blog
Traffic Distribution System (TDS) abuse - What’s hiding behind the veil?
In this Blog
Jump to
Introduction
Those who follow the DNS abuse landscape closely may have noticed a rise in activity and abuse reports related to Traffic Distribution Systems (TDS). The use of this infrastructure for malicious purposes - particularly in phishing campaigns - is becoming increasingly common.
In this blog, we look at how TDS are being exploited to facilitate abuse, why they present challenges for takedowns, and what we can do as a community to address the problem.
What are TDS?
A TDS is a network that redirects or filters web traffic; typical use includes advertising and affiliate tracking or geolocation targeting. TDS essentially act as intermediaries, often sitting between the link you click—say, in an email—and the page or service you ultimately reach.
There are legitimate use cases for a TDS, but the advantages they offer are useful for cybercriminals too. Spamhaus has observed an increase in their use, enabling large-scale phishing, malware distribution, malvertising, and other harmful activities that rely on domains to distribute, conceal, and accurately target victims.
Types of TDS
There are many types of malicious TDS, but the most common are:
- TDS cloaking: This involves the use of filters such as geolocation, user-agent, or referrals to hide malicious payloads.
- Redirect chains and domain rotation: A rotation of domain names are used combined with multiple step redirects, eventually leading to malicious landing pages.
- Affiliate / phishing: Offers, or fake updates are disseminated to lure users from non-malicious content through to a harmful destination.
Obfuscating badness with TDS
Adversarial use of TDS also makes life much harder for researchers and successful takedowns because they don’t deliver malicious content consistently. Instead, content is only served if a specific set of parameters is met. Otherwise you are simply redirected to innocuous sites, such as Google — leaving no visible trail of the malicious flow. This behaviour leads to reproducibility problems and makes collecting evidence challenging. You can’t capture the malicious content unless you replicate the targeting conditions precisely, turning investigations and remediation into a frustrating game of cat and mouse. It’s also important to note that, as the technology itself has legitimate applications, they aren’t technically abuse, even when exploited for malicious purposes. This makes TDS abuse a bit of a grey area.
“TDS” abuse blindspot
The current definition of abuse at ICANN refers to five types of harmful activity:
- Botnets
- Malware
- Pharming
- Phishing
- Spam (if it’s used to distribute one of the other four types of abuse)
Excluding spam, this definition focuses only on directly harmful outputs, not the infrastructure used to distribute them.
Due to this definition, a TDS redirector domain is therefore considered ambiguous, as it serves only as enabling infrastructure of DNS abuse tactics like malware or phishing. Similarly, systems that use geo-targeting to hide abuse, also lie in this grey-area as technically, they represent infrastructure abuse not DNS abuse.
When it comes to takedowns, it also poses a unique challenge because registrars may not necessarily view them as abuse. They might contact the domain owner to remove the malicious link, but they wouldn’t necessarily consider the entire domain as malicious. Unfortunately, this would be compliant with ICANN’s definition of abuse, and consequently this wouldn’t trigger enforcement action.
Is to facilitate, not to abuse?
From ICANNS’s perspective, if a domain is used to facilitate abuse, but not to host it, it’s often outside the scope of DNS Abuse. From our point of view, however, TDS infrastructure is part of DNS abuse, for the very reason that it is facilitating large-scale malicious operations and, in these cases, exists solely to facilitate abuse.
In essence, TDS are part of a larger ecosystem that enables abuse, rather than being the direct source of the abuse itself.
What we can do
As a community, we need to raise awareness among registrars and the wiser industry that TDS are a growing problem that are actively enabling malicious behaviour. You can also help by sharing any suspicious or malicious domains and urls with us via the Spamhaus Threat Intel Community Portal. Whether you have one domain or thousands of URLs, you can make a difference.