Wednesday, February 8, 2023
  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Glossary
  • Community Forum
  • Web Hosting Directory
  • Login
  • Register
Cloud7 News
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Network/Internet
    • Windows
    • Software
    • Hardware
    • Blockchain
    • Policy/Legislation
    • How-Tos
    • Troubleshooting
No Result
View All Result
Cloud7 News
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Network/Internet
    • Windows
    • Software
    • Hardware
    • Blockchain
    • Policy/Legislation
    • How-Tos
    • Troubleshooting
No Result
View All Result
Cloud7 News
No Result
View All Result

Home > Cybersecurity > Cybersquatting cases reach record highs in 2022

Cybersquatting cases reach record highs in 2022

Cybersquatting complaints have been steadily growing over the past six years and they reached record highs in 2022.


Ezgi Koc Ezgi Koc
December 25, 2022
3 min read
Cybersquatting cases reach record highs in 2022

    Domain names help navigate the vastness of the world wide web and find the information and services we are looking for. However, malicious actors abuse the importance of domain names by registering ones that are identical or similar to existing trademarks, company names, or personal names, hoping to profit from the confusion. It is called cybersquatting.

    Cybersquatting cases reach record highs in 2022

    According to the data presented by the Atlas VPN team based on the information provided by the World Intellectual Property Organization (WIPO), cybersquatting cases reached record highs in 2022.
    In total, 5,616 cybersquatting disputes were filed to the WIPO this year; nearly a 10% rise from 2021.

    The report shows that:

    • Cybersquatting complaints reached record highs in 2022, reaching  5,616; nearly a 10% rise from 2021.
    • Compared to 2000, cybersquatting disputes have risen by a whopping 202%.
    • In total, 61,284 cybersquatting complaints have been registered by WIPO from 2000 till now.

    If we look at the historic numbers of cybersquatting complaints, they have been steadily growing over the past six years. Compared to 2000, cybersquatting disputes have risen by a 202%.

    After registering the look-alike domain names, cybersquatters may attempt to sell them to the trademarks they are copying or use similarities in domain names to attract traffic to their own website. Among the latter are those that use domains to lure victims into phishing attacks.

    Cybersquatting techniques

    Nowadays, most business owners are already aware of the cybersquatting techniques malicious actors use. However, regular Internet users who do not own any domains may need to be made aware of the dangers and tactics employed by cybersquatters.

    Here are some of the main ones:

    1. Typosquatting: In typosquatting, malicious actors register existing domain names with slight spelling variations with the goal of taking users to a fraudulent website if they type a domain name incorrectly. Typosquatters may combine mistyped domain names with look-alike websites of well-known brands to deceive users into thinking they are visiting legitimate websites.
    2. Combosquatting: Popular among phishers, this technique involves combining existing domain names with frequently used words, such as “payment” to trick users into thinking they are on a page that belongs to a legitimate brand.
    3. Soundsquatting: In soundsquatting, malicious actors register domain names that contain homophones, words that sound alike, instead of typographical errors to spoof legitimate websites. This technique mainly targets Internet users that use Siri and other voice assistants to navigate the web.
    4. Homographsquatting: This technique may be particularly hard to recognize as it uses similar-looking symbols and letters of different languages to replace the ones in well-known brand domains. While these domain names may look almost unrecognizable, they can lead users to entirely different pages.
    5. Levelsquatting: Cybercriminals may use a legitimate brand’s domain as a subdomain to confuse visitors into believing they are on a legitimate website. This cybersquatting technique is the most dangerous for mobile users, as mobile address bars are generally quite small and may not display the full web address, making this attack type harder to spot.

    See more Cybersecurity News


    Tags: Atlas VPN
    Ezgi Koc

    Ezgi Koc

    Ezgi Koc is an editor at Cloud7 News. She graduated from Ege University with a bachelor's degree in English Language and Literature. She had a great interest in technology, both hardware and software, since her childhood and decided to pursue a career that would enable her to broaden her horizons in this field. She is very passionate about video games as a Twitch affiliate and streams games in her free time.

    Leave a Reply Cancel reply

    Your email address will not be published. Required fields are marked *

    I agree to the Terms & Conditions and Privacy Policy.

    Next Post
    Critical WordPress gift card plug-in bug targeted by hackers

    Critical WordPress gift card plug-in bug targeted by hackers

    Related News

    CISA publishes VMware ESXi ransomware recovery tool

    CISA publishes VMware ESXi ransomware recovery tool

    February 8, 2023 3:45 pm
    New local privilege escalation vulnerability strikes X.Org server

    New local privilege escalation vulnerability strikes X.Org server

    February 7, 2023 9:45 pm
    Red Hat brings new security capabilities to Red Hat OpenShift

    Red Hat brings new security capabilities to Red Hat OpenShift

    February 7, 2023 8:55 pm
    Cisco fixes command injection vulnerability

    Cisco fixes command injection vulnerability

    February 6, 2023 5:00 pm
    Get free daily newsletters from Cloud7 News Get the Cloud7 Newsletter
    Select list(s):

    Check your inbox or spam folder to confirm your subscription.

    By subscribing, you agree to our
    Copyright Policy and Privacy Policy

    Get the free newsletter

    Subscribe to receive the latest IT business updates straight to your inbox.

    Select list(s):

    Check your inbox or spam folder to confirm your subscription.

    Editor's Choice

    What’s new in Linux kernel 6.2 rc6?

    10 Best Web Hosting Services of 2023

    Ubuntu 22.04 LTS is available for download. What is new?

    CERN and Fermilab recommend AlmaLinux

    7 best hosting control panels of 2023

    How to update Linux Kernel without rebooting?

    7 best Linux mail servers of 2023

    7 best cPanel alternatives for 2023

    7 best Linux web browsers for 2023

    7 best CentOS alternatives

    7 best Linux server distros of 2023

    Interview with Igor Seletskiy on AlmaLinux

    How to create a VM on VMware Workstation

    Recent News

    • CISA publishes VMware ESXi ransomware recovery tool
    • WordPress 6.2 Beta is ready for testing
    • New local privilege escalation vulnerability strikes X.Org server
    • Red Hat brings new security capabilities to Red Hat OpenShift
    • With BuddyPress 12.0, BP Rewrites will support backward compatibility

    Cloud7 News
    Cloud7 is a news source that publishes the latest news, reviews, comparisons, opinions, and exclusive interviews to help tech users of high-experience levels in the IT industry.

    EXPLORE

    • Web Hosting
    • Cloud Computing
    • Data Center
    • Cybersecurity
    • Linux
    • Network/Internet
    • Software
    • Hardware
    • How-Tos
    • Troubleshooting

    RESOURCES

    • Events
    • Interviews
    • Jobs
    • Opinion
    • Whitepapers
    • Glossary
    • Community Forum
    • Web Hosting Directory

    Get the Cloud7 Newsletter

    Get FREE daily newsletters from Cloud7 delivering the latest news and reviews.

    • About
    • Privacy & Policy
    • Copyright Policy
    • Contact

    © 2023, Cloud7 News. All rights reserved.

    No Result
    View All Result
    • Cloud Computing
    • Web Hosting
    • Data Center
    • Linux
    • Cybersecurity
    • More
      • Network/Internet
      • Windows
      • Software
      • Hardware
      • Blockchain
      • Policy/Legislation
      • How-Tos
      • Troubleshooting
    • Events
    • Interviews
    • Jobs
    • Opinion
    • Whitepapers
    • Glossary
    • Community Forum
    • Web Hosting Directory

    © 2023, Cloud7 News. All rights reserved.

    Welcome Back!

    Sign In with Facebook
    Sign In with Google
    Sign In with Linked In
    OR

    Login to your account below

    Forgotten Password? Sign Up

    Create New Account!

    Sign Up with Facebook
    Sign Up with Google
    Sign Up with Linked In
    OR

    Fill the forms below to register

    *By registering into our website, you agree to the Terms & Conditions and Privacy Policy.
    All fields are required. Log In

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In
    This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.