","dateModified":"2017-02-18T07:19:11+00:00","mainEntityOfPage":{"@id":"https:\/\/stg.dotnice.com\/en\/threatpost-researchers-work-at-predicting-malicious-domains\/"},"wordCount":291,"image":{"@id":"https:\/\/stg.dotnice.com\/en\/threatpost-researchers-work-at-predicting-malicious-domains\/#primaryimage"},"thumbnailUrl":"https:\/\/stg.dotnice.com\/app\/uploads\/threatpost.jpg","keywords":["malware web-based","phishing","threatpost"],"articleSection":["News"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/stg.dotnice.com\/en\/threatpost-researchers-work-at-predicting-malicious-domains\/","url":"https:\/\/stg.dotnice.com\/en\/threatpost-researchers-work-at-predicting-malicious-domains\/","name":"Threatpost: Researchers Work At Predicting Malicious Domains - dotNice","isPartOf":{"@id":"https:\/\/stg.dotnice.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/stg.dotnice.com\/en\/threatpost-researchers-work-at-predicting-malicious-domains\/#primaryimage"},"image":{"@id":"https:\/\/stg.dotnice.com\/en\/threatpost-researchers-work-at-predicting-malicious-domains\/#primaryimage"},"thumbnailUrl":"https:\/\/stg.dotnice.com\/app\/uploads\/threatpost.jpg","datePublished":"2014-09-25T17:37:41+00:00","dateModified":"2017-02-18T07:19:11+00:00","author":{"@id":"https:\/\/stg.dotnice.com\/en\/#\/schema\/person\/2369e3278b83c07479a70d4f659d59dd"},"breadcrumb":{"@id":"https:\/\/stg.dotnice.com\/en\/threatpost-researchers-work-at-predicting-malicious-domains\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/stg.dotnice.com\/en\/threatpost-researchers-work-at-predicting-malicious-domains\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/stg.dotnice.com\/en\/threatpost-researchers-work-at-predicting-malicious-domains\/#primaryimage","url":"https:\/\/stg.dotnice.com\/app\/uploads\/threatpost.jpg","contentUrl":"https:\/\/stg.dotnice.com\/app\/uploads\/threatpost.jpg","width":288,"height":85},{"@type":"BreadcrumbList","@id":"https:\/\/stg.dotnice.com\/en\/threatpost-researchers-work-at-predicting-malicious-domains\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/stg.dotnice.com\/en\/"},{"@type":"ListItem","position":2,"name":"Threatpost: Researchers Work At Predicting Malicious Domains"}]},{"@type":"WebSite","@id":"https:\/\/stg.dotnice.com\/en\/#website","url":"https:\/\/stg.dotnice.com\/en\/","name":"dotNice","description":"digital brand protection","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/stg.dotnice.com\/en\/?s=%7Bsearch_term_string%7D"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/stg.dotnice.com\/en\/#\/schema\/person\/2369e3278b83c07479a70d4f659d59dd","name":"Francesca Cardillo","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/23b77d63ee7341a9ee265d93346d7174368be444367be87200c83d09864d617e?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/23b77d63ee7341a9ee265d93346d7174368be444367be87200c83d09864d617e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/23b77d63ee7341a9ee265d93346d7174368be444367be87200c83d09864d617e?s=96&d=mm&r=g","caption":"Francesca Cardillo"}}]}},"_links":{"self":[{"href":"https:\/\/stg.dotnice.com\/en\/wp-json\/wp\/v2\/posts\/614","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/stg.dotnice.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/stg.dotnice.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/stg.dotnice.com\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/stg.dotnice.com\/en\/wp-json\/wp\/v2\/comments?post=614"}],"version-history":[{"count":0,"href":"https:\/\/stg.dotnice.com\/en\/wp-json\/wp\/v2\/posts\/614\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/stg.dotnice.com\/en\/wp-json\/wp\/v2\/media\/615"}],"wp:attachment":[{"href":"https:\/\/stg.dotnice.com\/en\/wp-json\/wp\/v2\/media?parent=614"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/stg.dotnice.com\/en\/wp-json\/wp\/v2\/categories?post=614"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/stg.dotnice.com\/en\/wp-json\/wp\/v2\/tags?post=614"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}