: Attackers can use the @ symbol in a URL to trick browsers. For example, a link like https://google.com∕downloads∕@stronka.zip looks like it is pointing to a download on Google's site.
While specifically refers to a domain that was used in a high-profile cybersecurity demonstration, the most "interesting paper" on this topic is actually a broader study regarding the security risks of the .zip Top-Level Domain (TLD) . Recommended Research Paper
: A user who thinks they are downloading a file from a trusted source is instead sent to the stronka.zip website, which can trigger an automatic malware download. Other Noteworthy Studies stronka.zip
: This paper analyzes how attackers exploit "file-to-domain confusion," specifically when a string like document.zip could be either a local file or a malicious website. It details threat scenarios including cryptocurrency mining scripts disguised as file extraction processes. Why "stronka.zip" Is a Landmark Case
The New Google .zip TLD: Examining Potential Cybersecurity Risks : Attackers can use the @ symbol in a URL to trick browsers
: June 19, 2024, in CODASPY '24: Proceedings of the 14th ACM Conference on Data and Application Security and Privacy .
: An Overview of Threats Exploring the Confusion Between Top-Level Domains and File Type Extensions Recommended Research Paper : A user who thinks
: A technical preprint (available on arXiv) that discusses the collisions between the namespace for filenames and DNS names.