{"id":11881,"date":"2022-10-27T08:22:24","date_gmt":"2022-10-27T12:22:24","guid":{"rendered":"https:\/\/www.cscdbs.com\/blog\/?p=11881"},"modified":"2025-10-15T11:03:10","modified_gmt":"2025-10-15T15:03:10","slug":"les-tld-a-hauts-risques-1e-partie","status":"publish","type":"post","link":"https:\/\/www.cscdbs.com\/blog\/les-tld-a-hauts-risques-1e-partie\/","title":{"rendered":"Les TLD \u00e0 hauts risques \u2013 1e partie"},"content":{"rendered":"\n<p>Les noms de domaine sont des adresses web qui se pr\u00e9sentent sous forme directement lisible, qui permettent de nommer des sites web et de cr\u00e9er des adresses mail. Un nom de domaine est constitu\u00e9 de deux \u00e9l\u00e9ments&nbsp;: le nom de deuxi\u00e8me niveau (g\u00e9n\u00e9ralement, le nom d\u2019une marque et\/ou un ou plusieurs mots cl\u00e9s pertinents) et l\u2019extension de nom de domaine&nbsp;\u2013 aussi appel\u00e9e \u00ab&nbsp;nom de domaine de premier niveau&nbsp;\u00bb (TLD).<\/p>\n\n\n<div class=\"wp-block-image size-small is-style-default\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" src=\"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/images\/SLD%20and%20Extension%20graphic_small.png\" alt=\"\" \/><\/figure>\n<\/div>\n\n\n<p>Il existe diff\u00e9rents types de TLD, y compris les TLD g\u00e9n\u00e9riques (ou mondiaux), que l\u2019on d\u00e9signe par l\u2019acronyme gTLD et qui servaient \u00e0 l\u2019origine \u00e0 fournir une description du type de site, comme .COM pour les sites web d\u2019entreprises ou .ORG pour les organisations caritatives. Il y a aussi des TLD de code pays (ccTLD) qui sont attribu\u00e9s selon le pays, par exemple .CO.UK pour le Royaume-Uni ou .FR pour la France, etc. Enfin, il existe tout une s\u00e9rie de nouveaux gTLD qui ont \u00e9t\u00e9 lanc\u00e9s depuis 2013 et qui sont g\u00e9n\u00e9ralement associ\u00e9s \u00e0 des cat\u00e9gories de contenus sp\u00e9cifiques, comme des secteurs d\u2019activit\u00e9, des centres d\u2019int\u00e9r\u00eat ou des lieux particuliers (par exemple .SHOP, .CLUB, .TOKYO). Chaque TLD est supervis\u00e9 par un op\u00e9rateur de registre, qui g\u00e8re son infrastructure.<\/p>\n\n\n\n<p>Le contenu associ\u00e9 aux noms de domaine couvre l\u2019\u00e9ventail complet des contenus disponibles sur Internet, qu\u2019il s\u2019agisse de contenus l\u00e9gitimes mis en ligne par des marques ou des individus ou de contenus li\u00e9s \u00e0 des activit\u00e9s illicites ou criminelles. CSC a toutefois not\u00e9 que certains TLD sont davantage utilis\u00e9s pour le contenu malveillant.<\/p>\n\n\n\n<p>Il peut avoir plusieurs explications \u00e0 l\u2019attrait particulier de certains TLD aupr\u00e8s des fraudeurs, y compris le co\u00fbt de l\u2019enregistrement d\u2019un nom de domaine et les difficult\u00e9s li\u00e9es aux interventions (d\u00e9sactivation de contenu) sur du contenu illicite. Les TLD g\u00e9r\u00e9s par certains op\u00e9rateurs de registre, comme ceux qui proposent des enregistrements de nom de domaine \u00e0 faibles co\u00fbts, voire gratuitement, ou ceux dont la politique de s\u00e9curit\u00e9 laisse \u00e0 d\u00e9sirer, sont plus susceptibles d\u2019\u00eatre utilis\u00e9s pour des activit\u00e9s illicites. En outre, les extensions de noms de domaine pour lesquelles il n\u2019existe aucune possibilit\u00e9 d\u2019intervention claire et fiable, telles que .VN (Vietnam) et .RU (Russie), repr\u00e9sentent un risque particuli\u00e8rement \u00e9lev\u00e9. D\u2019autres facteurs ont \u00e9galement de l\u2019importance. Ainsi, le niveau de prosp\u00e9rit\u00e9 d\u2019un pays a une incidence sur les niveaux d\u2019expertise technique des fournisseurs de services Internet (FSI), et donc sur le risque de compromission des noms de domaine.<\/p>\n\n\n\n<p>Dans ce billet de blog en deux parties, nous nous attacherons \u00e0 quantifier les niveaux de menace associ\u00e9s \u00e0 certaines extensions de noms de domaine, \u00e0 savoir la possibilit\u00e9 qu\u2019un nom de domaine avec un TLD particulier soit enregistr\u00e9 dans un but frauduleux.<\/p>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">1e partie : Les TLD des sites de phishing<\/h2>\n\n\n\n<p>D\u00e9terminer le niveau des menaces associ\u00e9 \u00e0 chaque TLD est notamment utile pour&nbsp;:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Aider \u00e0 classer par ordre d\u2019importance les r\u00e9sultats identifi\u00e9s via un service de protection de marque. Par exemple, le&nbsp;TLD peut servir \u00e0 mieux cibler certains sites pour faire un suivi ult\u00e9rieur des modifications de contenu.<\/li><li>Identifier les TLD pour lesquels il est pr\u00e9f\u00e9rable d\u2019enregistrer \u2013&nbsp;\u00e0 titre d\u00e9fensif&nbsp;\u2013 des noms de domaine incluant des cha\u00eenes de caract\u00e8res cl\u00e9s associ\u00e9es \u00e0 la marque afin d\u2019\u00e9viter qu\u2019ils ne soient enregistr\u00e9s par des tiers ayant des intentions malveillantes. <\/li><li>Identifier les TLD pour lesquels il peut \u00eatre int\u00e9ressant pour les fournisseurs de services de protection de marque de proposer des options de \u00ab&nbsp;blocage&nbsp;\u00bb ou d\u2019alerte lorsque, par exemple, un tiers tente d\u2019enregistrer un nom de domaine incluant un terme associ\u00e9 \u00e0 une marque.<\/li><\/ul>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Analyse et discussion<\/h2>\n\n\n\n<p>Pour ce premier billet, nous avons analys\u00e9 les donn\u00e9es fournies par les services de protection contre la fraude de CSC afin d\u2019identifier les TLD associ\u00e9s \u00e0 des noms de domaine utilis\u00e9s pour des activit\u00e9s de phishing. L\u2019analyse couvre tous les sites d\u00e9tect\u00e9s entre novembre 2021 et avril 2022 pour les TLD associ\u00e9s \u00e0 plus de 10 cas de phishing \u00e0 partir du nom de domaine (par opposition au phishing visant le sous-domaine). Nous avons ainsi obtenu des r\u00e9sultats pour 115 TLD diff\u00e9rents.<\/p>\n\n\n\n<p>En outre, nous tenons \u00e9galement compte de la fr\u00e9quence d\u2019utilisation du nom de domaine sous le TLD en question associ\u00e9 au contenu dangereux. Pour ce faire, nous exprimons les chiffres bruts en tant que proportion du nombre total de noms de domaine enregistr\u00e9s sous le TLD . Puis nous normalisons les donn\u00e9es, de sorte que la valeur du TLD le plus dangereux est de 1, toutes les autres valeurs de cet ensemble de donn\u00e9es \u00e9tant ensuite mises \u00e0 l&#8217;\u00e9chelle. Veuillez noter que cette valeur refl\u00e8te la proportion de noms de domaine malveillants pour chaque TLD, plut\u00f4t que leur nombre absolu. D\u2019autres TLD correspondent \u00e0 un nombre \u00e9lev\u00e9 d\u2019infractions en raison du nombre total d\u2019enregistrements de nom de domaine sous ces extensions. Le Tableau 1 montre les vingt premiers TLD repr\u00e9sent\u00e9s dans l\u2019ensemble de donn\u00e9es de phishing trait\u00e9 par CSC (en nombres absolus), ainsi que les fr\u00e9quences de menaces normalis\u00e9es pour ces TLD.<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td class=\"has-text-align-center\" data-align=\"center\"><strong>TLD<\/strong><strong><\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>% du total des cas de phishing<\/strong><strong><\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>Nb total de noms de domaine enreg. sous le TLD<\/strong><strong><\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>Fr\u00e9q. de menace normalis\u00e9e dans l\u2019ens. de donn\u00e9es<\/strong><strong><\/strong><\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">.COM<\/td><td class=\"has-text-align-center\" data-align=\"center\">45,7&nbsp;%<\/td><td class=\"has-text-align-center\" data-align=\"center\">221&nbsp;858&nbsp;334<\/td><td class=\"has-text-align-center\" data-align=\"center\">0,014<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">.ORG<\/td><td class=\"has-text-align-center\" data-align=\"center\">6,9&nbsp;%<\/td><td class=\"has-text-align-center\" data-align=\"center\">15&nbsp;550&nbsp;733<\/td><td class=\"has-text-align-center\" data-align=\"center\">0,031<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">.APP<\/td><td class=\"has-text-align-center\" data-align=\"center\">6,2&nbsp;%<\/td><td class=\"has-text-align-center\" data-align=\"center\">1&nbsp;155&nbsp;807<\/td><td class=\"has-text-align-center\" data-align=\"center\">0,377<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">.NET<\/td><td class=\"has-text-align-center\" data-align=\"center\">4,8&nbsp;%<\/td><td class=\"has-text-align-center\" data-align=\"center\">19&nbsp;773&nbsp;315<\/td><td class=\"has-text-align-center\" data-align=\"center\">0,017<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">.XYZ<\/td><td class=\"has-text-align-center\" data-align=\"center\">2,5&nbsp;%<\/td><td class=\"has-text-align-center\" data-align=\"center\">10&nbsp;841&nbsp;304<\/td><td class=\"has-text-align-center\" data-align=\"center\">0,016<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">.RU<\/td><td class=\"has-text-align-center\" data-align=\"center\">2,5&nbsp;%<\/td><td class=\"has-text-align-center\" data-align=\"center\">10&nbsp;627&nbsp;033<\/td><td class=\"has-text-align-center\" data-align=\"center\">0,016<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">.CO<\/td><td class=\"has-text-align-center\" data-align=\"center\">2,1&nbsp;%<\/td><td class=\"has-text-align-center\" data-align=\"center\">4&nbsp;110&nbsp;132<\/td><td class=\"has-text-align-center\" data-align=\"center\">0,035<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">.CN<\/td><td class=\"has-text-align-center\" data-align=\"center\">1,7&nbsp;%<\/td><td class=\"has-text-align-center\" data-align=\"center\">25&nbsp;147&nbsp;816<\/td><td class=\"has-text-align-center\" data-align=\"center\">0,005<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">.ME<\/td><td class=\"has-text-align-center\" data-align=\"center\">1,3&nbsp;%<\/td><td class=\"has-text-align-center\" data-align=\"center\">1&nbsp;669&nbsp;800<\/td><td class=\"has-text-align-center\" data-align=\"center\">0,054<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">.DEV<\/td><td class=\"has-text-align-center\" data-align=\"center\">1,2&nbsp;%<\/td><td class=\"has-text-align-center\" data-align=\"center\">391&nbsp;929<\/td><td class=\"has-text-align-center\" data-align=\"center\">0,222<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">.BR<\/td><td class=\"has-text-align-center\" data-align=\"center\">1,2&nbsp;%<\/td><td class=\"has-text-align-center\" data-align=\"center\">5&nbsp;519&nbsp;378<\/td><td class=\"has-text-align-center\" data-align=\"center\">0,015<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">.TOP<\/td><td class=\"has-text-align-center\" data-align=\"center\">1,2&nbsp;%<\/td><td class=\"has-text-align-center\" data-align=\"center\">8&nbsp;830&nbsp;142<\/td><td class=\"has-text-align-center\" data-align=\"center\">0,009<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">.IO<\/td><td class=\"has-text-align-center\" data-align=\"center\">1,1&nbsp;%<\/td><td class=\"has-text-align-center\" data-align=\"center\">923&nbsp;588<\/td><td class=\"has-text-align-center\" data-align=\"center\">0,085<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">.IN<\/td><td class=\"has-text-align-center\" data-align=\"center\">1,1&nbsp;%<\/td><td class=\"has-text-align-center\" data-align=\"center\">3&nbsp;271&nbsp;337<\/td><td class=\"has-text-align-center\" data-align=\"center\">0,023<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">.PAGE<\/td><td class=\"has-text-align-center\" data-align=\"center\">1,0&nbsp;%<\/td><td class=\"has-text-align-center\" data-align=\"center\">368&nbsp;474<\/td><td class=\"has-text-align-center\" data-align=\"center\">0,195<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">.ID<\/td><td class=\"has-text-align-center\" data-align=\"center\">0,9&nbsp;%<\/td><td class=\"has-text-align-center\" data-align=\"center\">760&nbsp;240<\/td><td class=\"has-text-align-center\" data-align=\"center\">0,080<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">.ICU<\/td><td class=\"has-text-align-center\" data-align=\"center\">0,8&nbsp;%<\/td><td class=\"has-text-align-center\" data-align=\"center\">7&nbsp;956&nbsp;385<\/td><td class=\"has-text-align-center\" data-align=\"center\">0,007<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">.INFO<\/td><td class=\"has-text-align-center\" data-align=\"center\">0,8&nbsp;%<\/td><td class=\"has-text-align-center\" data-align=\"center\">7&nbsp;852&nbsp;896<\/td><td class=\"has-text-align-center\" data-align=\"center\">0,007<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">.DE<\/td><td class=\"has-text-align-center\" data-align=\"center\">0,7&nbsp;%<\/td><td class=\"has-text-align-center\" data-align=\"center\">22&nbsp;881&nbsp;115<\/td><td class=\"has-text-align-center\" data-align=\"center\">0,002<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">.KE<\/td><td class=\"has-text-align-center\" data-align=\"center\">0,7&nbsp;%<\/td><td class=\"has-text-align-center\" data-align=\"center\">165&nbsp;907<\/td><td class=\"has-text-align-center\" data-align=\"center\">0,288<\/td><\/tr><\/tbody><\/table><figcaption><strong>Tableau 1&nbsp;: <\/strong>Les vingt premiers&nbsp;TLD repr\u00e9sent\u00e9s dans l\u2019ensemble de donn\u00e9es de phishing trait\u00e9 par CSC, en nombres absolus.<\/figcaption><\/figure>\n\n\n\n<p>Nous avons observ\u00e9 des tendances similaires dans d\u2019autres analyses de contenus dangereux. L\u2019\u00e9tude sur le paysage des logiciels malveillants (\u00ab&nbsp;Malware Landscape&nbsp;\u00bb) r\u00e9alis\u00e9e par Interisle en&nbsp;2022 a r\u00e9v\u00e9l\u00e9 que les dix premiers&nbsp;TLD associ\u00e9s \u00e0 des noms de domaine destin\u00e9s \u00e0 diffuser des logiciels malveillants incluaient \u00e9galement un m\u00e9lange d\u2019anciens gTLD (.COM en 1e position, .NET en 5\u00e8me position, .ORG en 6\u00e8me position et .BIZ en 10\u00e8me position), de nouveaux gTLD (.XYZ en 2\u00e8me position, .CLUB en 7\u00e8me position et .TOP en 9\u00e8me position) et de ccTLD (.BR, .IN et .RU en 3\u00e8me, 4\u00e8me et 8\u00e8me positions, respectivement)<a href=\"#_ftn1\"><sup>[1]<\/sup><\/a>. Huit de ces dix extensions figurent dans les 14 premiers \u00e9l\u00e9ments de la liste de phishing de CSC ci-dessus. De m\u00eame, le rapport sur les tendances de l\u2019activit\u00e9 de phishing (\u00ab&nbsp;Phishing Activity Trends Report&nbsp;\u00bb) r\u00e9dig\u00e9 par le groupe de travail anti-phishing (APWG) pour le 4<sup>\u00e8me<\/sup> trimestre&nbsp;2021 a analys\u00e9 les principaux&nbsp;TLD utilis\u00e9s pour les campagnes de phishing, les neuf plus importants incluant les nouveaux gTLD .XYZ, .BUZZ et .VIP, et les ccTLD .BR et .IN, ainsi que des gTLD traditionnels. De fa\u00e7on surprenante, la proportion de nouveaux gTLD \u00e9tait plus de deux fois plus importante dans l\u2019ensemble de donn\u00e9es par rapport au nombre total de noms de domaine enregistr\u00e9s sous ces extensions<a href=\"#_ftn2\"><sup>[2]<\/sup><\/a>. Une \u00e9tude r\u00e9alis\u00e9e au 1<sup>er<\/sup> trimestre&nbsp;2022 par Agari et PhishLabs a \u00e9galement montr\u00e9 des tendances similaires, les dix principaux&nbsp;TLD touch\u00e9s par le phishing (en nombre de sites) incluant les nouveaux gTLD .VIP, .XYZ et .MONSTER, ainsi que les ccTLD .BR, .LY et .TK<a href=\"#_ftn3\"><sup>[3]<\/sup><\/a><sup>,<a href=\"#_ftn4\">[4]<\/a><\/sup>.<\/p>\n\n\n\n<p>Le Tableau 2 montre que le sch\u00e9ma est assez diff\u00e9rent lorsque l\u2019on examine les principaux TLD en fonction de la fr\u00e9quence de menace normalis\u00e9e ; la liste est domin\u00e9e par un ensemble distinct de ccTLD et un plus petit nombre de nouveaux gTLD, mais exclut un grand nombre des TLD les plus populaires pr\u00e9sent\u00e9s pr\u00e9c\u00e9demment.<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td class=\"has-text-align-center\" data-align=\"center\"><strong>TLD<\/strong><strong><\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>Fr\u00e9q. de menace normalis\u00e9e dans l\u2019ens. de donn\u00e9es <\/strong><strong><\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>Nb total de noms de domaine enreg. sous le TLD<\/strong><strong><\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>% du total des cas de phishing<\/strong><strong><\/strong><\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">.GD<\/td><td class=\"has-text-align-center\" data-align=\"center\">1,000<\/td><td class=\"has-text-align-center\" data-align=\"center\">3&nbsp;306<\/td><td class=\"has-text-align-center\" data-align=\"center\">0,05&nbsp;%<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">.GY<\/td><td class=\"has-text-align-center\" data-align=\"center\">0,910<\/td><td class=\"has-text-align-center\" data-align=\"center\">4&nbsp;037<\/td><td class=\"has-text-align-center\" data-align=\"center\">0,05&nbsp;%<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">.MS<\/td><td class=\"has-text-align-center\" data-align=\"center\">0,739<\/td><td class=\"has-text-align-center\" data-align=\"center\">9&nbsp;440<\/td><td class=\"has-text-align-center\" data-align=\"center\">0,10&nbsp;%<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">.ZM<\/td><td class=\"has-text-align-center\" data-align=\"center\">0,531<\/td><td class=\"has-text-align-center\" data-align=\"center\">4&nbsp;838<\/td><td class=\"has-text-align-center\" data-align=\"center\">0,04&nbsp;%<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">.APP<\/td><td class=\"has-text-align-center\" data-align=\"center\">0,377<\/td><td class=\"has-text-align-center\" data-align=\"center\">1&nbsp;155&nbsp;807<\/td><td class=\"has-text-align-center\" data-align=\"center\">6,21&nbsp;%<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">.LY<\/td><td class=\"has-text-align-center\" data-align=\"center\">0,356<\/td><td class=\"has-text-align-center\" data-align=\"center\">25&nbsp;801<\/td><td class=\"has-text-align-center\" data-align=\"center\">0,13&nbsp;%<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">.KE<\/td><td class=\"has-text-align-center\" data-align=\"center\">0,288<\/td><td class=\"has-text-align-center\" data-align=\"center\">165&nbsp;907<\/td><td class=\"has-text-align-center\" data-align=\"center\">0,68&nbsp;%<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">.DEV<\/td><td class=\"has-text-align-center\" data-align=\"center\">0,222<\/td><td class=\"has-text-align-center\" data-align=\"center\">391&nbsp;929<\/td><td class=\"has-text-align-center\" data-align=\"center\">1,24&nbsp;%<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">.PAGE<\/td><td class=\"has-text-align-center\" data-align=\"center\">0,195<\/td><td class=\"has-text-align-center\" data-align=\"center\">368&nbsp;474<\/td><td class=\"has-text-align-center\" data-align=\"center\">1,03&nbsp;%<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">.UG<\/td><td class=\"has-text-align-center\" data-align=\"center\">0,187<\/td><td class=\"has-text-align-center\" data-align=\"center\">10&nbsp;810<\/td><td class=\"has-text-align-center\" data-align=\"center\">0,03&nbsp;%<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">.SN<\/td><td class=\"has-text-align-center\" data-align=\"center\">0,187<\/td><td class=\"has-text-align-center\" data-align=\"center\">9&nbsp;842<\/td><td class=\"has-text-align-center\" data-align=\"center\">0,03&nbsp;%<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">.DO<\/td><td class=\"has-text-align-center\" data-align=\"center\">0,176<\/td><td class=\"has-text-align-center\" data-align=\"center\">30&nbsp;215<\/td><td class=\"has-text-align-center\" data-align=\"center\">0,08&nbsp;%<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">.BD<\/td><td class=\"has-text-align-center\" data-align=\"center\">0,127<\/td><td class=\"has-text-align-center\" data-align=\"center\">37&nbsp;465<\/td><td class=\"has-text-align-center\" data-align=\"center\">0,07&nbsp;%<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">.SBS<\/td><td class=\"has-text-align-center\" data-align=\"center\">0,120<\/td><td class=\"has-text-align-center\" data-align=\"center\">44&nbsp;222<\/td><td class=\"has-text-align-center\" data-align=\"center\">0,08&nbsp;%<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">.NP<\/td><td class=\"has-text-align-center\" data-align=\"center\">0,112<\/td><td class=\"has-text-align-center\" data-align=\"center\">57&nbsp;379<\/td><td class=\"has-text-align-center\" data-align=\"center\">0,09&nbsp;%<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">.SH<\/td><td class=\"has-text-align-center\" data-align=\"center\">0,110<\/td><td class=\"has-text-align-center\" data-align=\"center\">25&nbsp;070<\/td><td class=\"has-text-align-center\" data-align=\"center\">0,04&nbsp;%<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">.NG<\/td><td class=\"has-text-align-center\" data-align=\"center\">0,097<\/td><td class=\"has-text-align-center\" data-align=\"center\">240&nbsp;668<\/td><td class=\"has-text-align-center\" data-align=\"center\">0,33&nbsp;%<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">.IO<\/td><td class=\"has-text-align-center\" data-align=\"center\">0,085<\/td><td class=\"has-text-align-center\" data-align=\"center\">923&nbsp;588<\/td><td class=\"has-text-align-center\" data-align=\"center\">1,11&nbsp;%<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">.ID<\/td><td class=\"has-text-align-center\" data-align=\"center\">0,080<\/td><td class=\"has-text-align-center\" data-align=\"center\">760&nbsp;240<\/td><td class=\"has-text-align-center\" data-align=\"center\">0,86&nbsp;%<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">.SA<\/td><td class=\"has-text-align-center\" data-align=\"center\">0,079<\/td><td class=\"has-text-align-center\" data-align=\"center\">60&nbsp;246<\/td><td class=\"has-text-align-center\" data-align=\"center\">0,07&nbsp;%<\/td><\/tr><\/tbody><\/table><figcaption><strong>Tableau 2&nbsp;: <\/strong>Les vingt premiers TLD repr\u00e9sent\u00e9s dans l\u2019ensemble de donn\u00e9es de phishing de CSC, en fr\u00e9quence de menace normalis\u00e9e.<\/figcaption><\/figure>\n\n\n\n<p>Dans la deuxi\u00e8me partie de ce blog, nous comparons ces r\u00e9sultats avec ceux d\u2019autres ensembles de donn\u00e9es afin d\u2019obtenir une mesure globale de la fr\u00e9quence des menaces associ\u00e9es aux&nbsp;TLD, en tenant compte d\u2019un \u00e9ventail d\u2019utilisations frauduleuses. Nous examinons ensuite les implications en mati\u00e8re de cyber-s\u00e9curit\u00e9, les mesures de m\u00e9diation possibles et les solutions propos\u00e9es par&nbsp;CSC pour vous aider dans ce processus.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<p style=\"font-size:14px\"><a href=\"https:\/\/www.cscdbs.com\/blog\/the-highest-threat-tlds-part-2\/#_ftnref1\">[1]<\/a> <a href=\"https:\/\/interisle.net\/MalwareLandscape2022.pdf\">interisle.net\/MalwareLandscape2022.pdf<\/a><\/p>\n\n\n\n<p style=\"font-size:14px\"><a href=\"https:\/\/www.cscdbs.com\/blog\/the-highest-threat-tlds-part-2\/#_ftnref2\">[2]<\/a> <a href=\"https:\/\/docs.apwg.org\/reports\/apwg_trends_report_q4_2021.pdf\">docs.apwg.org\/reports\/apwg_trends_report_q4_2021.pdf<\/a><\/p>\n\n\n\n<p style=\"font-size:14px\"><a href=\"https:\/\/www.cscdbs.com\/blog\/the-highest-threat-tlds-part-2\/#_ftnref3\">[3]<\/a> <a href=\"https:\/\/info.phishlabs.com\/hubfs\/Agari%20PhishLabs_QTTI%20Report%20-%20May%202022.pdf\">info.phishlabs.com\/hubfs\/Agari%20PhishLabs_QTTI%20Report%20-%20May%202022.pdf<\/a> <\/p>\n\n\n\n<p style=\"font-size:14px\"><a href=\"https:\/\/www.cscdbs.com\/blog\/the-highest-threat-tlds-part-2\/#_ftnref4\">[4]<\/a> <a href=\"https:\/\/www.tripwire.com\/state-of-security\/security-data-protection\/phishing-threat-trends-intelligence-report\/\">tripwire.com\/state-of-security\/security-data-protection\/phishing-threat-trends-intelligence-report\/<\/a><\/p>\n\n\n\n<p style=\"font-size:14px\"><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Les noms de domaine sont des adresses web qui se pr\u00e9sentent sous forme directement lisible, qui permettent de nommer des sites web et de cr\u00e9er des adresses mail. Un nom de domaine est constitu\u00e9 de deux \u00e9l\u00e9ments&nbsp;: le nom de deuxi\u00e8me niveau (g\u00e9n\u00e9ralement, le nom d\u2019une marque et\/ou un ou plusieurs mots cl\u00e9s pertinents) et [&hellip;]<\/p>\n","protected":false},"author":17,"featured_media":10467,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[545],"tags":[],"class_list":["post-11881","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-fr"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Les TLD \u00e0 hauts risques \u2013 1e partie | CSC<\/title>\n<meta name=\"description\" content=\"Les noms de domaine sont des adresses web qui se pr\u00e9sentent sous forme directement lisible, qui permettent de nommer des sites web et de cr\u00e9er des\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cscdbs.com\/blog\/les-tld-a-hauts-risques-1e-partie\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Les TLD \u00e0 hauts risques \u2013 1e partie | CSC\" \/>\n<meta property=\"og:description\" content=\"Les noms de domaine sont des adresses web qui se pr\u00e9sentent sous forme directement lisible, qui permettent de nommer des sites web et de cr\u00e9er des\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cscdbs.com\/blog\/les-tld-a-hauts-risques-1e-partie\/\" \/>\n<meta property=\"og:site_name\" content=\"Digital Brand Services Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/corporationserviceco\" \/>\n<meta property=\"article:published_time\" content=\"2022-10-27T12:22:24+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-15T15:03:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2021\/11\/cscdbsblog_1000x55046.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"550\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Arielle Wallace\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@cscdbs\" \/>\n<meta name=\"twitter:site\" content=\"@cscdbs\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Arielle Wallace\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/les-tld-a-hauts-risques-1e-partie\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/les-tld-a-hauts-risques-1e-partie\\\/\"},\"author\":{\"name\":\"Arielle Wallace\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/person\\\/9f28d3ffdbe4e71bc030903c8037afe8\"},\"headline\":\"Les TLD \u00e0 hauts risques \u2013 1e partie\",\"datePublished\":\"2022-10-27T12:22:24+00:00\",\"dateModified\":\"2025-10-15T15:03:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/les-tld-a-hauts-risques-1e-partie\\\/\"},\"wordCount\":1616,\"publisher\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/les-tld-a-hauts-risques-1e-partie\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2021\\\/11\\\/cscdbsblog_1000x55046.jpg\",\"articleSection\":[\"Fran\u00e7ais\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/les-tld-a-hauts-risques-1e-partie\\\/\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/les-tld-a-hauts-risques-1e-partie\\\/\",\"name\":\"Les TLD \u00e0 hauts risques \u2013 1e partie | CSC\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/les-tld-a-hauts-risques-1e-partie\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/les-tld-a-hauts-risques-1e-partie\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2021\\\/11\\\/cscdbsblog_1000x55046.jpg\",\"datePublished\":\"2022-10-27T12:22:24+00:00\",\"dateModified\":\"2025-10-15T15:03:10+00:00\",\"description\":\"Les noms de domaine sont des adresses web qui se pr\u00e9sentent sous forme directement lisible, qui permettent de nommer des sites web et de cr\u00e9er des\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/les-tld-a-hauts-risques-1e-partie\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/les-tld-a-hauts-risques-1e-partie\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/les-tld-a-hauts-risques-1e-partie\\\/#primaryimage\",\"url\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2021\\\/11\\\/cscdbsblog_1000x55046.jpg\",\"contentUrl\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2021\\\/11\\\/cscdbsblog_1000x55046.jpg\",\"width\":1000,\"height\":550},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/les-tld-a-hauts-risques-1e-partie\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Les TLD \u00e0 hauts risques \u2013 1e partie\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\",\"name\":\"Digital Brand Services Blog\",\"description\":\"Domains, new gTLDs, brand protection, security &amp; trademark news\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\",\"name\":\"CSC Digital Brand Services\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2018\\\/06\\\/cropped-dbs_small.gif\",\"contentUrl\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2018\\\/06\\\/cropped-dbs_small.gif\",\"width\":200,\"height\":200,\"caption\":\"CSC Digital Brand Services\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/corporationserviceco\",\"https:\\\/\\\/x.com\\\/cscdbs\",\"https:\\\/\\\/www.linkedin.com\\\/showcase\\\/csc-digital-brand-services\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/person\\\/9f28d3ffdbe4e71bc030903c8037afe8\",\"name\":\"Arielle Wallace\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Les TLD \u00e0 hauts risques \u2013 1e partie | CSC","description":"Les noms de domaine sont des adresses web qui se pr\u00e9sentent sous forme directement lisible, qui permettent de nommer des sites web et de cr\u00e9er des","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cscdbs.com\/blog\/les-tld-a-hauts-risques-1e-partie\/","og_locale":"en_US","og_type":"article","og_title":"Les TLD \u00e0 hauts risques \u2013 1e partie | CSC","og_description":"Les noms de domaine sont des adresses web qui se pr\u00e9sentent sous forme directement lisible, qui permettent de nommer des sites web et de cr\u00e9er des","og_url":"https:\/\/www.cscdbs.com\/blog\/les-tld-a-hauts-risques-1e-partie\/","og_site_name":"Digital Brand Services Blog","article_publisher":"https:\/\/www.facebook.com\/corporationserviceco","article_published_time":"2022-10-27T12:22:24+00:00","article_modified_time":"2025-10-15T15:03:10+00:00","og_image":[{"width":1000,"height":550,"url":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2021\/11\/cscdbsblog_1000x55046.jpg","type":"image\/jpeg"}],"author":"Arielle Wallace","twitter_card":"summary_large_image","twitter_creator":"@cscdbs","twitter_site":"@cscdbs","twitter_misc":{"Written by":"Arielle Wallace","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cscdbs.com\/blog\/les-tld-a-hauts-risques-1e-partie\/#article","isPartOf":{"@id":"https:\/\/www.cscdbs.com\/blog\/les-tld-a-hauts-risques-1e-partie\/"},"author":{"name":"Arielle Wallace","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/person\/9f28d3ffdbe4e71bc030903c8037afe8"},"headline":"Les TLD \u00e0 hauts risques \u2013 1e partie","datePublished":"2022-10-27T12:22:24+00:00","dateModified":"2025-10-15T15:03:10+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cscdbs.com\/blog\/les-tld-a-hauts-risques-1e-partie\/"},"wordCount":1616,"publisher":{"@id":"https:\/\/www.cscdbs.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.cscdbs.com\/blog\/les-tld-a-hauts-risques-1e-partie\/#primaryimage"},"thumbnailUrl":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2021\/11\/cscdbsblog_1000x55046.jpg","articleSection":["Fran\u00e7ais"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.cscdbs.com\/blog\/les-tld-a-hauts-risques-1e-partie\/","url":"https:\/\/www.cscdbs.com\/blog\/les-tld-a-hauts-risques-1e-partie\/","name":"Les TLD \u00e0 hauts risques \u2013 1e partie | CSC","isPartOf":{"@id":"https:\/\/www.cscdbs.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cscdbs.com\/blog\/les-tld-a-hauts-risques-1e-partie\/#primaryimage"},"image":{"@id":"https:\/\/www.cscdbs.com\/blog\/les-tld-a-hauts-risques-1e-partie\/#primaryimage"},"thumbnailUrl":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2021\/11\/cscdbsblog_1000x55046.jpg","datePublished":"2022-10-27T12:22:24+00:00","dateModified":"2025-10-15T15:03:10+00:00","description":"Les noms de domaine sont des adresses web qui se pr\u00e9sentent sous forme directement lisible, qui permettent de nommer des sites web et de cr\u00e9er des","breadcrumb":{"@id":"https:\/\/www.cscdbs.com\/blog\/les-tld-a-hauts-risques-1e-partie\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cscdbs.com\/blog\/les-tld-a-hauts-risques-1e-partie\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cscdbs.com\/blog\/les-tld-a-hauts-risques-1e-partie\/#primaryimage","url":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2021\/11\/cscdbsblog_1000x55046.jpg","contentUrl":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2021\/11\/cscdbsblog_1000x55046.jpg","width":1000,"height":550},{"@type":"BreadcrumbList","@id":"https:\/\/www.cscdbs.com\/blog\/les-tld-a-hauts-risques-1e-partie\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cscdbs.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Les TLD \u00e0 hauts risques \u2013 1e partie"}]},{"@type":"WebSite","@id":"https:\/\/www.cscdbs.com\/blog\/#website","url":"https:\/\/www.cscdbs.com\/blog\/","name":"Digital Brand Services Blog","description":"Domains, new gTLDs, brand protection, security &amp; trademark news","publisher":{"@id":"https:\/\/www.cscdbs.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cscdbs.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cscdbs.com\/blog\/#organization","name":"CSC Digital Brand Services","url":"https:\/\/www.cscdbs.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2018\/06\/cropped-dbs_small.gif","contentUrl":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2018\/06\/cropped-dbs_small.gif","width":200,"height":200,"caption":"CSC Digital Brand Services"},"image":{"@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/corporationserviceco","https:\/\/x.com\/cscdbs","https:\/\/www.linkedin.com\/showcase\/csc-digital-brand-services\/"]},{"@type":"Person","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/person\/9f28d3ffdbe4e71bc030903c8037afe8","name":"Arielle Wallace"}]}},"_links":{"self":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/11881","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/comments?post=11881"}],"version-history":[{"count":16,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/11881\/revisions"}],"predecessor-version":[{"id":14434,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/11881\/revisions\/14434"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/media\/10467"}],"wp:attachment":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/media?parent=11881"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/categories?post=11881"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/tags?post=11881"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}