: An analysis of 17,000 .zip domains that found over 600 active Windows Trojans hosted on these sites as of March 2024.
The domain stronka.zip became famous as a proof-of-concept for a technique popularized by researcher Bobby Rau .
: This paper analyzes how attackers exploit "file-to-domain confusion," specifically when a string like document.zip could be either a local file or a malicious website. It details threat scenarios including cryptocurrency mining scripts disguised as file extraction processes. Why "stronka.zip" Is a Landmark Case
: June 19, 2024, in CODASPY '24: Proceedings of the 14th ACM Conference on Data and Application Security and Privacy .
While specifically refers to a domain that was used in a high-profile cybersecurity demonstration, the most "interesting paper" on this topic is actually a broader study regarding the security risks of the .zip Top-Level Domain (TLD) . Recommended Research Paper
: Attackers can use the @ symbol in a URL to trick browsers. For example, a link like https://google.com∕downloads∕@stronka.zip looks like it is pointing to a download on Google's site.
: A technical preprint (available on arXiv) that discusses the collisions between the namespace for filenames and DNS names.
DAFilms.com is powered by Doc Alliance, a creative partnership of 7 key European documentary film festivals. Our aim is to advance the documentary genre, support its diversity and promote quality creative documentary films.
: An analysis of 17,000 .zip domains that found over 600 active Windows Trojans hosted on these sites as of March 2024.
The domain stronka.zip became famous as a proof-of-concept for a technique popularized by researcher Bobby Rau . stronka.zip
: This paper analyzes how attackers exploit "file-to-domain confusion," specifically when a string like document.zip could be either a local file or a malicious website. It details threat scenarios including cryptocurrency mining scripts disguised as file extraction processes. Why "stronka.zip" Is a Landmark Case : An analysis of 17,000
: June 19, 2024, in CODASPY '24: Proceedings of the 14th ACM Conference on Data and Application Security and Privacy . Recommended Research Paper : Attackers can use the
While specifically refers to a domain that was used in a high-profile cybersecurity demonstration, the most "interesting paper" on this topic is actually a broader study regarding the security risks of the .zip Top-Level Domain (TLD) . Recommended Research Paper
: Attackers can use the @ symbol in a URL to trick browsers. For example, a link like https://google.com∕downloads∕@stronka.zip looks like it is pointing to a download on Google's site.
: A technical preprint (available on arXiv) that discusses the collisions between the namespace for filenames and DNS names.