The domain stronka.zip became famous as a proof-of-concept for a technique popularized by researcher Bobby Rau .
: This paper analyzes how attackers exploit "file-to-domain confusion," specifically when a string like document.zip could be either a local file or a malicious website. It details threat scenarios including cryptocurrency mining scripts disguised as file extraction processes. Why "stronka.zip" Is a Landmark Case
: A technical preprint (available on arXiv) that discusses the collisions between the namespace for filenames and DNS names. stronka.zip
: An analysis of 17,000 .zip domains that found over 600 active Windows Trojans hosted on these sites as of March 2024.
: Attackers can use the @ symbol in a URL to trick browsers. For example, a link like https://google.com∕downloads∕@stronka.zip looks like it is pointing to a download on Google's site. The domain stronka
: June 19, 2024, in CODASPY '24: Proceedings of the 14th ACM Conference on Data and Application Security and Privacy .
: An Overview of Threats Exploring the Confusion Between Top-Level Domains and File Type Extensions Why "stronka
: A user who thinks they are downloading a file from a trusted source is instead sent to the stronka.zip website, which can trigger an automatic malware download. Other Noteworthy Studies