The Times Australia
Google AI
The Times World News

.

We analysed the entire web and found a cybersecurity threat lurking in plain sight

  • Written by Kevin Saric, Computer Scientist & Mechatronic Engineer, CSIRO
We analysed the entire web and found a cybersecurity threat lurking in plain sight

Our latest research has found that clickable links on websites can often be redirected to malicious destinations. We call these “hijackable hyperlinks” and have found them by the millions across the whole of the web, including on trusted websites.

Our paper[1], published at the 2024 Web Conference, shows that cybersecurity threats on the web can be exploited at a drastically greater scale than previously thought.

Concerningly, we found these hijackable hyperlinks on the websites of large companies, religious organisations, financial firms and even governments. The hyperlinks on these websites can be hijacked without triggering any alarms. Only vigilant – some might say paranoid – users would avoid falling into these traps.

If we were able to find these vulnerabilities across the web, so can others. Here’s what you need to know.

What are hijackable hyperlinks?

If you make a typo when entering your bank’s web address, you might accidentally end up on a phishing site – one that impersonates, or “spoofs”, your bank’s website to steal your personal info.

If you’re in a rush and don’t inspect the website closely, you may enter sensitive personal details and pay a steep price for your mistake. This could include identity theft, account compromise or financial loss[2].

Something even more dangerous happens when programmers mistype web addresses in their code. There’s a chance their typo will direct users to an internet domain that has never been purchased. We call these phantom domains.

For example, a programmer making a link to theconversation.com might accidentally link to tehconversation.com – note the misspelling. If the mistyped domain has never been purchased, someone could come along and buy that phantom domain for around A$10, hijacking the inbound traffic. In these cases, the price of programmers’ mistakes is paid by the users.

These programmer linking errors don’t just risk directing users to phishing or spoofing sites. Hijacked traffic can be directed towards a range of traps, including malicious scripts[3], misinformation, offensive content, viruses and any other hacks the future will bring.

Over half a million phantom domains

Using high-performance computing clusters, we processed the whole browsable web for these vulnerabilities. At a scale never seen in research, in total we analysed over 10,000 hard drives’ worth of data.

Doing so, we found over 572,000 phantom domains. The hijackable hyperlinks directing users to them were found on many trusted websites. In a twist of irony, this even included web-based software designed to enforce privacy legislation on websites.

We investigated what errors caused these vulnerabilities and categorised them. Most were caused by typos in hyperlinks, but we also found another type of programmer-generated vulnerability: placeholder domains.

When programmers develop a website that does not yet have a specific domain, they often enter links to a phantom domain with the expectation the links will be fixed later.

We found this to be common with website design templates, where the aesthetic components of a website are purchased from another programmer rather than developed in-house. When the design template is later installed on a website, the phantom domains are often not updated, making links to them hijackable.

To determine if hijackable hyperlinks could be exploited in practice, we purchased 51 of the phantom domains they point to and passively observed the inbound traffic. From this, we detected substantial traffic coming from the hijacked links. Compared to similar new domains that lacked hijacked links, 88% of our phantom domains got more traffic, with up to ten times more visitors.

A man with a black beard and glasses looks at his smartphone while frowning, sitting at a cafe with his laptop.
Staying vigilant on the web is your best protection against falling for hijacked links. GaduLab/Shutterstock[4]

What can be done?

For average web users, awareness is key. Links cannot be trusted. Be vigilant.

For those in charge of companies and their websites, we suggest several technical countermeasures[5]. The simplest solution is for website operators to “crawl” their websites for broken links. Countless free tools are available for doing so. If any broken links are found, fix them before they are hijacked.

We, the Web

British scientist Sir Tim Berners-Lee first proposed the web at CERN[6] in 1989. In his earliest description of it – still widely available on the web as a testament to itself – there is a section titled “non requirements”, where security is addressed. This section includes the fateful phrase:

[Data security is] of secondary importance at CERN, where information exchange is still more important.

While this was true of CERN in 1989, the web is now the primary information exchange medium of the modern age.

We have come to treat the web as an external component of our own brains. This is evidenced by the popularity of large language models like ChatGPT, which themselves are trained on data from the web.

As our dependence deepens, it might be time to mentally re-categorise web data security from “non requirements” to “important requirements”.

References

  1. ^ Our paper (dl.acm.org)
  2. ^ or financial loss (theconversation.com)
  3. ^ malicious scripts (theconversation.com)
  4. ^ GaduLab/Shutterstock (www.shutterstock.com)
  5. ^ we suggest several technical countermeasures (dl.acm.org)
  6. ^ first proposed the web at CERN (www.home.cern)

Read more https://theconversation.com/we-analysed-the-entire-web-and-found-a-cybersecurity-threat-lurking-in-plain-sight-233240

Times Magazine

IPECS Phone System in 2026: The Future of Smart Business Communication

By 2026, business communication is no longer just about making and receiving calls. It’s about speed...

With Nvidia’s second-best AI chips headed for China, the US shifts priorities from security to trade

This week, US President Donald Trump approved previously banned exports[1] of Nvidia’s powerful ...

Navman MiVue™ True 4K PRO Surround honest review

If you drive a car, you should have a dashcam. Need convincing? All I ask that you do is search fo...

Australia’s supercomputers are falling behind – and it’s hurting our ability to adapt to climate change

As Earth continues to warm, Australia faces some important decisions. For example, where shou...

Australia’s electric vehicle surge — EVs and hybrids hit record levels

Australians are increasingly embracing electric and hybrid cars, with 2025 shaping up as the str...

Tim Ayres on the AI rollout’s looming ‘bumps and glitches’

The federal government released its National AI Strategy[1] this week, confirming it has dropped...

The Times Features

FOLLOW.ART Launches the Nexus Card as the Ultimate Creative-World Holiday Gift

For the holiday season, FOLLOW.ART introduces a new kind of gift for art lovers, cultural supporte...

Bailey Smith & Tammy Hembrow Reunite for Tinder Summer Peak Season

The duo reunite as friends to embrace 2026’s biggest dating trend  After a year of headlines, v...

There is no scientific evidence that consciousness or “souls” exist in other dimensions or universes

1. What science can currently say (and what it can’t) Consciousness in science Modern neurosci...

Brand Mentions are the new online content marketing sensation

In the dynamic world of digital marketing, the currency is attention, and the ultimate signal of t...

How Brand Mentions Have Become an Effective Online Marketing Option

For years, digital marketing revolved around a simple formula: pay for ads, drive clicks, measur...

Macquarie Capital Investment Propels Brennan's Next Phase of Growth and Sovereign Tech Leadership

Brennan, a leading Australian systems integrator, has secured a strategic investment from Macquari...

Will the ‘Scandinavian sleep method’ really help me sleep?

It begins with two people, one blanket, and two very different ideas of what’s a comfortable sle...

Australia’s Cost-of-Living Squeeze: Why Even “Doing Everything Right” No Longer Feels Enough

For decades, Australians were told there was a simple formula for financial security: get an edu...

A Thoughtful Touch: Creating Custom Wrapping Paper with Adobe Firefly

Print it. Wrap it. Gift it. The holidays are full of colour, warmth and little moments worth celebr...