In the realm of cybersecurity, the proliferation of new top-level domains (TLDs) has unveiled a critical security vulnerability that has long haunted organizations worldwide. The issue at hand involves organizations setting up their internal Microsoft authentication systems using domain names in TLDs that were not in existence when these systems were initially created. This practice inadvertently leads to the transmission of Windows usernames and passwords to domain names that are beyond their control and susceptible to registration by any individual.
This security flaw, known as “namespace collision,” occurs when domain names designated for internal networks coincide with domains that can be resolved on the public Internet. Windows computers within a private corporate network leverage Active Directory to validate various components within the network, utilizing a feature called “DNS name devolution” to streamline the process of accessing other resources without the need for the complete domain name specification.
The situation becomes problematic when organizations base their Active Directory network on a domain they do not own or manage. Many organizations constructed their networks before the emergence of numerous new TLDs, such as .network, .inc, and .llc. For instance, an organization set up their Active Directory service using the domain “company.llc” in 2005, assuming that the domain would fail to resolve outside the local network due to the unavailability of the .llc TLD. However, when the .llc TLD was established in 2018, any individual registering company.llc could intercept the organization’s Windows credentials or manipulate connections for malicious purposes.
Philippe Caturegli, the founder of security consultancy Seralys, has been actively studying the extent of the namespace collision issue. Caturegli has been scanning the Internet for self-signed certificates referencing domains across various TLDs popular among businesses. Seralys discovered over 9,000 distinct domains across these TLDs, with a significant number remaining unregistered.
The magnitude of the problem has surprised Caturegli, who also identified government entities and critical infrastructures with misconfigured assets during his research. He cited examples where domains like .ad and .cloud were unintentionally exposed, allowing unauthorized interception of Microsoft Windows credentials.
Caturegli’s proactive measures include defensively registering domains like wpad.ad, a domain associated with the Web Proxy Auto-Discovery Protocol. This protocol, ingrained in Microsoft Windows systems, can inadvertently lead to outbound requests to unauthorized domains if organizations have chosen a conflicting domain for their Active Directory setup.
Despite repeated warnings from security researchers and domain experts, organizations continue to overlook the risks associated with namespace collisions. The potential for cybercrime groups to exploit this vulnerability for unauthorized access presents a looming threat. As ransomware attacks escalate, the exploitation of namespace collisions could serve as a gateway for threat actors to infiltrate systems without detection.
The cautionary tale of corp.com, a domain purchased by Microsoft due to continuous credential exposure, emphasizes the significance of addressing namespace collision vulnerabilities promptly. The consequences of overlooking this critical security flaw are akin to a town constructing a water supply system with lead pipes knowingly, with vendors and stakeholders turning a blind eye to the impending danger.
As the cybersecurity landscape evolves, organizations must prioritize mitigating namespace collision issues to safeguard their sensitive information and prevent unauthorized access. The proactive measures taken by researchers like Caturegli underscore the urgent need for comprehensive solutions to address this longstanding security weakness in corporate networks.

