Web3 Domain Squatting
Web3 Domain Squatting is the unauthorized practice of registering, trafficking in, or using domain names within decentralized naming systems—such as those ending in .eth, .crypto, or other blockchain-based Top-Level Domains (TLDs)—with the bad-faith intent of profiting from the goodwill of a trademark owner.
Mechanism in a Decentralized Context
This practice is the decentralized analogue of traditional cybersquatting, but it poses unique challenges due to the nature of Web3 technology.
1. Registration for Profit
The squatter registers a domain name that is identical or confusingly similar to a well-known brand (e.g., registering gogle.eth or applestore.crypto). The intent is typically to:
Sell the Domain: Hold the name hostage and sell it back to the legitimate trademark holder at an inflated price.
Lure Victims: Use the domain to host a phishing site or link to a fraudulent smart contract, exploiting the brand's reputation to trick users into connecting their cryptocurrency wallets and authorizing malicious transactions.
2. Technical Differences from Web2
Traditional cybersquatting is governed by central authorities (like ICANN) and the UDRP dispute system. Web3 domain squatting evades these controls:
Immutability: Once a blockchain domain is registered to a wallet address, the record of ownership is permanently stored on the decentralized ledger, making it highly resistant to takedown requests.
Anonymity: The owner is identified only by a cryptic, pseudonymous wallet address, which obstructs traditional legal enforcement and makes it nearly impossible to serve legal papers or identify the squatter.
Censorship Resistance: The core architecture of the domain system is designed to prevent any single entity, including courts or governments, from unilaterally censoring or revoking the domain name.
Cybersecurity Implication
Web3 domain squatting is a primary attack vector in decentralized finance (DeFi) because domain names are used as trusted links to wallets or smart contracts. A squatter can set up a fraudulent domain to steal credentials or assets, posing a significant threat to customer trust and brand reputation.
ThreatNG directly helps mitigate the risks of Web3 Domain Squatting by applying its external attack surface management (EASM) and digital risk protection (DRP) capabilities to the decentralized domain space. Since direct legal enforcement against anonymous, immutable Web3 domains is challenging, ThreatNG focuses on proactively identifying the squatting infrastructure and the resulting user fraud risks.
Proactive Mitigation of Web3 Domain Squatting
External Discovery and Continuous Monitoring
ThreatNG’s foundation of purely external unauthenticated discovery and continuous monitoring is vital for tracking the creation and activity of squatted domains that bypass traditional, centralized WHOIS monitoring.
Example of ThreatNG Helping: ThreatNG continuously monitors for newly available and taken Web3 Domains. If a threat actor registers a brand-impersonating decentralized domain, such as
mycompany-store.eth, ThreatNG immediately flags this Domain Name Permutation as a high-risk external finding, alerting the brand owner to the squatter's activity before they can launch a phishing campaign.
External Assessment (Security Ratings)
ThreatNG’s security ratings quantify the risks posed by Web3 domain squatting, transforming the technical presence of a squatted name into a measurable business and fraud risk.
BEC & Phishing Susceptibility Security Rating: This rating is key because it quantifies the fraud risk associated with a squatted domain. It's based, in part, on findings across Web3 Domains (both available and taken) and Domain Permutations with Mail Record.
Detailed Example: A low rating (e.g., 'F') signals a high risk if ThreatNG confirms that a taken Web3 Domain (e.g.,
my-compny.eth) is actively used as a lure. This quantifiable risk rating helps justify the cost of defensive registration or public warning campaigns, as the decentralized nature makes direct takedown challenging.
Brand Damage Susceptibility Security Rating: This rating tracks the reputational risk associated with a squatted domain's public presence.
Detailed Example: The rating explicitly incorporates findings across Web3 Domains and Negative News. If a squatted domain is found, and subsequent monitoring finds Negative News related to scams or fraud associated with that name, the low Brand Damage Susceptibility rating quantifies the immediate harm to the brand, providing necessary context for legal action or community outreach.
Investigation Modules
The investigation modules provide the detailed evidence needed to link the pseudonymous Web3 domain to actionable intelligence, which is crucial given the blockchain's anonymity challenges.
Domain Intelligence (Domain Name Permutations): This module identifies the specific domain names used for squatting and the infrastructure used to manage them.
Detailed Example: If an attacker uses a typosquatting domain (e.g.,
myc0mpany.com) to advertise their squatted Web3 Domain (myc0mpany.eth), the Domain Permutations module detects and groups these linked assets. This linkage provides a traditional domain IP address and mail record that legal teams can target for a takedown, effectively circumventing the immutability of the blockchain domain itself.
Sensitive Code Exposure: This module vets the external environment for code leaks related to the brand's Web3 activities.
Detailed Example: The Code Repository Exposure module discovers public repositories and scans them for exposed secrets. Finding a PGP private key block or an API key associated with a smart contract's back-end provides critical intelligence, enabling the organization to rotate the key immediately. This proactive security measure prevents the squatter from exploiting the company's own infrastructure through a technical vector.
Intelligence Repositories
The DarCache repositories provide real-world threat context and compromised data to validate the urgency and intent of the Web3 domain squatter.
DarCache Dark Web: This repository tracks mentions of the organization and associated Compromised Credentials.
Example of ThreatNG Helping: If a squatted domain is discovered, cross-referencing it against DarCache Dark Web intelligence can reveal whether the domain or its associated wallet address is being discussed by cybercriminals or linked to other financial fraud schemes, thereby proving the bad-faith intent required for any potential legal challenge.
Complementary Solutions
ThreatNG’s intelligence on squatted domains and associated centralized infrastructure is crucial for cooperatively working with services that manage the defense and public warning aspects of Web3 security.
Wallet Security and Alerting Platforms: ThreatNG identifies the fraudulent domain, and the wallet platform uses that data for community-level defense.
Example of ThreatNG and Complementary Solutions: ThreatNG flags a high-risk squatted Web3 Domain (e.g.,
mycompany-support.eth). This specific threat intelligence is instantly sent to a third-party wallet security platform or browser extension. When a user attempts to connect their wallet to the malicious domain, the platform displays a proactive warning alert based on ThreatNG’s data, effectively blocking the user’s fraudulent transaction before they can lose assets to the squatter.
Brand Protection Services (Traditional): ThreatNG pinpoints the centralized weak points of the decentralized attack.
Example of ThreatNG and Complementary Solutions: ThreatNG identifies that a squatted blockchain domain is being advertised through an official-looking traditional website hosted on a conventional IP address. ThreatNG shares the traditional IP and domain with a brand protection service, which executes a takedown on the centralized web server, disrupting the squatter's ability to host their phishing front-end, even though the underlying blockchain domain remains immutable.

