Is the new .zip top-level domain a cyber security risk?
While some experts have branded the new domain ‘unnecessary’, others dispute its usefulness for attacks


Security experts have warned that the new ‘.zip’ top-level domain (TLD) could facilitate the spread of malware and undermine legitimate sources.
TLDs are the letters that follow the final period in a URL, such as ‘.com’, and at the start of May, Google announced the release of eight new options: .dad, .phd, .prof, .esq, .foo, .zip, .mov, and .nexus.
While most of the new TLDs were made to tie in with specific job titles, concerns have been raised about the potential for the two that resemble file extensions - ‘.zip’ and ‘.mov’- to be used by hackers seeking to trick unsuspecting users into entering malicious domains.
Zipped archives are widely used in business as they allow large amounts of data to be shared in a compressed format, and for their compatibility across macOS, Windows, and Linux.
Using the ‘.zip’ TLD to mask illegitimate links as files to download could drive a rise in phishing attacks, or push malicious .zip files such as those used in recent Emotet botnet campaigns via domains that resemble innocent files.
Regarding the .zip domains I complained about – I think it's dumb and unnecessarily creates confusion and will leave to various minor phishing schemes/tricks/address-confusion attacks... but it's just going to get forced into being another TLD. It just feels uniquely unneeded.May 12, 2023
There is a concern that automatic hyperlinkers, the processes that convert text such as ‘google.com’ into a link within communication software such as emails, will inadvertently change references to .zip or files into links.
In practice, threat actors could choose likely .zip or file names for their domains and wait for victims to accidentally link to them in their correspondences or on social media.
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
For example, a manager could make a post referencing a specific file on their company’s intranet e.g. ‘tax-policy.zip’ and accidentally create a hyperlink which users could easily mistake for an intentional link to the file in question.
“As an attacker, all I have to do is register the documents-backup.zip domain and upload a malicious zip file to the root of the domain,” wrote Reddit user LudwikTR.
“It will start downloading as soon as someone opens http://documents-backup.zip. The individual clicking on the link expects a ZIP file to download - and it will, but it will be a malicious file from a third-party, not from the author of the message or a post.”
Developer and blogger Eric Lawrence wrote that as long as automatic hyperlinkers are instructed to exclude domains ending in .zip or .mov, this issue is unlikely to arise.
RELATED RESOURCE
Why technology, cyber and privacy risk management are critical for digital transformation
How ServiceNow Integrated Risk Management helps you embrace the digital future
It’s possible that the concerns could spark a wider conversation around automatic links being generated, particularly in software commonly used for phishing such as emails.
For security purposes, users might prefer to manually select which sections of their written text are intended to be links which could circumvent the problem.
Lawrence also noted that some TLDs automatically fall under HTTPS rather than HTTP via the HTTP Strict Transport Security policy, and that to get an HTTPS certificate domain registrants often have to go on the record with Certificate Transparency, where suspicious domain names could be easily spotted.
This could prevent attackers from establishing deceptively-named websites in the first place, whether for passive attacks on victims in the manner described or for spear phishing attacks with links disguised as file names in messages sent to targets.
As F5 noted in its 2021 TLS Telemetry Report, however, 83% of phishing sites were found to use valid HTTPS certificates, a reminder that an HTTPS site is not guaranteed to be safe.
What’s in a domain name?
Choosing a domain name is an important process for businesses, as a website can be the sole aspect of a company facing customers and must be easy to find and appear trustworthy or relevant.
Most businesses opt for ‘.com’ or a region-specific TLD, though smaller companies sometimes go for market-specific domains to stand out such as ‘.ai’.
Palo Alto Networks research revealed that the majority of malicious domains were found within a small range of TLDs; 99% of all domains are found at 219 TLDs, but the same proportion of command and control (C2) domains span just 29 TLDs.
Even the most widely spread malware domains, such as those used for phishing, were found at 92 TLDs in 99% of cases out of the 1,479 total TLDs.
It remains to be seen whether ‘.zip’ will become widely used for malware attacks, but as attackers are seemingly limited to using it for the attacks described it may remain a domain used for both legitimate purposes and the most niche malware sites.

Rory Bathgate is Features and Multimedia Editor at ITPro, overseeing all in-depth content and case studies. He can also be found co-hosting the ITPro Podcast with Jane McCallion, swapping a keyboard for a microphone to discuss the latest learnings with thought leaders from across the tech sector.
In his free time, Rory enjoys photography, video editing, and good science fiction. After graduating from the University of Kent with a BA in English and American Literature, Rory undertook an MA in Eighteenth-Century Studies at King’s College London. He joined ITPro in 2022 as a graduate, following four years in student journalism. You can contact Rory at rory.bathgate@futurenet.com or on LinkedIn.
-
Should AI PCs be part of your next hardware refresh?
AI PCs are fast becoming a business staple and a surefire way to future-proof your business
By Bobby Hellard Published
-
Westcon-Comstor and Vectra AI launch brace of new channel initiatives
News Westcon-Comstor and Vectra AI have announced the launch of two new channel growth initiatives focused on the managed security service provider (MSSP) space and AWS Marketplace.
By Daniel Todd Published
-
Foreign AI model launches may have improved trust in US AI developers, says Mandiant CTO – as he warns Chinese cyber attacks are at an “unprecedented level”
News Concerns about enterprise AI deployments have faded due to greater understanding of the technology and negative examples in the international community, according to Mandiant CTO Charles Carmakal.
By Rory Bathgate Published
-
Adopting more security tools doesn't keep you safe, it just overloads your teams
News Security tool sprawl makes it harder to manage environments and overwhelms teams
By Ross Kelly Published
-
Google’s Big Sleep AI model just found a zero-day vulnerability in the wild — but don’t hold your breath for game-changing AI bug hunting tools any time soon
News Google clarified it was the first undiscovered memory safety bug to be flagged by an AI agent, touting this as a significant step in using AI for vulnerability research
By Solomon Klappholz Published
-
Australia and Google turn to AI to protect critical infrastructure
News Australia's CSIRO partners with Google to develop homegrown AI security tools for infrastructure
By Nicole Kobie Published
-
Google Workspace just got a slew of new zero trust features to help supercharge user security – here's what you need to know
News New Zscaler integrations across Chrome Enterprise, Google Workspace, and Google Security Operations aim to enhance enterprise security and access
By Daniel Todd Last updated
-
Google says Microsoft can’t be trusted after email security blunders
News Google has fired a broadside at Microsoft amid concerns over the tech giant's repeated security blunders
By Solomon Klappholz Published
-
Google forced to delete billions of incognito browsing records after privacy controversy
News Google has agreed to delete data it gained improperly through its private browsing function
By George Fitzmaurice Published
-
Google spent $10 million on bug bounty payouts last year — here's what flaws researchers uncovered
News Google’s Vulnerability program paid rewards to 600 researchers in 2023, with Android flaws earning a third of the total
By Steve Ranger Published