{"id":98025,"date":"2023-05-18T00:08:05","date_gmt":"2023-05-18T07:08:05","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=98025"},"modified":"2023-05-22T14:26:45","modified_gmt":"2023-05-22T21:26:45","slug":"expect-zip-and-mov-domains-to-be-used-in-phishing-and-malware-attacks","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/expect-zip-and-mov-domains-to-be-used-in-phishing-and-malware-attacks\/","title":{"rendered":"Expect .zip and .mov domains to be used in phishing and malware attacks"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-98049\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/05\/zip-and-mov-domains-cause-confusion-600x300-v2.png\" alt=\"\" width=\"600\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/05\/zip-and-mov-domains-cause-confusion-600x300-v2.png 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/05\/zip-and-mov-domains-cause-confusion-600x300-v2-300x150.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/05\/zip-and-mov-domains-cause-confusion-600x300-v2-150x75.png 150w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>Back in 2014, Google became the owner of several new &#8220;top-level domains.&#8221; Called a TLD for short, a top-level domain is the &#8220;dot-something&#8221; at the end of a domain name, for example .com or .net.<\/p>\n<p>Two of the new TLDs that Google registered were <strong>.zip<\/strong> and <strong>.mov<\/strong>. You probably recognize that .zip is also a file name extension; when you download software from the Internet, it often comes bundled in a .zip archive. You may also recognize .mov as a common file name extension for video files, typically in an Apple QuickTime compatible format.<\/p>\n<p>It&#8217;s hard to imagine exactly what Google was thinking. Giving the company the benefit of the doubt, perhaps they had altruistic motivations; maybe in 2014 they registered these TLDs to prevent bad guys from buying them up and abusing them. But then, just <strong>this week, Google opened the floodgates<\/strong> and began allowing the general public to register their own domains using these TLDs.<\/p>\n<p>Could this really be so bad? Is there any reason such domains might be potentially dangerous? Let&#8217;s explore why .zip and .mov domains may put you at risk of phishing or malware attacks.<\/p>\n<p><em>In this article:<\/em><\/p>\n<ul>\n<li><a href=\"#apps\">Apps and sites may turn .zip or .mov filenames into automatic links<\/a><\/li>\n<li><a href=\"#url\">Is that long URL a link to a .zip file, or to a .zip domain?<\/a><\/li>\n<li><a href=\"#real\">Is this a real threat, or is it it much ado about nothing?<\/a><\/li>\n<li><a href=\"#learnmore\">How can I learn more?<\/a><a name=\"apps\"><\/a><\/li>\n<\/ul>\n<h3>Apps and sites may turn .zip or .mov filenames into automatic links<\/h3>\n<p>One major problem with these new TLDs is that, depending on which app or site you use to check your e-mail, or which forums, social networks, or messaging apps you use, simply typing a file name may change your plaintext words into a link that the recipient can click or tap on\u2014even if you didn&#8217;t intend for that to happen.<\/p>\n<p>Take Twitter, for example. If you were to send someone a direct message and let them know you just sent them a file called <code>invoices.zip<\/code>, Twitter automatically turns it into a link to <code>http:\/\/invoices.zip<\/code> \u2014 without asking for confirmation or giving you the opportunity to remove the link. This is true regardless of whether the sender or recipient uses the Twitter app or a browser. Similarly, if you DM someone who&#8217;s at your home and tell them to open a movie file in your home theater library, say <code>encanto.mov<\/code>, Twitter will turn that into a link to <code>http:\/\/encanto.mov<\/code> as well.<\/p>\n<div id=\"attachment_98026\" style=\"width: 770px\" class=\"wp-caption aligncenter\"><img aria-describedby=\"caption-attachment-98026\" loading=\"lazy\" class=\"size-full wp-image-98026\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/05\/twitter-dm-examples-zip-mov-domains.png\" alt=\"Twitter DM examples where .zip and .mov file names turned into links\" width=\"760\" height=\"554\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/05\/twitter-dm-examples-zip-mov-domains.png 760w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/05\/twitter-dm-examples-zip-mov-domains-300x219.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/05\/twitter-dm-examples-zip-mov-domains-150x109.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/05\/twitter-dm-examples-zip-mov-domains-657x479.png 657w\" sizes=\"(max-width: 760px) 100vw, 760px\" \/><p id=\"caption-attachment-98026\" class=\"wp-caption-text\">Example Twitter DMs with .zip and .mov filenames automatically displaying as clickable links. What could possibly go wrong?<\/p><\/div>\n<p>Of course, you have no idea who owns such domains, or what would happen if you tapped or clicked on such links. And presumably, your recipient&#8217;s natural inclination will be to tap on those links to attempt to view the desired content.<a name=\"url\"><\/a><\/p>\n<h3>Is that long URL a link to a .zip file, or to a .zip domain?<\/h3>\n<p>Security researcher <a href=\"https:\/\/twitter.com\/erratarob\/status\/1658983638455779328\" target=\"_blank\" rel=\"noopener\">Robert Graham observed<\/a> that, due to an erroneous interpretation of a Web standard, browsers often allow http:\/\/ and https:\/\/ links to include a <code>username:password@domain.tld<\/code> format. As Graham points out, those who wrote the standard never intended for Web links to include usernames and passwords. And yet, most browsers have always supported this type of link.<\/p>\n<p>So how does this relate to .zip and .mov domains? Researcher <a href=\"https:\/\/medium.com\/@bobbyrsec\/the-dangers-of-googles-zip-tld-5e1e675e59a5\" target=\"_blank\" rel=\"noopener\">Bobby Rauch noted<\/a> that, by using lookalike characters, attackers can trick victims into visiting URLs ending in .zip that appear to be hosted on known-legitimate sites, like GitHub. In reality, the domain might actually be the &#8220;.zip&#8221; that appears to be part of the file name. A site hosted at that .zip domain could potentially be designed to automatically download a .zip file upon visiting the link, so the user would be none the wiser.<\/p>\n<p>Thus, it would be possible to trick a user into thinking they got a legitimate download from GitHub, when they may have actually downloaded Trojan horse malware instead.<\/p>\n<div id=\"attachment_98030\" style=\"width: 760px\" class=\"wp-caption aligncenter\"><img aria-describedby=\"caption-attachment-98030\" loading=\"lazy\" class=\"size-full wp-image-98030\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/05\/fake-download-url-leading-to-zip-domain-by-hnasr.png\" alt=\"Example fake download URL that would lead to a .zip domain\" width=\"750\" height=\"422\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/05\/fake-download-url-leading-to-zip-domain-by-hnasr.png 750w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/05\/fake-download-url-leading-to-zip-domain-by-hnasr-300x169.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/05\/fake-download-url-leading-to-zip-domain-by-hnasr-150x84.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/05\/fake-download-url-leading-to-zip-domain-by-hnasr-657x370.png 657w\" sizes=\"(max-width: 750px) 100vw, 750px\" \/><p id=\"caption-attachment-98030\" class=\"wp-caption-text\">An example fake download URL that would lead to a .zip domain. Credit: <a href=\"https:\/\/twitter.com\/hnasr\/status\/1658853944037351424\" target=\"_blank\" rel=\"noopener\">Hussein Nasser<\/a>.<\/p><\/div>\n<p>This isn&#8217;t the first time that the <code>username:password@domain.tld<\/code> format in URLs has led to a potential security risk. Back in iOS 11, when scanning a QR code, <a href=\"https:\/\/twitter.com\/theJoshMeister\/status\/985303880819916801\" target=\"_blank\" rel=\"noopener\">the Camera app would misinterpret domains<\/a> in such a way that the app would show a false domain in the scan preview.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Having way too much fun with <a href=\"https:\/\/twitter.com\/faker_?ref_src=twsrc%5Etfw\">@faker_<\/a>&#39;s iOS 11 QR code vulnerability. \ud83d\ude1c<a href=\"https:\/\/twitter.com\/hashtag\/Apple?src=hash&amp;ref_src=twsrc%5Etfw\">#Apple<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/iOS?src=hash&amp;ref_src=twsrc%5Etfw\">#iOS<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/iOS11?src=hash&amp;ref_src=twsrc%5Etfw\">#iOS11<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/QRcode?src=hash&amp;ref_src=twsrc%5Etfw\">#QRcode<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/vulnerability?src=hash&amp;ref_src=twsrc%5Etfw\">#vulnerability<\/a> <a href=\"https:\/\/t.co\/sGDJq7bS0q\">pic.twitter.com\/sGDJq7bS0q<\/a><\/p>\n<p>&mdash; Josh Long (the\u00a0JoshMeister) (@theJoshMeister) <a href=\"https:\/\/twitter.com\/theJoshMeister\/status\/985303880819916801?ref_src=twsrc%5Etfw\">April 14, 2018<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><br \/>\n<a name=\"real\"><\/a><\/p>\n<h3>Is this a real threat, or is it it much ado about nothing?<\/h3>\n<p>While many .zip domain registrations within the past week have been done for humorous purposes, another security researcher noticed that the domain <code>microsoft-office.zip<\/code> <a href=\"https:\/\/twitter.com\/1zrr4h\/status\/1657807143393689601\" target=\"_blank\" rel=\"noopener\">appeared to be an actual phishing site<\/a>.<\/p>\n<div id=\"attachment_98029\" style=\"width: 1325px\" class=\"wp-caption aligncenter\"><img aria-describedby=\"caption-attachment-98029\" loading=\"lazy\" class=\"size-full wp-image-98029\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/05\/dot-zip-possible-phishing-site.jpg\" alt=\"A possible Microsoft phishing site hosted at a .zip domain\" width=\"1315\" height=\"891\" \/><p id=\"caption-attachment-98029\" class=\"wp-caption-text\">A possible Microsoft phishing site hosted at a .zip domain. Credit: <a href=\"https:\/\/twitter.com\/1zrr4h\/status\/1657807143393689601\">Germ\u00e1n Fern\u00e1ndez<\/a>.<\/p><\/div>\n<p>Many <a href=\"https:\/\/twitter.com\/1zrr4h\/status\/1657747300339384320\">other domains<\/a>\u2014most of which were probably registered as jokes\u2014give some idea of the potential for misuse:<\/p>\n<pre>chrome-installer.zip\r\ncsgo.zip [implying a Counter-Strike game]\r\ngta6.zip [implying a Grand Theft Auto game]\r\nhoneymoonpictures.zip\r\nhunterbidenlaptop.zip\r\nkeygen.zip\r\nmicrosoftwindows.zip\r\nphotoshop-cracked.zip\r\npicsofyourwife.zip\r\nsetupwizard.zip\r\nstatementsofwork.zip\r\ntaylorswiftnudes.zip\r\nterminationletter.zip\r\ntrumpclassifieddocuments.zip\r\nwindowsinstaller.zip<\/pre>\n<p>Again, most of the specific domains above, and many other domains similar to these, were probably registered as jokes. Nevertheless, there&#8217;s a strong possibility that we&#8217;ll see real-world examples of phishing sites and malware hosted at .zip or .mov domains in the coming weeks and months. Watch out for errant links, and stay vigilant. Consider sharing this article with friends and colleagues to raise their awareness of the danger.<a name=\"learnmore\"><\/a><\/p>\n<h3>How can I learn more?<\/h3>\n<p>For more details on this story, see also <a href=\"https:\/\/arstechnica.com\/information-technology\/2023\/05\/critics-say-googles-new-zip-and-mov-domains-will-be-a-boon-to-scammers\/\" target=\"_blank\" rel=\"noopener\">Dan Goodin&#8217;s write-up at Ars Technica<\/a>.<\/p>\n<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/04\/intego-podcast-artwork-400.jpg\" target=\"_blank\" rel=\"noopener noreferrer\"><img class=\"alignleft\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/04\/intego-podcast-artwork-400.jpg\" alt=\"\" width=\"80\" \/><\/a>Each week on the <a href=\"https:\/\/podcast.intego.com\/\" target=\"_blank\" rel=\"noopener\"><strong>Intego Mac Podcast<\/strong><\/a>, Intego&#8217;s Mac security experts discuss the latest Apple news, including security and privacy stories, and offer practical advice on getting the most out of your Apple devices. Be sure to <a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" rel=\"noopener\"><strong>follow the podcast<\/strong><\/a> to make sure you don\u2019t miss any episodes.<\/p>\n<p>You can also subscribe to our <a href=\"https:\/\/www.intego.com\/mac-security-blog\/mac-security-newsletter\/\"><strong>e-mail newsletter<\/strong><\/a> and keep an eye here on <a href=\"https:\/\/www.intego.com\/mac-security-blog\"><strong>The Mac Security Blog<\/strong><\/a> for the latest Apple security and privacy news. And don&#8217;t forget to follow Intego on your favorite social media channels: <a href=\"https:\/\/twitter.com\/IntegoSecurity\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Twitter\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/Twitter-logo-icon-64.png\" alt=\"Follow Intego on Twitter\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.facebook.com\/Intego\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Facebook\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/Facebook-logo-icon-64.png\" alt=\"Follow Intego on Facebook\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.youtube.com\/user\/IntegoVideo?sub_confirmation=1\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(0, 0, 0, 0.2); border-radius: 8px;\" title=\"Follow Intego on YouTube\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/YouTube-logo-icon-64.png\" alt=\"Follow Intego on YouTube\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.pinterest.com\/intego\/\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(0, 0, 0, 0.2); border-radius: 8px;\" title=\"Follow Intego on Pinterest\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/Pinterest-logo-icon-64.png\" alt=\"Follow Intego on Pinterest\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.linkedin.com\/company\/intego\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on LinkedIn\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/LinkedIn-logo-icon-64.png\" alt=\"Follow Intego on LinkedIn\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.instagram.com\/intego_security\/\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Instagram\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/Instagram-logo-icon-64.png\" alt=\"Follow Intego on Instagram\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow the Intego Mac Podcast on Apple Podcasts\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile.png\" alt=\"Follow the Intego Mac Podcast on Apple Podcasts\" width=\"16\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Google has just started selling .zip and .mov domains, even though these are commonly used as filename extensions. This is already creating new challenges for online safety, including increased risks related to malware and phishing attacks.<\/p>\n","protected":false},"author":14,"featured_media":98038,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[13],"tags":[60],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Google has just started selling .zip and .mov domains, even though these are commonly used as filename extensions. This is already creating new challenges for online safety, including increased risks related to malware and phishing attacks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/expect-zip-and-mov-domains-to-be-used-in-phishing-and-malware-attacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Expect .zip and .mov domains to be used in phishing and malware attacks - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Google has just started selling .zip and .mov domains, even though these are commonly used as filename extensions. This is already creating new challenges for online safety, including increased risks related to malware and phishing attacks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/expect-zip-and-mov-domains-to-be-used-in-phishing-and-malware-attacks\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/JoshLong\" \/>\n<meta property=\"article:published_time\" content=\"2023-05-18T07:08:05+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-05-22T21:26:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/05\/zip-and-mov-domains-cause-confusion-400x260-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@theJoshMeister\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Joshua Long\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/expect-zip-and-mov-domains-to-be-used-in-phishing-and-malware-attacks\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/05\/zip-and-mov-domains-cause-confusion-400x260-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/05\/zip-and-mov-domains-cause-confusion-400x260-1.png\",\"width\":400,\"height\":260,\"caption\":\".zip and .mov domains cause confusion and may lead to phishing or malware\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/expect-zip-and-mov-domains-to-be-used-in-phishing-and-malware-attacks\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/expect-zip-and-mov-domains-to-be-used-in-phishing-and-malware-attacks\/\",\"name\":\"Expect .zip and .mov domains to be used in phishing and malware attacks - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/expect-zip-and-mov-domains-to-be-used-in-phishing-and-malware-attacks\/#primaryimage\"},\"datePublished\":\"2023-05-18T07:08:05+00:00\",\"dateModified\":\"2023-05-22T21:26:45+00:00\",\"description\":\"Google has just started selling .zip and .mov domains, even though these are commonly used as filename extensions. This is already creating new challenges for online safety, including increased risks related to malware and phishing attacks.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/expect-zip-and-mov-domains-to-be-used-in-phishing-and-malware-attacks\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/expect-zip-and-mov-domains-to-be-used-in-phishing-and-malware-attacks\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/expect-zip-and-mov-domains-to-be-used-in-phishing-and-malware-attacks\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Expect .zip and .mov domains to be used in phishing and malware attacks\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/expect-zip-and-mov-domains-to-be-used-in-phishing-and-malware-attacks\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/expect-zip-and-mov-domains-to-be-used-in-phishing-and-malware-attacks\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\"},\"headline\":\"Expect .zip and .mov domains to be used in phishing and malware attacks\",\"datePublished\":\"2023-05-18T07:08:05+00:00\",\"dateModified\":\"2023-05-22T21:26:45+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/expect-zip-and-mov-domains-to-be-used-in-phishing-and-malware-attacks\/#webpage\"},\"wordCount\":1001,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/expect-zip-and-mov-domains-to-be-used-in-phishing-and-malware-attacks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/05\/zip-and-mov-domains-cause-confusion-400x260-1.png\",\"keywords\":[\"Google\"],\"articleSection\":[\"Security &amp; Privacy\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/expect-zip-and-mov-domains-to-be-used-in-phishing-and-malware-attacks\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\",\"name\":\"Joshua Long\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"caption\":\"Joshua Long\"},\"description\":\"Joshua Long (@theJoshMeister), formerly Intego\\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \\u2014\",\"sameAs\":[\"https:\/\/security.thejoshmeister.com\",\"https:\/\/www.facebook.com\/JoshLong\",\"https:\/\/www.instagram.com\/thejoshmeister\/\",\"https:\/\/www.linkedin.com\/in\/thejoshmeister\",\"https:\/\/www.pinterest.com\/thejoshmeister\/\",\"https:\/\/twitter.com\/theJoshMeister\",\"https:\/\/www.youtube.com\/@theJoshMeister\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Google has just started selling .zip and .mov domains, even though these are commonly used as filename extensions. This is already creating new challenges for online safety, including increased risks related to malware and phishing attacks.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/expect-zip-and-mov-domains-to-be-used-in-phishing-and-malware-attacks\/","og_locale":"en_US","og_type":"article","og_title":"Expect .zip and .mov domains to be used in phishing and malware attacks - The Mac Security Blog","og_description":"Google has just started selling .zip and .mov domains, even though these are commonly used as filename extensions. This is already creating new challenges for online safety, including increased risks related to malware and phishing attacks.","og_url":"https:\/\/www.intego.com\/mac-security-blog\/expect-zip-and-mov-domains-to-be-used-in-phishing-and-malware-attacks\/","og_site_name":"The Mac Security Blog","article_author":"https:\/\/www.facebook.com\/JoshLong","article_published_time":"2023-05-18T07:08:05+00:00","article_modified_time":"2023-05-22T21:26:45+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/05\/zip-and-mov-domains-cause-confusion-400x260-1.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_creator":"@theJoshMeister","twitter_misc":{"Written by":"Joshua Long","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/expect-zip-and-mov-domains-to-be-used-in-phishing-and-malware-attacks\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/05\/zip-and-mov-domains-cause-confusion-400x260-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/05\/zip-and-mov-domains-cause-confusion-400x260-1.png","width":400,"height":260,"caption":".zip and .mov domains cause confusion and may lead to phishing or malware"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/expect-zip-and-mov-domains-to-be-used-in-phishing-and-malware-attacks\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/expect-zip-and-mov-domains-to-be-used-in-phishing-and-malware-attacks\/","name":"Expect .zip and .mov domains to be used in phishing and malware attacks - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/expect-zip-and-mov-domains-to-be-used-in-phishing-and-malware-attacks\/#primaryimage"},"datePublished":"2023-05-18T07:08:05+00:00","dateModified":"2023-05-22T21:26:45+00:00","description":"Google has just started selling .zip and .mov domains, even though these are commonly used as filename extensions. This is already creating new challenges for online safety, including increased risks related to malware and phishing attacks.","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/expect-zip-and-mov-domains-to-be-used-in-phishing-and-malware-attacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/expect-zip-and-mov-domains-to-be-used-in-phishing-and-malware-attacks\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/expect-zip-and-mov-domains-to-be-used-in-phishing-and-malware-attacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Expect .zip and .mov domains to be used in phishing and malware attacks"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/expect-zip-and-mov-domains-to-be-used-in-phishing-and-malware-attacks\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/expect-zip-and-mov-domains-to-be-used-in-phishing-and-malware-attacks\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1"},"headline":"Expect .zip and .mov domains to be used in phishing and malware attacks","datePublished":"2023-05-18T07:08:05+00:00","dateModified":"2023-05-22T21:26:45+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/expect-zip-and-mov-domains-to-be-used-in-phishing-and-malware-attacks\/#webpage"},"wordCount":1001,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/expect-zip-and-mov-domains-to-be-used-in-phishing-and-malware-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/05\/zip-and-mov-domains-cause-confusion-400x260-1.png","keywords":["Google"],"articleSection":["Security &amp; Privacy"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/expect-zip-and-mov-domains-to-be-used-in-phishing-and-malware-attacks\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1","name":"Joshua Long","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","caption":"Joshua Long"},"description":"Joshua Long (@theJoshMeister), formerly Intego\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \u2014","sameAs":["https:\/\/security.thejoshmeister.com","https:\/\/www.facebook.com\/JoshLong","https:\/\/www.instagram.com\/thejoshmeister\/","https:\/\/www.linkedin.com\/in\/thejoshmeister","https:\/\/www.pinterest.com\/thejoshmeister\/","https:\/\/twitter.com\/theJoshMeister","https:\/\/www.youtube.com\/@theJoshMeister"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/05\/zip-and-mov-domains-cause-confusion-400x260-1.png","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-pv3","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/98025"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=98025"}],"version-history":[{"count":24,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/98025\/revisions"}],"predecessor-version":[{"id":98068,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/98025\/revisions\/98068"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/98038"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=98025"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=98025"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=98025"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}