Technology NewsTechnology NewsTechnology News
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Reading: Secret Service Official Urges Stricter Controls on Domain Registration
Share
Font ResizerAa
Technology NewsTechnology News
Font ResizerAa
Search
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Follow US
  • Cookie Policy (EU)
  • Contact
  • About
© 2025 NEWSLINKER - Powered by LK SOFTWARE
Cybersecurity

Secret Service Official Urges Stricter Controls on Domain Registration

Highlights

  • Gaps in domain registration verification expose businesses to phishing and fraud.

  • Major companies mainly use court actions instead of preventive controls.

  • Business email compromise persists because email systems lack strong identity checks.

Kaan Demirel
Last updated: 30 January, 2026 - 12:19 am 12:19 am
Kaan Demirel 2 hours ago
Share
SHARE

Contents
What Causes Gaps in Domain Registration Security?How Do Major Companies Respond to Such Threats?Why Is Business Email Compromise Still a Problem?

Online security vulnerabilities linked to internet domain administration are drawing new scrutiny from senior law enforcement. As cyber threats become more complex, experts increasingly question the systems that underpin trust on the web. The debate over responsibility between private technology companies and regulatory organizations has taken center stage, with corporations and regulators facing growing pressure to step up preventive measures against fraud and abuse.

Discussion on domain registration abuse has surfaced before, primarily after the U.S. transferred oversight of IANA to global stakeholders. Previous reports have centered on large-scale phishing campaigns using deceptively registered domain names and the reactive approach companies like Microsoft and Google have taken, often seeking court orders for remedial action. More recent comments, such as those from Matt Noyes of the Secret Service, direct attention to the persistent gaps allowing cybercriminals to exploit identity verification weaknesses, demonstrating that industry responses have not matched the evolving methods of internet fraudsters.

What Causes Gaps in Domain Registration Security?

Flaws in the verification processes at domain registrars have created opportunities for fraudulent registrations. Matt Noyes, a senior U.S. Secret Service official, pointed out that large batches of domains mimicking known brands are routinely registered and used in phishing attacks without sufficient validation. He described current processes:

“It is staggering to me that we live in a world where domain registrars and registrars will do bulk registration of various spellings of a major institution’s brand name to create URLs to then use in phishing campaigns or in fraudulent advertising.”

Such weaknesses remain largely unaddressed, exposing both businesses and consumers to identity-based threats.

How Do Major Companies Respond to Such Threats?

Corporations such as Microsoft and Google typically resort to court-ordered takedown efforts to remove fraudulent domains after the fact. This reactive strategy is resource-intensive and often leaves gaps for malicious actors to exploit. Noyes argued that internet companies could act proactively by adapting their oversight practices to reduce abuse. He emphasized the need for governance reforms, stating:

“The major internet players in the U.S., they could change the nature of the internet and change the governance of that, to clean that up when there’s a heavy concentration of abuse and fraud.”

Suggested solutions included withholding certain advertisements or search results linked to suspicious domains.

Why Is Business Email Compromise Still a Problem?

Fake emails targeting organizations, known as business email compromise (BEC), rely on the assumption that email identities can be trusted without additional verification. Noyes highlighted that these scams routinely contribute to significant financial losses in the U.S., as the email system wasn’t designed to validate the true identities behind an account. Consequently, simple trust in email addresses continues to drive fraud, underscoring broader identity weaknesses in digital communications.

Evaluating Noyes’ statements alongside ongoing industry practices highlights the persistent misalignment between regulatory frameworks and the realities of cybercrime. Despite calls for improved domain registration protocols and identity verification, responsibility remains fragmented across private firms and international authorities. For businesses and consumers, this reinforces the importance of vigilance when interacting with potentially deceptive online identities. Maintaining current knowledge about security threats and regulatory developments can help organizations better defend themselves against phishing and BEC scams. Companies are encouraged to supplement traditional measures with advanced monitoring systems and to foster public awareness of these vulnerabilities for stronger overall protection.

You can follow us on Youtube, Telegram, Facebook, Linkedin, Twitter ( X ), Mastodon and Bluesky

You Might Also Like

North Korean Cyber Group Splits to Target Multiple Sectors

Hackers Bypass FortiCloud SSO, Target Fortinet Security Products

Cybercriminals and State Groups Target WinRAR Vulnerability, Google Confirms

Experts Question CISA’s Quantum-Resistant Tech Guidance for Agencies

Cybercriminals Use Voice-Phishing to Breach SSO Accounts and Demand Ransom

Share This Article
Facebook Twitter Copy Link Print
Kaan Demirel
By Kaan Demirel
Kaan Demirel is a 28-year-old gaming enthusiast residing in Ankara. After graduating from the Statistics department of METU, he completed his master's degree in computer science. Kaan has a particular interest in strategy and simulation games and spends his free time playing competitive games and continuously learning new things about technology and game development. He is also interested in electric vehicles and cyber security. He works as a content editor at NewsLinker, where he leverages his passion for technology and gaming.
Previous Article Shoppers Grab $200 Off Garmin Venu X1, Undercutting Apple Watch Ultra 3
Next Article Layoffs Hit Game Industry Hard as Job Prospects Shrink

Stay Connected

6.2kLike
8kFollow
2.3kSubscribe
1.7kFollow

Latest News

Layoffs Hit Game Industry Hard as Job Prospects Shrink
Gaming
Shoppers Grab $200 Off Garmin Venu X1, Undercutting Apple Watch Ultra 3
Wearables
Anduril Draws Global Talent With AI Drone Grand Prix Competition
AI Technology
RobCo Secures $100 Million to Expand U.S. AI Robotics
AI
Tesla Surpasses One Million Full Self-Driving Subscriptions
Electric Vehicle
NEWSLINKER – your premier source for the latest updates in ai, robotics, electric vehicle, gaming, and technology. We are dedicated to bringing you the most accurate, timely, and engaging content from across these dynamic industries. Join us on our journey of discovery and stay informed in this ever-evolving digital age.

ARTIFICAL INTELLIGENCE

  • Can Artificial Intelligence Achieve Consciousness?
  • What is Artificial Intelligence (AI)?
  • How does Artificial Intelligence Work?
  • Will AI Take Over the World?
  • What Is OpenAI?
  • What is Artifical General Intelligence?

ELECTRIC VEHICLE

  • What is Electric Vehicle in Simple Words?
  • How do Electric Cars Work?
  • What is the Advantage and Disadvantage of Electric Cars?
  • Is Electric Car the Future?

RESEARCH

  • Robotics Market Research & Report
  • Everything you need to know about IoT
  • What Is Wearable Technology?
  • What is FANUC Robotics?
  • What is Anthropic AI?
Technology NewsTechnology News
Follow US
About Us   -  Cookie Policy   -   Contact

© 2025 NEWSLINKER. Powered by LK SOFTWARE
Welcome Back!

Sign in to your account

Register Lost your password?