Cloudflare and Scammers

The problem we have is that the scammers use cloudflare to make their server and then because of the universal SSL certifricate provided by Cloudflare for free, they can point any URL at that scam site and just keep changing that URL every hour and use the same ads on social media no matter how often we report them.

The problem we have is that the scammers use cloudflare to make their server and then because of the universal SSL certificate provided by Cloudflare for free, they can point any URL at that scam site and just keep changing that URL every hour and use the same ads on social media no matter how often we report them.

This is a significant issue with the abuse of Cloudflare's services, especially its Universal SSL certificates, by malicious actors. Let's look at a breakdown of how scammers leverage these features and what the potential ways to mitigate this issue might be:


How Scammers Exploit Cloudflare

  1. Free Universal SSL Certificates:

    • Cloudflare offers free SSL certificates, which allow scammers to create a secure HTTPS connection for their sites. This gives the illusion of legitimacy to unsuspecting users.
  2. URL Redirection and Domain Rotation:

    • Scammers often use a dynamic approach, frequently changing domain names (URL rotation) and pointing them to the same backend server hosted via Cloudflare.
    • Social media ads and links are updated regularly to evade detection and takedowns.
  3. Cloudflare’s IP Masking:

    • By using Cloudflare, the true origin server’s IP is hidden, making it difficult to directly target and shut down the scam website.
  4. Resilient Infrastructure:

    • Even if one domain is blacklisted or reported, scammers can easily spin up a new domain and continue their operations.

Potential Solutions and Actions

  1. Improving Reporting Mechanisms:

    • Cloudflare Abuse Reporting: You can report abuse directly to Cloudflare (Cloudflare's Abuse Form). This includes reporting fraudulent or malicious activity hosted through their network.
    • Provide evidence, including the scam URL, ads, and details about the scam.
  2. Social Media Ad Review:

    • Work with the social media platform to enforce stricter reviews for ads leading to new or suspicious domains.
    • Highlight that scammers use redirection and domain rotation to evade detection, urging the platform to improve detection algorithms.
  3. Track Patterns:

    • Investigate shared characteristics of the scam sites (e.g., design, wording, contact info) and include these in reports to domain registrars and hosting providers.
  4. Engage Authorities:

    • Share your findings with cybersecurity organizations, local law enforcement, or international anti-fraud agencies.
    • They may have more extensive tools to track the scam's origin and take coordinated action.
  5. Push for Policy Changes:

    • Advocate for stricter regulations on SSL certificate issuance and a more robust vetting process for free SSL services.

Limitations

  • Cloudflare has policies to protect user privacy and free speech, which can delay or limit action against abuse.
  • Automated takedowns often require substantial evidence or repeated complaints.

We're actively working on this issue, documenting patterns, gathering evidence, and submitting abuse reports systematically will increase the chances of intervention. Let us know if you'd like assistance with drafting a complaint or any other type of action that companies like Netcraft can provide as the idea of reporting URLs is completely pointless.

Reporting URLs to Netcraft is Completely Pointless

This is an iimportant point to realise: if scammers are using infrastructure like Cloudflare to rapidly rotate URLs, then traditional URL-based takedown systems (like Netcraft's) are inherently flawed. This approach fails to address the root of the issue because it focuses on reactive measures, not the underlying mechanics of the scam.

Here’s what this means in practice:


Why URL-Based Reporting is Ineffective

  1. Domain Rotation:

    • Scammers simply register new domains or subdomains, often using automated systems. Once one URL is flagged, they redirect traffic to a fresh one, circumventing any takedown.
  2. Cloudflare and Dynamic SSL:

    • With Cloudflare's Universal SSL, scammers can seamlessly switch between domains without technical effort, preserving their operations across new URLs.
  3. No Backend Access:

    • Reporting URLs doesn’t shut down the scam server because its actual location is masked by Cloudflare. The hosting provider is never exposed directly in most cases.
  4. Social Media Ads Stay the Same:

    • Ads direct users to whatever the current scam URL is, and platforms often rely on URL-based blacklists for moderation. This results in a game of whack-a-mole.
  5. Time Wasted:

    • Victims, researchers, and authorities spend hours reporting individual URLs, only for scammers to stay one step ahead with their infrastructure intact.

A Better Approach

Instead of focusing on individual URLs, the response should target the infrastructure and patterns used by these scams:

1. Identify and Flag Backend Infrastructure

  • Use tools to analyze shared characteristics of the sites (like common code snippets, analytics IDs, or hosting patterns).
  • If possible, investigate and report the actual hosting provider or the backend server IP (if uncovered via DNS logs or traffic analysis).

2. Focus on Ad Campaigns

  • Instead of reporting URLs, report the ads promoting these scams. Ads are the lifeblood of the operation; if the ad campaigns are dismantled, the scam's reach is significantly diminished.
  • Social media platforms need better tools to detect patterns of abuse beyond just flagged URLs.

3. Pressure Cloudflare

  • Cloudflare’s abuse process must be made more transparent and proactive. Scammers often rely on its services because of its tolerance for anonymity and easy setup.
  • Advocate for changes like stricter verification for SSL certificates and domain connections.

4. Monitor Payment Pathways

  • Scammers need a way to collect money. Whether it’s fraudulent credit card payments, cryptocurrency wallets, or fake online stores, identifying and disrupting these mechanisms can have a bigger impact.

5. Automation for Scam Detection

  • Build or support tools that use AI to identify scammy patterns (e.g., phrases, web designs, redirects). These tools can flag entire classes of scams rather than individual URLs.

6. Public Awareness

  • Educate the public to recognize common signs of scams, especially those operating under HTTPS or flashy domains. Many people still equate HTTPS with legitimacy.

Conclusion: Fighting the Right Battle

URL-based takedowns are a band-aid solution, and your frustration is valid. To dismantle these scams, we need to focus on:

  • The infrastructure enabling them (Cloudflare, free SSLs).
  • The platforms promoting them (social media ads).
  • The patterns behind their operations (server setups, payment systems).

Redirecting efforts toward these areas will likely have a much greater impact than playing endless games of "flag the URL." If you'd like help making more effective reports or strategizing actions, Netcraft should be here to assist, not divert the time of conscientious web users who are trying to make the internet a safer place.

CloudFlare Take no Responsibility

Cloudflare distances itself from the content hosted through its services. This stance—while legally sound—can lead to frustration when dealing with malicious actors abusing their infrastructure. Here’s a deeper dive into why this happens and what might be done about it:


Cloudflare's Stance: "We Don't Host Content"

  1. Cloudflare as a Proxy, Not a Host:

    • Cloudflare positions itself as a Content Delivery Network (CDN) and security layer, not as the hosting provider. The actual hosting occurs on third-party servers.
    • This distinction allows them to argue that they are not responsible for the legality of the content they deliver.
  2. Legal Protections:

    • Cloudflare operates under laws like the Communications Decency Act (Section 230 in the U.S.), which shields platforms from liability for content they neither create nor control.
    • Their role as an intermediary gives them strong legal protection, allowing them to focus on providing technical services rather than policing content.
  3. Abuse Reporting Process:

    • Cloudflare’s abuse team typically forwards reports to the hosting provider or domain registrar rather than taking direct action.
    • They may only act directly in extreme cases (e.g., phishing or malware distribution).

The Core Problem

Cloudflare’s refusal to take direct responsibility creates a situation where:

  • Scammers are shielded by Cloudflare’s services, particularly its masking of origin IP addresses.
  • Takedown efforts are slowed because complaints must first be processed and forwarded, often with no guarantee of action by the hosting provider.
  • Victims are left vulnerable, as scammers continue exploiting the infrastructure without immediate consequences.

Possible Remedies

  1. Policy Advocacy:

    • Cloudflare could be pressured to revise its abuse policies to take stronger action against flagged domains. For example:
      • Proactively monitor domains for fraudulent activity after abuse reports.
      • Implement stricter checks for free SSL issuance.
      • Suspend service for repeat offenders.
  2. Transparency Requirements:

    • Advocate for laws or regulations requiring CDNs to disclose origin server IPs for sites involved in malicious activity. This would allow direct targeting of the hosting provider.
  3. Increased Hosting Provider Accountability:

    • Push for hosting providers to adopt stricter anti-abuse policies and act quickly on forwarded complaints.
    • Cloudflare often shifts responsibility to these providers, but many smaller hosts lack robust abuse management.
  4. Collaborative Blacklisting:

    • Organizations like Netcraft, Google Safe Browsing, and social media platforms could collaborate to identify and preemptively block patterns of abuse rather than react to individual cases.
  5. Target Payment Channels:

    • Many scams involve financial transactions. Targeting payment processors (credit cards, PayPal, crypto wallets) can disrupt scammers' ability to profit.

The Bigger Picture

While Cloudflare’s stance is frustrating, they are not the only entity enabling these scams. The ecosystem includes:

  • Domain registrars issuing domains without verification.
  • Hosting providers allowing malicious sites.
  • Social media platforms promoting scam ads.
  • Payment processors enabling transactions.

Addressing these scams requires systemic changes, and holding intermediaries like Cloudflare more accountable is one piece of that puzzle.


If you would you like help drafting a specific complaint to Cloudflare or another entity involved in these cases, we could brainstorm how to raise awareness about these systemic issues. Just drop us a line!

CloudFlare are the Enablers in all this!

You're absolutely right to point out that Cloudflare plays a pivotal role in enabling scammers to operate with impunity. While they may claim not to be directly responsible for hosting the content, their services provide the infrastructure that shields scammers from detection and enables them to evade accountability. Let’s unpack why this makes them enablers and how this issue can be addressed more effectively.


How Cloudflare Enables Scammers

  1. IP Masking:

    • Cloudflare’s reverse proxy service hides the real IP address of the origin server. This makes it nearly impossible for victims, security researchers, or authorities to directly target the hosting provider.
    • This protection is crucial for legitimate privacy concerns but equally shields bad actors.
  2. Universal SSL Certificates:

    • Cloudflare issues free SSL certificates, allowing scammers to present their sites as "secure" with HTTPS.
    • To most users, the padlock symbol in a browser implies trustworthiness, despite the content being fraudulent.
  3. Rapid Domain Deployment:

    • Cloudflare makes it easy to integrate new domains into its network. Scammers exploit this by quickly spinning up new domains and redirecting traffic, effectively staying ahead of takedowns.
  4. Non-Intervention Policy:

    • Cloudflare rarely terminates service to malicious sites, instead forwarding abuse complaints to hosting providers, who may or may not take action.
    • This “hands-off” approach gives scammers more time to operate.
  5. Scalability:

    • Cloudflare’s infrastructure allows scammers to handle massive traffic, ensuring their operations remain stable even under scrutiny or public exposure.

Why This Makes Cloudflare Complicit

  • Facilitating Criminal Activity: Cloudflare provides the tools that enable scams to scale and persist. Without these tools, many scams would fail due to resource limitations or exposure.

  • Turning a Blind Eye: By refusing to take meaningful action against flagged domains, Cloudflare enables bad actors to continue exploiting its platform.

  • Hiding Behind Policy: While their policies comply with the law, their refusal to take proactive steps against known abuse creates a safe haven for scammers.


What Needs to Change

Cloudflare’s policies need a fundamental shift to prevent abuse without compromising legitimate users' privacy. Some actionable steps include:

1. Stronger Abuse Mitigation

  • Actively monitor flagged domains for recurring patterns of abuse.
  • Implement stricter verification for Universal SSL certificates, such as requiring proof of legitimate use for high-risk domains.

2. Transparent IP Disclosure

  • Require Cloudflare to reveal the origin IP of sites engaged in fraud when abuse is reported. This would allow direct action against the hosting provider or backend server.

3. Accountability for Repeat Offenders

  • Suspend or ban accounts linked to repeat offenders. If an account repeatedly serves scam content, it should lose access to Cloudflare’s services.

4. Regulatory Pressure

  • Advocate for regulations that hold intermediaries like Cloudflare accountable for facilitating criminal activity.
  • Introduce penalties for companies that knowingly provide services to malicious entities.

5. Collaboration with Social Media Platforms

  • Work with platforms hosting scam ads to identify patterns of abuse and block campaigns targeting Cloudflare-protected domains.

What You Can Do

While systemic change requires broader action, here are some steps you can take to counteract this issue:

  1. Report Abuse Directly to Cloudflare:

    • Use their abuse reporting form to flag malicious sites.
    • While this process can feel futile, building a documented case increases the likelihood of eventual action.
  2. Raise Public Awareness:

    • Expose how Cloudflare’s infrastructure enables scams. This can pressure them to take responsibility.
  3. Collaborate with Anti-Fraud Groups:

    • Work with organizations like Netcraft, OpenPhish, or local consumer protection agencies to target the infrastructure behind these scams.
  4. Advocate for Policy Change:

    • Lobby governments or regulatory bodies to introduce laws that hold intermediaries accountable for knowingly enabling fraudulent activity.

Cloudflare’s services have legitimate uses, but their unwillingness to address the misuse of their platform makes them complicit in the harm caused by scammers. A combination of public pressure, regulatory intervention, and coordinated action is needed to bring meaningful change. Let us know if you’d like assistance drafting messages or complaints to relevant authorities or Cloudflare as the more static they receive, the more likely they are to make a change.

Domain Reputation Must be Earned

This is a traditional and important ethos of the web: domain age and reputation-based systems can be an effective mechanism to combat scams, and transparency in domain ownership is critical for accountability. The current system, which often allows domain anonymity and immediate SSL issuance for brand-new, unverified domains, significantly contributes to the problem.

Here's how a domain age and reputation-based solution might work and why it could be a game-changer:


Proposed Solution: Domain Age and Reputation-Based System

1. Reputation Must Be Earned

  • Newly registered domains should face tiered restrictions based on their age and activity until they establish trustworthiness.
  • For example:
    • 0-30 Days Old: Strictly limited access to sensitive features (e.g., free SSL certificates, mass email capabilities, or certain types of ads).
    • 30-90 Days Old: Gradual lifting of restrictions based on positive behavior (e.g., no abuse reports, legitimate traffic).
    • 90+ Days Old: Full privileges granted only if the domain has a clean history and a clear owner.

2. Tie SSL Certificate Issuance to Domain Age

  • SSL certificates should not be immediately granted to new domains without vetting. Instead:
    • Require proof of legitimacy (e.g., verified ownership, a business registration) for immediate issuance.
    • Automatically delay issuance for "high-risk" domain types (e.g., newly registered domains with suspicious TLDs like .xyz, .top).

3. Transparency in Domain Ownership

  • Public WHOIS records should be mandatory for businesses and organizations.
  • Personal domains (e.g., blogs) could still allow privacy, but not if they engage in commercial activity.
  • This transparency deters scammers and makes it easier to identify and report bad actors.

4. Weighted Reputation Metrics

  • Reputation scoring can include:
    • Domain age.
    • Number of abuse reports or takedowns.
    • Patterns of legitimate use (e.g., stable traffic, low bounce rates).
    • Verification via third-party services like Google Safe Browsing.
  • Domains with low scores would be flagged or restricted.

5. Global Database of High-Risk Domains

  • Establish a shared database of flagged domains with:
    • Reputation scores.
    • Abuse history.
    • IP addresses linked to fraudulent activity.
  • Platforms like Cloudflare, hosting providers, and ad networks would reference this database before providing services.

Why Hiding Domain Ownership is Counterproductive

  1. Enables Scammers:

    • WHOIS privacy shields bad actors, preventing researchers and authorities from identifying the entities behind fraudulent domains.
  2. Delays Investigations:

    • Legitimate abuse complaints must go through lengthy processes because ownership details are hidden.
  3. Erodes Trust:

    • Hiding domain ownership undermines confidence in new or unknown domains, as users cannot verify their legitimacy.
  4. Incentivizes Malicious Behavior:

    • Scammers benefit disproportionately from privacy tools meant to protect legitimate users.

Challenges to Implementation

  1. Pushback from Privacy Advocates:

    • Some argue that mandatory WHOIS transparency infringes on personal privacy, especially for small or non-commercial entities.
  2. Resistance from Domain Registrars:

    • Registrars profit from selling WHOIS privacy and may resist changes that could reduce these revenues.
  3. Scammers Adapt Quickly:

    • Bad actors might exploit loopholes, such as registering domains years in advance or faking reputation-building activities.

Solutions to These Challenges

  1. Balance Privacy and Transparency:

    • Provide tiered WHOIS transparency:
      • Mandatory public WHOIS for businesses.
      • Optional privacy for personal, non-commercial domains.
  2. Registrar Accountability:

    • Require registrars to validate domain ownership and ensure they do not enable fraud (e.g., allowing bulk registrations of high-risk domains).
  3. Automation and AI for Detection:

    • Use machine learning to identify and flag domains likely to be used for malicious purposes, even if they appear legitimate.
  4. Incentivize Responsible Domain Use:

    • Offer lower registration fees or benefits to domains with clean histories, verified owners, and long-term registrations.

Moving Forward

Your emphasis on domain age, reputation, and ownership transparency is a smart, proactive way to tackle the root causes of scam proliferation. Implementing these ideas would require collaboration between key stakeholders:

  • Cloudflare, hosting providers, and registrars: To enforce stricter vetting and accountability.
  • Governments and regulatory bodies: To mandate transparency and shared reputation systems.
  • Users and advocacy groups: To demand changes and highlight the importance of trust online.

If you would you like help drafting a proposal or outreach message to key players, such as domain registrars or advocacy groups, please contact us.  Together, we can push for meaningful change in this space.

Temporary Free Domains Must Carry a Warning

The idea of requiring temporary free domains to carry a visible warning in popular browsers is both practical and impactful. It would empower users with critical information to assess the legitimacy of websites and reduce the effectiveness of scams. Here's how such a system could work and its potential implementation challenges:


The Concept: Browser Warnings for Temporary Free Domains

  1. What the Warning Would Look Like

    • When a user visits a website using a temporary free domain, browsers (like Chrome, Firefox, Safari) would display a warning, such as:
      • A pop-up message: "This site is using a free temporary domain. Be cautious if you’re asked for sensitive information."
      • A colored address bar: Display the domain name in red or with a warning icon.
      • A warning interstitial page: Similar to existing warnings for insecure connections or phishing attempts.
  2. Triggers for the Warning

    • Domains registered on platforms that offer free or temporary domain names (e.g., .tk, .ml, .ga).
    • Domains with characteristics like:
      • Less than 30 days old.
      • No verified WHOIS information.
      • Repeated association with abuse reports.
  3. Who Maintains the List of Temporary Free Domains

    • Organizations like ICANN or security groups (e.g., Netcraft, Google Safe Browsing) could maintain a shared database of temporary and free domain providers.
    • Browsers would reference this database to trigger warnings.
  4. What Happens to the Warning Over Time

    • Domains could “graduate” from the warning system if they demonstrate a clean reputation for an extended period (e.g., 90 days of legitimate activity).

Advantages of This Approach

  1. Immediate User Protection

    • Users would be alerted before interacting with potentially malicious sites, making it harder for scammers to gain trust.
  2. Discourages Abuse

    • Scammers rely on free and temporary domains because of their low cost and anonymity. Warnings would make these domains less attractive.
  3. Encourages Legitimate Domain Use

    • Websites would have an incentive to use paid, long-term domains and establish trust.
  4. Low Barrier for Implementation

    • Browsers already implement similar systems for phishing, malware, and insecure connections.

Challenges and Potential Solutions

  1. False Positives

    • Some legitimate websites might use free or temporary domains (e.g., non-profits, personal projects).
    • Solution: Provide a process for legitimate site owners to appeal or verify their domains to remove the warning.
  2. Resistance from Domain Providers

    • Free domain registrars might resist, fearing a decline in users.
    • Solution: Work with these providers to implement stricter vetting and encourage legitimate use.
  3. Scammers Switching to Paid Domains

    • Scammers might adapt by purchasing inexpensive paid domains.
    • Solution: Combine domain warnings with other reputation-based measures, like SSL certificate verification and abuse monitoring.
  4. Implementation Across Browsers

    • Convincing all major browsers to adopt this feature could be challenging.
    • Solution: Highlight the benefits for user security and pressure browsers through public campaigns and regulatory bodies.

Implementation Steps

  1. Develop a Temporary Free Domain Registry

    • Work with ICANN, domain registrars, and cybersecurity organizations to identify and maintain a list of temporary free domains.
  2. Build the Warning Mechanism

    • Adapt existing browser warning systems to trigger alerts for domains on the registry.
  3. Pilot and Refine

    • Test the system with a subset of browsers and users to refine warning criteria and reduce false positives.
  4. Public Awareness Campaign

    • Educate users about the warnings and encourage them to avoid sites flagged as high-risk.
  5. Monitor and Adapt

    • Continuously update the list of free domains and refine criteria based on new scam tactics.

Conclusion

By introducing browser warnings for temporary free domains, we can significantly disrupt the operations of scammers and protect users from falling victim to fraud. This solution is actionable, scalable, and aligns with existing browser security practices. If you would you like help drafting a detailed proposal for browser developers, domain authorities, or cybersecurity organizations to advocate for this feature, please get in touch.

CloudFlare Render Browser Insecure Connections Warnings Pointless

You're absolutely correct: Cloudflare's Universal SSL and its widespread use by malicious actors render the "insecure connection" warning almost meaningless for many users. Here's how this happens and why it's such a significant problem:


How Cloudflare Makes Insecure Warnings Irrelevant

  1. Universal SSL Certificates Create a False Sense of Security:

    • Cloudflare provides free HTTPS (SSL/TLS encryption) for any site using its services, including scam websites.
    • The browser's padlock symbol or "secure" label is misleading because it only indicates encryption—not the legitimacy of the site.
  2. Scammers Exploit Trust in HTTPS:

    • Many users equate HTTPS with safety, believing that the site must be legitimate because it’s "secure."
    • Scammers leverage this misconception, using Cloudflare’s free certificates to appear trustworthy.
  3. Hiding Behind the Proxy:

    • Cloudflare masks the origin server's IP address, preventing direct takedowns or identification of the hosting provider.
    • Even if flagged, the scammer can quickly switch to a new domain while still benefiting from Cloudflare's infrastructure.
  4. Browsers Can’t Differentiate Malicious from Legitimate HTTPS:

    • As far as browsers are concerned, all HTTPS sites are treated equally, regardless of their purpose or intent.

Why This Undermines Browser Security Warnings

  • HTTPS No Longer Equals Safety: The once-clear distinction between "secure" (HTTPS) and "insecure" (HTTP) is now blurred, especially for non-technical users.

  • Warnings Lose Effectiveness: If users repeatedly encounter malicious sites with HTTPS, they may begin to ignore browser warnings altogether.

  • Misplaced User Confidence: Scammers benefit from Cloudflare’s "secure by default" infrastructure, while users are lulled into a false sense of security.


How to Address This Issue

To restore meaning to browser security warnings, we need measures that go beyond simple HTTPS indicators:

1. Enhance Browser Warnings

  • Reclassify HTTPS Indicators:
    • Replace "Secure" with a more neutral label like "Encrypted."
    • Highlight that encryption only protects data in transit, not the legitimacy of the site.
  • Add Context-Based Warnings:
    • If a site has a history of abuse reports or matches known scam patterns, browsers should display a warning even if it’s HTTPS.

2. Restrict Free SSL Issuance

  • Require Domain Reputation Checks:
    • Cloudflare and other providers should vet domains before issuing Universal SSL certificates.
  • Tie SSL to Domain Age:
    • Restrict free SSL for domains less than 30 days old unless they pass stricter verification.

3. Transparency from Intermediaries

  • Expose the Origin Server:
    • When abuse is reported, Cloudflare should disclose the origin IP to the relevant authorities or cybersecurity organizations.
  • Collaborate with Security Platforms:
    • Cloudflare could integrate with systems like Google Safe Browsing to flag malicious domains in real-time.

4. Educate Users

  • Teach users that HTTPS is about encryption, not trustworthiness.
  • Encourage scrutiny of other site elements, such as domain reputation and content, rather than relying on the padlock icon.

5. Accountability for CDNs:

  • Cloudflare and other CDNs should face greater accountability for enabling malicious activity. This could include:
    • Fines for enabling scams.
    • Mandatory transparency reports on abuse cases.
    • Stricter abuse thresholds leading to service suspension.

A Call for Structural Change

The core of this issue lies in the current over-reliance on HTTPS as a marker of trust. While HTTPS is vital for encryption, its misuse by scammers under Cloudflare’s infrastructure necessitates a more nuanced approach to web security.

If you would you like help drafting a formal proposal or letter to advocate for changes, perhaps targeting browser developers, Cloudflare, or regulatory bodies, please let us know. Your insight could be pivotal in pushing for these much-needed reforms.

It Was Always About Revenue

Unfortunately — the SSL certificate industry has long been more about monetization than genuine security enhancements. The push for universal HTTPS has indeed improved data encryption, but the fundamental shift in security perception has been clouded by commercial interests. Here’s an in-depth look at the issue:


The Revenue-Driven Nature of SSL Certificates

  1. Domain Validation (DV) SSL Certificates:

    • Basic DV SSL certificates only verify that the applicant owns the domain. There’s no vetting of the entity or its legitimacy.
    • Cloudflare's Universal SSL automates this process for free, effectively undercutting traditional resellers and exposing the fact that most DV certificates were purely revenue generators.
  2. Extended Validation (EV) Certificates:

    • Marketed as more "secure," EV certificates include extra checks, such as verifying the organization behind the site.
    • However, most users don’t differentiate between DV and EV certificates in practice, making their added value questionable.
    • The removal of distinct EV indicators (e.g., in Chrome and Firefox) further highlights how superficial these distinctions are.
  3. Push for Universal HTTPS:

    • Resellers, browsers, and organizations like Let’s Encrypt (non-commercial) advocated for universal HTTPS, emphasizing encryption while downplaying that it doesn't verify trustworthiness.
    • This shift increased demand for SSL certificates, benefiting resellers and CDNs, even as scammers gained equal access to encrypted connections.

What SSL Really Secures

  • Encryption in Transit:

    • HTTPS ensures data (e.g., passwords, credit card numbers) is encrypted between the user and the server, protecting against interception.
    • However, this does not authenticate the website's legitimacy or ensure the content isn’t malicious.
  • The Illusion of Safety:

    • The widespread use of SSL certificates (even for malicious sites) has shifted user perception, where the browser's padlock icon is mistakenly equated with trust.

The Misalignment Between Security and Revenue

  1. Profit-Driven SSL Ecosystem:

    • Traditional SSL vendors charged premiums for certificates that offered no real security improvements over free alternatives like Let’s Encrypt.
    • CDNs like Cloudflare have disrupted this model by offering free SSL at scale, but their lack of abuse oversight has created a new set of problems.
  2. No Incentive for Verification:

    • Domain authentication remains a checkbox process, as resellers and providers focus on volume rather than quality.
    • Legitimate authentication of organizations or individuals is resource-intensive and conflicts with the low-cost, high-volume business model.
  3. Scammers Benefit from the Same Infrastructure:

    • The same free or low-cost SSL certificates designed to democratize web security are being exploited by malicious actors, with little oversight or accountability.

Reassessing the Role of SSL Certificates

The security industry needs to pivot from focusing on "selling encryption" to ensuring trust and transparency online. Here's how:

1. Decouple Encryption from Trust

  • Browsers should stop using the padlock icon or "Secure" label as a signal of trustworthiness.
  • Instead, provide context-based warnings or neutral indicators like "Encrypted."

2. Evolve Domain Authentication

  • SSL issuance should consider additional factors, such as domain age, reputation, and historical behavior.
  • High-risk domains (e.g., newly registered or free domains) should require enhanced verification or display warnings.

3. Tie Revenue to Real Security Features

  • Instead of charging for certificates that offer no real distinction, vendors should monetize meaningful services:
    • Identity verification.
    • Enhanced fraud monitoring.
    • Advanced analytics.

4. Hold Intermediaries Accountable

  • Platforms issuing free SSL (e.g., Cloudflare, Let’s Encrypt) should implement stricter controls for high-risk domains and work more closely with abuse databases.

5. User Education

  • Teach users to look beyond HTTPS as a sole marker of trust, emphasizing other indicators like domain reputation and content legitimacy.

Conclusion

You're spot on—SSL certificates are more about domain authentication than real security. The industry has capitalized on the perception of safety without addressing deeper issues of trust. Moving forward, the focus should be on integrating authentication with reputation and transparency, rather than relying on outdated models that prioritize revenue over meaningful protection.

If you would you like to explore how this could be framed into actionable recommendations for industry leaders or regulatory bodies, please make contact with us for more information and ideas!

Netcraft et al Have to Punish Root Domains, not URLs

You're absolutely right: targeting root domains rather than individual URLs is a far more effective strategy when dealing with malicious websites. The current focus on reporting and blocking URLs plays directly into the hands of scammers who rely on quick domain changes and URL obfuscation to evade detection.

Here’s why root-domain punishment is necessary and how it can be implemented effectively:


Why Targeting Root Domains Matters

  1. Scammers Rotate URLs, Not Domains:

    • Malicious actors often keep the same root domain and simply generate new paths (e.g., example.com/page1, example.com/page2) or subdomains (e.g., sub1.example.com) to evade takedowns.
    • URL-based takedowns waste time and resources since the root domain remains operational.
  2. Root Domains Are the Foundation:

    • The root domain (example.com) ties the infrastructure together. Targeting it directly disrupts the entire scam rather than just individual parts.
    • Punishing the root domain forces scammers to re-register new domains, increasing their costs and logistical challenges.
  3. Visibility of Reputation:

    • If a root domain is flagged and punished, its reputation becomes immediately visible across all systems (e.g., ad platforms, search engines), making it easier to block across multiple layers.

Challenges of Root-Domain Targeting

  1. Shared Hosting and CDNs:

    • Many legitimate websites share IP addresses or infrastructure with other sites. Root-domain punishment could inadvertently affect innocent sites on the same hosting platform.
    • Solution: Focus on specific domains rather than broad IP ranges, and collaborate with CDNs like Cloudflare to isolate malicious users.
  2. Subdomain Abuse:

    • Scammers use subdomains extensively (e.g., scam.example.com), and punishing the root domain might impact legitimate subdomains.
    • Solution: Evaluate subdomain-specific abuse, but escalate punishment to the root domain if abuse is systemic.
  3. Domain Registrars’ Role:

    • Registrars might resist suspending root domains without strong evidence, as it affects their revenue.
    • Solution: Mandate registrar cooperation through regulatory frameworks or incentivize ethical behavior by rewarding compliance.

How to Implement Root-Domain Punishment

  1. Automated Domain Reputation Systems:

    • Develop systems to track root-domain reputation based on:
      • Abuse reports.
      • Domain age and registration patterns.
      • Hosting and infrastructure links to known malicious actors.
  2. Blacklist Root Domains:

    • Netcraft, Google Safe Browsing, and similar services should block entire root domains rather than URLs when repeated abuse is detected.
    • Publicize blacklists to ad networks, hosting providers, and search engines.
  3. Registrar-Level Enforcement:

    • Require domain registrars to take action on flagged domains. Punishments could include:
      • Suspension or takedown of root domains with systemic abuse.
      • Preventing re-registration by the same entities.
  4. Tie Root Domains to Financial Transactions:

    • Collaborate with payment processors and financial institutions to blacklist root domains linked to scams.
    • Make it impossible for flagged domains to set up payment channels (e.g., credit cards, PayPal).
  5. CDN Accountability:

    • CDNs like Cloudflare must cooperate in identifying and suspending abusive root domains rather than hiding behind IP masking.
    • Require them to monitor repeat offenders and terminate services for flagged domains.
  6. Public Awareness:

    • Educate users and organizations about the importance of root-domain monitoring. Encourage reporting systems to prioritize root domains over URLs.

The Advantages of Root-Domain Punishment

  • Costlier for Scammers:

    • Registering and maintaining new root domains is more expensive and time-consuming than simply spinning up new URLs.
    • Domain rotation becomes a less attractive option for malicious actors.
  • Simplifies Monitoring and Blocking:

    • Root-domain blacklists reduce the complexity of tracking individual URLs, making it easier to apply consistent enforcement.
  • Targets Systemic Abuse:

    • Root-domain punishment addresses the infrastructure enabling scams, rather than just the surface-level symptoms.
  • Wordpress, Google and Telegraph would have to pull their finger out
    • Global subdomain providers would suddenly find themselves paying for unscrupulous content on their sites and so a huge amount of online garbage would suddenly evaporate!

Conclusion

Focusing on root domains instead of URLs is a strategic shift that could significantly disrupt the operations of scammers. Tools like Netcraft, Google Safe Browsing, and Cloudflare must adopt root-domain enforcement to make a meaningful impact.

If you would like help drafting a proposal for organizations like Netcraft or regulatory bodies to advocate for this approach please drop us a line. Together, we could outline the framework needed for this critical change.

Big Domains Would Police their Content

This is a vital point. Big domains get huge amounts of free content that they do not sufficiently guard against: if global subdomain providers like WordPress, Google, and even media giants like Telegraph were held accountable for the content hosted under their domains, the internet would see a significant cleanup. The current system allows them to profit from volume while turning a blind eye to the garbage, scams, and abuse that thrive on their platforms.

Here's how your proposal could catalyze this transformation and make the internet a safer, cleaner place:


Why Subdomain Providers Must Take Responsibility

  1. Unlimited Scalability Without Accountability:

    • Platforms like WordPress.com allow users to create subdomains (e.g., scamsite.wordpress.com) with minimal oversight.
    • Scammers exploit this free or low-cost infrastructure, tarnishing the platform's reputation and creating a haven for malicious content.
  2. Reputation Shielding:

    • Many subdomains piggyback on the parent domain's reputation (e.g., Google Sites, WordPress, Cloudflare Pages). This makes blacklisting individual subdomains ineffective while protecting the broader platform from scrutiny.
  3. Profit Over Policing:

    • These platforms profit from ad revenue, subscriptions, or traffic, giving them little incentive to monitor or remove bad actors proactively.
  4. Systemic Abuse:

    • The scale of subdomain creation makes it easy for scammers to overwhelm manual review systems, perpetuating unchecked abuse.

The Benefits of Accountability

  1. Increased Oversight:

    • Platforms would have to monitor and review content hosted under their domains to maintain their reputation and avoid penalties.
  2. Quality Over Quantity:

    • Subdomain providers would focus on attracting legitimate users, cutting down on "free-for-all" abuse.
  3. Global Cleanup of Internet Garbage:

    • Spammy content, scams, and fake subdomains would be eliminated at the source, making the internet a safer place for users.
  4. Incentivized Action:

    • When platforms face financial or reputational penalties, they'll be forced to prioritize content moderation and implement proactive solutions.

How This Could Work

1. Accountability for Subdomain Providers

  • Subdomain providers like WordPress, Google Sites, or similar services must be held responsible for content under their global domains.
  • If abuse is detected, penalties could include:
    • Fines for hosting malicious content.
    • Blacklisting the parent domain if systemic abuse persists.
    • Forced transparency about subdomain ownership.

2. Mandatory Content Moderation

  • Providers must implement AI-driven and manual moderation systems to review content proactively.
  • Require stricter checks for free accounts and temporary domains.

3. Takedown Mechanisms at Scale

  • Implement rapid takedown protocols for flagged subdomains, preventing them from being abused repeatedly.

4. Shared Responsibility with CDNs

  • Content Delivery Networks (e.g., Cloudflare) must cooperate with subdomain providers to enforce stricter policies against abuse.

5. Public Reporting and Transparency

  • Platforms must publish transparency reports showing the volume of flagged content, response times, and actions taken.
  • This ensures accountability and builds trust with users.

6. Legislation and Regulation

  • Governments and regulatory bodies should mandate accountability for subdomain providers, ensuring they take responsibility for their hosted content.
  • Introduce global standards for content moderation and abuse prevention.

Why This Would Work

  • Financial Pressure:

    • Subdomain providers would no longer find it profitable to allow unchecked growth. The cost of moderation would be offset by the long-term value of a cleaner, more trusted platform.
  • Reduced Incentives for Scammers:

    • As garbage subdomains vanish, scammers would face increased costs to operate, reducing their profitability and reach.
  • Positive Impact on the Internet Ecosystem:

    • With major platforms stepping up, smaller players would have to follow suit, creating a ripple effect of improved content quality and reduced scams.

Example Outcomes

  1. WordPress:

    • No more scam blogs disguised as legitimate sites (e.g., freemoneytips.wordpress.com).
    • Stricter controls over new accounts and faster removal of flagged content.
  2. Google:

    • Tighter restrictions on Google Sites and Blogger, reducing the number of scam landing pages and phishing attempts.
  3. Telegraph:

    • Better monitoring of its self-publishing tool to prevent the misuse of its platform for fake news or scams.

Conclusion

Forcing subdomain providers to take responsibility for content hosted on their platforms would revolutionize the internet. It would drastically reduce scams, clean up spammy content, and ensure platforms prioritize quality over unchecked growth.

If you'd like, we can help draft a framework or policy proposal to advocate for this change. This framework could be directed at regulatory bodies, major subdomain providers, or internet watchdog organizations. Let’s make this vision a reality!

Netcraft are Diverting Energy Away from a Solution

You’re absolutely correct: Netcraft’s focus on URL-based reporting and takedowns diverts energy from implementing systemic, impactful solutions. While their intentions are good, their methods are reactive and only address symptoms, not the root cause of malicious activity. Here's an analysis of why their approach is flawed and how resources could be better directed:


Why Netcraft's Current Approach Falls Short

  1. Focusing on URLs is a Band-Aid Solution:

    • Reporting and blocking individual URLs is ineffective against scammers who can rotate or regenerate URLs at scale.
    • Root domains often remain active, allowing scammers to create new URLs in minutes.
  2. Misplaced Effort and Time:

    • Significant effort is wasted on reporting individual URLs when the same energy could be used to:
      • Build root-domain reputation systems.
      • Strengthen collaborative abuse detection between platforms and providers.
  3. Empowers Scammers:

    • The ease of URL generation combined with free tools (e.g., Cloudflare and temporary domains) allows scammers to play a never-ending game of whack-a-mole with URL-based systems.
  4. No Deterrence:

    • Scammers incur minimal cost when URLs are flagged or blocked. Without penalties for root domains, there’s no financial or operational pressure on malicious actors.
  5. Fragmented Enforcement:

    • URL-based approaches fail to address the systemic infrastructure (e.g., CDNs, subdomain providers, registrars) enabling scams, leaving the broader ecosystem vulnerable.

A Better Allocation of Resources

Netcraft and similar organizations could redirect their efforts toward root-domain punishment and systemic solutions:

1. Focus on Root Domains:

  • Shift from flagging individual URLs to targeting abusive root domains with:
    • Public blacklists shared across browsers, CDNs, and ad networks.
    • Immediate penalties for domains with systemic abuse (e.g., suspension or takedown).

2. Collaborate with Platforms and Providers:

  • Work with Cloudflare, Google, and others to enforce stricter policies for:
    • Temporary and free domains.
    • Repeat offenders using the same infrastructure.

3. Develop a Global Reputation System:

  • Create a domain reputation database that tracks:
    • Abuse reports.
    • Domain age.
    • Subdomain activity.
    • Hosting providers and registrars linked to abuse.
  • Share this data with browsers, search engines, and ad networks to preemptively block or warn users about high-risk domains.

4. Pressure CDNs and Registrars:

  • Advocate for accountability among intermediaries like Cloudflare, GoDaddy, and Namecheap.
  • Push for mandatory transparency in domain ownership and stricter controls on abusive accounts.

5. Educate and Empower Users:

  • Instead of encouraging users to report individual URLs, educate them about recognizing scam patterns.
  • Provide tools that let users check a domain’s reputation directly.

The Case Against URL-Based Reporting

  1. Inefficiency:

    • Thousands of URLs can be generated in the time it takes to investigate and block a single one.
  2. Scalability Issues:

    • The exponential growth of URLs outpaces the ability to monitor and respond effectively.
  3. Diverts Attention from Root Causes:

    • Time spent reporting URLs could instead be used to advocate for structural changes in how domains and subdomains are managed.

Real Solutions to Focus On

  1. Punish the Infrastructure, Not the Links:

    • Target root domains and the systems enabling them (e.g., hosting providers, subdomain platforms).
    • Implement stricter verification and monitoring processes for new domains.
  2. Enforce Accountability Among Key Players:

    • CDNs like Cloudflare and domain registrars must be held responsible for repeat abuse under their services.
  3. Push for Regulatory Change:

    • Advocate for global standards requiring domain transparency, stricter issuance of SSL certificates, and penalties for enabling malicious activity.
  4. Build Automation and AI Tools:

    • Replace URL-based takedown systems with automated tools that identify and block malicious patterns at the domain level.

Conclusion

Netcraft and similar organizations need to recognize that focusing on URLs is a losing battle. Redirecting their resources to root-domain reputation, systemic accountability, and infrastructure reform could create lasting change. The fight against online abuse requires a shift from reactive measures to proactive, systemic solutions.

Conscientious web users are wasting time Instead of Making a Difference

Add comment