{"id":12144,"date":"2023-01-18T03:00:00","date_gmt":"2023-01-18T08:00:00","guid":{"rendered":"https:\/\/www.cscdbs.com\/blog\/?p=12144"},"modified":"2026-01-15T08:17:51","modified_gmt":"2026-01-15T13:17:51","slug":"les-tld-les-plus-dangereux-2eme-partie","status":"publish","type":"post","link":"https:\/\/www.cscdbs.com\/blog\/les-tld-les-plus-dangereux-2eme-partie\/","title":{"rendered":"Les TLD les plus dangereux \u2013 2\u00e8me partie"},"content":{"rendered":"\n<p>Dans le premier article de ce blog en deux parties, nous avions analys\u00e9 les donn\u00e9es recueillies par les services de protection contre la fraude de <strong>CSC<\/strong> pour mettre en \u00e9vidence la fr\u00e9quence d\u2019utilisation de certains noms de domaine pour des activit\u00e9s de phishing parmi les extensions de premier niveau (TLD \u2013 aussi appel\u00e9s \u00ab&nbsp;extensions de noms de domaine&nbsp;\u00bb). Dans ce second article, nous analysons plusieurs ensembles de donn\u00e9es afin de d\u00e9terminer quels sont les&nbsp;TLD pr\u00e9sentant le plus de risque, en fonction de la fr\u00e9quence d\u2019utilisation de certains noms de domaine pour perp\u00e9trer divers cybercrimes.<\/p>\n\n\n\n<p>Pour cet examen plus pouss\u00e9, nous passons en revue les ensembles de donn\u00e9es suivants&nbsp;:<\/p>\n\n\n\n\n\n<ol class=\"wp-block-list\">\n<li>\u00c0 partir du site <strong>Spamhaus<\/strong>\u00a0: les 10\u00a0TLD les plus d\u00e9tourn\u00e9s<a id=\"_ftnref1\" href=\"#_ftn1\"><sup>[1]<\/sup><\/a>. Spamhaus Project recense ces TLD dans sa \u00ab Blocking list \u00bb, qui identifie les noms de domaine ayant mauvaise r\u00e9putation (g\u00e9n\u00e9ralement, du fait de leur association avec des techniques de spamming ou des logiciels malveillants).<\/li>\n\n\n\n<li>\u00c0 partir du site de <strong style=\"font-size: revert;color: initial\">Netcraft<\/strong><span style=\"font-size: revert;color: initial\">\u00a0: les 50\u00a0TLD<\/span><sup style=\"color: initial\"><a id=\"_ftnref2\" href=\"#_ftn2\">[2]<\/a> <\/sup><span style=\"font-size: revert;color: initial\">qui affichent la plus forte proportion d\u2019incidents de cybercriminalit\u00e9 li\u00e9s \u00e0 des sites actifs, g\u00e9n\u00e9ralement en rapport avec du phishing ou des logiciels malveillants.<\/span><\/li>\n\n\n\n<li>\u00c0 partir du site de <strong style=\"font-size: revert;color: initial\">Palo Alto Network<\/strong><span style=\"font-size: revert;color: initial\">\u00a0: les 10\u00a0TLD<\/span><a id=\"_ftnref3\" style=\"font-size: revert\" href=\"#_ftn3\"><sup>[3]<\/sup><\/a><span style=\"font-size: revert;color: initial\"> qui affichent le taux le plus \u00e9lev\u00e9 de noms de domaine malveillants, qui h\u00e9bergent quatre cat\u00e9gories de contenu nuisible (logiciels malveillants, technique de phishing, infrastructure Command and Control [C&amp;C], logiciels grayware) et exprim\u00e9s en \u00e9cart m\u00e9dian absolu (MAD).<\/span><\/li>\n\n\n\n<li>Les donn\u00e9es des services de protection contre la fraude de <strong style=\"font-size: revert;color: initial\">CSC<\/strong><span style=\"font-size: revert;color: initial\">, comme nous l\u2019avons mentionn\u00e9 dans la 1\u00e8re\u00a0partie de ce billet.<\/span><\/li>\n<\/ol>\n\n\n\n<p><\/p>\n\n\n\n\n\n<p>Chaque ensemble de donn\u00e9es mesure la proportion de noms de domaine sous chaque&nbsp;TLD qui est consid\u00e9r\u00e9 comme associ\u00e9 \u00e0 du contenu dangereux<a id=\"_ftnref4\" href=\"#_ftn4\"><sup>[4]<\/sup><\/a>. Pour les ensembles de donn\u00e9es&nbsp;1, 2 et 3, les proportions sont exprim\u00e9es en nombre total de noms de domaine analys\u00e9s pour le&nbsp;TLD en question.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<p><strong><em><u>M\u00e9thodologie<\/u>&nbsp;: Afin de faciliter la comparaison, la fr\u00e9quence de menace pour chaque&nbsp;TLD dans chaque ensemble de donn\u00e9es est normalis\u00e9e, pour que pour chaque cas, la valeur du TLD le plus risqu\u00e9 soit de&nbsp;1. La fr\u00e9quence de menace globale pour un&nbsp;TLD est ensuite calcul\u00e9e en tant que moyenne des coefficients normalis\u00e9s pour tous les ensembles de donn\u00e9es dans lequel ce&nbsp;TLD appara\u00eet. Nous avons exclu des r\u00e9sultats les&nbsp;TLD uniquement repr\u00e9sent\u00e9s dans les ensembles de donn\u00e9es de CSC et pour lesquels moins de 50&nbsp;cas de phishing avaient \u00e9t\u00e9 signal\u00e9s.<\/em><\/strong><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Analyse et discussion<\/strong><\/h2>\n\n\n\n<p>La m\u00e9thodologie, ci-dessus, a permis d\u2019obtenir la liste suivante (Tableau&nbsp;1) pour les 30&nbsp;premiers&nbsp;TLD \u00e0 haut risque, class\u00e9s en fonction de la fr\u00e9quence de menace normalis\u00e9e globale.<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td class=\"has-text-align-center\" data-align=\"center\"><strong>TLD<\/strong><strong><\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>Fr\u00e9quence de menace<\/strong><strong><\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>Op\u00e9rateur<\/strong><strong><\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>de registre<a id=\"_ftnref1\" href=\"#_ftn1\"><strong><sup>[5]<\/sup><\/strong><\/a><\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>R\u00e9gion (Pays) \/ Type<\/strong><strong><\/strong><\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">.CI<\/td><td class=\"has-text-align-center\" data-align=\"center\">1,000<\/td><td class=\"has-text-align-center\" data-align=\"center\">Autorit\u00e9 de R\u00e9gulation des T\u00e9l\u00e9communications \/ TIC de C\u00f4te d\u2019lvoire (ARTCI)<\/td><td class=\"has-text-align-center\" data-align=\"center\">Autorit\u00e9 de R\u00e9gulation des T\u00e9l\u00e9communications \/ TIC de C\u00f4te d\u2019lvoire (ARTCI)<\/td><td class=\"has-text-align-center\" data-align=\"center\">Afrique (C\u00f4te d\u2019Ivoire)<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">.ZW<\/td><td class=\"has-text-align-center\" data-align=\"center\">1,000<\/td><td class=\"has-text-align-center\" data-align=\"center\">Postal and Telecommunications Regulatory Authority of Zimbabwe (POTRAZ)<\/td><td class=\"has-text-align-center\" data-align=\"center\">TelOne Pvt Ltd<\/td><td class=\"has-text-align-center\" data-align=\"center\">Afrique (Zimbabwe)<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">.SX<\/td><td class=\"has-text-align-center\" data-align=\"center\">0,945<\/td><td class=\"has-text-align-center\" data-align=\"center\">SX Registry SA B.V.<\/td><td class=\"has-text-align-center\" data-align=\"center\">Autorit\u00e9 canadienne pour les enregistrements Internet (ACEI)<\/td><td class=\"has-text-align-center\" data-align=\"center\">Cara\u00efbes (Saint-Martin)<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">.MW<\/td><td class=\"has-text-align-center\" data-align=\"center\">0,862<\/td><td class=\"has-text-align-center\" data-align=\"center\">Malawi Sustainable Development Network Programme<\/td><td class=\"has-text-align-center\" data-align=\"center\">Malawi Sustainable Development Network Programme<\/td><td class=\"has-text-align-center\" data-align=\"center\">Afrique (Malawi)<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">.AM<\/td><td class=\"has-text-align-center\" data-align=\"center\">0,608<\/td><td class=\"has-text-align-center\" data-align=\"center\">Organisation non gouvernementale \u00ab&nbsp;Internet Society&nbsp;\u00bb<\/td><td class=\"has-text-align-center\" data-align=\"center\">Organisation non gouvernementale \u00ab&nbsp;Internet Society&nbsp;\u00bb<\/td><td class=\"has-text-align-center\" data-align=\"center\">Asie (Arm\u00e9nie)<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">.DATE*<\/td><td class=\"has-text-align-center\" data-align=\"center\">0,506<\/td><td class=\"has-text-align-center\" data-align=\"center\">dot Date Limited<\/td><td class=\"has-text-align-center\" data-align=\"center\">Registre GoDaddy<\/td><td class=\"has-text-align-center\" data-align=\"center\">Nouveaux gTLD<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">.CD<\/td><td class=\"has-text-align-center\" data-align=\"center\">0,391<\/td><td class=\"has-text-align-center\" data-align=\"center\">Office Congolais des Postes et T\u00e9l\u00e9communications (OCPT)<\/td><td class=\"has-text-align-center\" data-align=\"center\">Office Congolais des Postes et T\u00e9l\u00e9communications (OCPT)<\/td><td class=\"has-text-align-center\" data-align=\"center\">Afrique (R\u00e9p. d\u00e9mocratique du Congo)<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">.KE<\/td><td class=\"has-text-align-center\" data-align=\"center\">0,381<\/td><td class=\"has-text-align-center\" data-align=\"center\">Kenya Network Information Center (KeNIC)<\/td><td class=\"has-text-align-center\" data-align=\"center\">Kenya Network Information Center (KeNIC)<\/td><td class=\"has-text-align-center\" data-align=\"center\">Afrique (Kenya)<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">.APP*<\/td><td class=\"has-text-align-center\" data-align=\"center\">0,377<\/td><td class=\"has-text-align-center\" data-align=\"center\">Charleston Road Registry Inc.<\/td><td class=\"has-text-align-center\" data-align=\"center\">Google Inc<\/td><td class=\"has-text-align-center\" data-align=\"center\">Nouveaux gTLD<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">.BID*<\/td><td class=\"has-text-align-center\" data-align=\"center\">0,361<\/td><td class=\"has-text-align-center\" data-align=\"center\">dot Bid Limited<\/td><td class=\"has-text-align-center\" data-align=\"center\">Registre GoDaddy<\/td><td class=\"has-text-align-center\" data-align=\"center\">Nouveaux gTLD<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">.LY<\/td><td class=\"has-text-align-center\" data-align=\"center\">0,356<\/td><td class=\"has-text-align-center\" data-align=\"center\">General Post and Telecommunication Company<\/td><td class=\"has-text-align-center\" data-align=\"center\">Libya Telecom and Technology<\/td><td class=\"has-text-align-center\" data-align=\"center\">Afrique (Libye)<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">.BD<\/td><td class=\"has-text-align-center\" data-align=\"center\">0,351<\/td><td class=\"has-text-align-center\" data-align=\"center\">Posts and Telecommunications Division<\/td><td class=\"has-text-align-center\" data-align=\"center\">Bangladesh Telecommunications Company Limited (BTCL)<\/td><td class=\"has-text-align-center\" data-align=\"center\">Asie (Bangladesh)<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">.SURF*<\/td><td class=\"has-text-align-center\" data-align=\"center\">0,325<\/td><td class=\"has-text-align-center\" data-align=\"center\">Registry Services, LLC<\/td><td class=\"has-text-align-center\" data-align=\"center\">Registre GoDaddy<\/td><td class=\"has-text-align-center\" data-align=\"center\">Nouveaux gTLD<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">.SBS*<\/td><td class=\"has-text-align-center\" data-align=\"center\">0,250<\/td><td class=\"has-text-align-center\" data-align=\"center\">ShortDot<\/td><td class=\"has-text-align-center\" data-align=\"center\">CentralNic<\/td><td class=\"has-text-align-center\" data-align=\"center\">Nouveaux gTLD<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">.PW<\/td><td class=\"has-text-align-center\" data-align=\"center\">0,240<\/td><td class=\"has-text-align-center\" data-align=\"center\">Micronesia Investment and Development Corporation<\/td><td class=\"has-text-align-center\" data-align=\"center\">Radix FZC<\/td><td class=\"has-text-align-center\" data-align=\"center\">Asie (Palaos)<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">.DEV*<\/td><td class=\"has-text-align-center\" data-align=\"center\">0,222<\/td><td class=\"has-text-align-center\" data-align=\"center\">Charleston Road Registry Inc.<\/td><td class=\"has-text-align-center\" data-align=\"center\">Google Inc<\/td><td class=\"has-text-align-center\" data-align=\"center\">Nouveaux gTLD<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">.QUEST*<\/td><td class=\"has-text-align-center\" data-align=\"center\">0,209<\/td><td class=\"has-text-align-center\" data-align=\"center\">XYZ.COM LLC<\/td><td class=\"has-text-align-center\" data-align=\"center\">CentralNic<\/td><td class=\"has-text-align-center\" data-align=\"center\">Nouveaux gTLD<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">.TOP*<\/td><td class=\"has-text-align-center\" data-align=\"center\">0,196<\/td><td class=\"has-text-align-center\" data-align=\"center\">Jiangsu Bangning Science and Technology Co., Ltd.<\/td><td class=\"has-text-align-center\" data-align=\"center\">Jiangsu Bangning Science and Technology Co., Ltd.<\/td><td class=\"has-text-align-center\" data-align=\"center\">Nouveaux gTLD<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">.PAGE*<\/td><td class=\"has-text-align-center\" data-align=\"center\">0,195<\/td><td class=\"has-text-align-center\" data-align=\"center\">Charleston Road Registry Inc.<\/td><td class=\"has-text-align-center\" data-align=\"center\">Google Inc<\/td><td class=\"has-text-align-center\" data-align=\"center\">Nouveaux gTLD<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">.GQ<\/td><td class=\"has-text-align-center\" data-align=\"center\">0,192<\/td><td class=\"has-text-align-center\" data-align=\"center\">GETESA<\/td><td class=\"has-text-align-center\" data-align=\"center\">Equatorial Guinea Domains B.V. (Freenom)<\/td><td class=\"has-text-align-center\" data-align=\"center\">Afrique (Guin\u00e9e \u00e9quatoriale)<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">.CF<\/td><td class=\"has-text-align-center\" data-align=\"center\">0,168<\/td><td class=\"has-text-align-center\" data-align=\"center\">Societe Centrafricaine de Telecommunications (SOCATEL)<\/td><td class=\"has-text-align-center\" data-align=\"center\">Centrafrique TLD B.V. (Freenom)<\/td><td class=\"has-text-align-center\" data-align=\"center\">Africa (Central African Republic)<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">.GA<\/td><td class=\"has-text-align-center\" data-align=\"center\">0,164<\/td><td class=\"has-text-align-center\" data-align=\"center\">Agence Nationale des Infrastructures Num\u00e9riques et des Fr\u00e9quences (ANINF)<\/td><td class=\"has-text-align-center\" data-align=\"center\">Agence Nationale des Infrastructures Num\u00e9riques et des Fr\u00e9quences (ANINF) (Freenom)<\/td><td class=\"has-text-align-center\" data-align=\"center\">Afrique (Gabon)<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">.ML<\/td><td class=\"has-text-align-center\" data-align=\"center\">0,157<\/td><td class=\"has-text-align-center\" data-align=\"center\">Agence des Technologies de l\u2019Information et de la Communication<\/td><td class=\"has-text-align-center\" data-align=\"center\">Mali Dili B.V. (Freenom)<\/td><td class=\"has-text-align-center\" data-align=\"center\">Afrique (Mali)<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">.BUZZ*<\/td><td class=\"has-text-align-center\" data-align=\"center\">0,149<\/td><td class=\"has-text-align-center\" data-align=\"center\">DOTSTRATEGY CO.<\/td><td class=\"has-text-align-center\" data-align=\"center\">Registre GoDaddy<\/td><td class=\"has-text-align-center\" data-align=\"center\">Nouveaux gTLD<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">.CYOU*<\/td><td class=\"has-text-align-center\" data-align=\"center\">0,141<\/td><td class=\"has-text-align-center\" data-align=\"center\">ShortDot<\/td><td class=\"has-text-align-center\" data-align=\"center\">CentralNic<\/td><td class=\"has-text-align-center\" data-align=\"center\">Nouveaux gTLD<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">.CN<\/td><td class=\"has-text-align-center\" data-align=\"center\">0,130<\/td><td class=\"has-text-align-center\" data-align=\"center\">CNNIC<\/td><td class=\"has-text-align-center\" data-align=\"center\">CNNIC<\/td><td class=\"has-text-align-center\" data-align=\"center\">Asie (Chine)<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">.MONSTER*<\/td><td class=\"has-text-align-center\" data-align=\"center\">0,106<\/td><td class=\"has-text-align-center\" data-align=\"center\">XYZ.COM LLC<\/td><td class=\"has-text-align-center\" data-align=\"center\">CentralNic<\/td><td class=\"has-text-align-center\" data-align=\"center\">Nouveaux gTLD<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">.BAR*<\/td><td class=\"has-text-align-center\" data-align=\"center\">0,104<\/td><td class=\"has-text-align-center\" data-align=\"center\">Punto 2012 Sociedad An\u00f3nima Promotora de Inversi\u00f3n de Capital Variable<\/td><td class=\"has-text-align-center\" data-align=\"center\">CentralNic<\/td><td class=\"has-text-align-center\" data-align=\"center\">Nouveaux gTLD<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">.HOST*<\/td><td class=\"has-text-align-center\" data-align=\"center\">0,101<\/td><td class=\"has-text-align-center\" data-align=\"center\">Radix FZC<\/td><td class=\"has-text-align-center\" data-align=\"center\">CentralNic<\/td><td class=\"has-text-align-center\" data-align=\"center\">Nouveaux gTLD<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">.IO<\/td><td class=\"has-text-align-center\" data-align=\"center\">0,085<\/td><td class=\"has-text-align-center\" data-align=\"center\">Internet Computer Bureau Limited<\/td><td class=\"has-text-align-center\" data-align=\"center\">Internet Computer Bureau Limited<\/td><td class=\"has-text-align-center\" data-align=\"center\">Asie (Territoire britannique de l\u2019oc\u00e9an Indien)<\/td><\/tr><\/tbody><\/table><figcaption class=\"wp-element-caption\">*Extensions pour lesquelles aucun nom de domaine client n\u2019est actuellement g\u00e9r\u00e9 par CSC<br \/><strong>Tableau 1&nbsp;: <\/strong>Les 30&nbsp;premiers TLD affichant les plus hautes fr\u00e9quences de menace globales.<\/figcaption><\/figure>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Le Tableau 2 montre les ensembles de donn\u00e9es dans lesquels appara\u00eet chacun des 30 principaux TLD.<\/p>\n\n\n<figure class=\"wp-block-table aligncenter\"><table><tbody><tr><td class=\"has-text-align-center\" data-align=\"center\"><strong>TLD<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>Spamhaus<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>Netcraft<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>Palo Alto Networks<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>CSC<\/strong><\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">.CI<\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>\u2713<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>\u2713<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\">\ufeff<\/td><td class=\"has-text-align-center\" data-align=\"center\">&nbsp;<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">.ZW<\/td><td class=\"has-text-align-center\" data-align=\"center\">\ufeff<\/td><td class=\"has-text-align-center\" data-align=\"center\">&nbsp;<\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>\u2713<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\">&nbsp;<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">.SX<\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>\u2713<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\">&nbsp;<\/td><td class=\"has-text-align-center\" data-align=\"center\">&nbsp;<\/td><td class=\"has-text-align-center\" data-align=\"center\">&nbsp;<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">.MW<\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>\u2713<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>\u2713<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\">&nbsp;<\/td><td class=\"has-text-align-center\" data-align=\"center\">&nbsp;<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">.AM<\/td><td class=\"has-text-align-center\" data-align=\"center\">&nbsp;<\/td><td class=\"has-text-align-center\" data-align=\"center\">&nbsp;<\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>\u2713<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\">&nbsp;<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">.DATE<\/td><td class=\"has-text-align-center\" data-align=\"center\">&nbsp;<\/td><td class=\"has-text-align-center\" data-align=\"center\">&nbsp;<\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>\u2713<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\">&nbsp;<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">.CD<\/td><td class=\"has-text-align-center\" data-align=\"center\">&nbsp;<\/td><td class=\"has-text-align-center\" data-align=\"center\">&nbsp;<\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>\u2713<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\">&nbsp;<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">.KE<\/td><td class=\"has-text-align-center\" data-align=\"center\">&nbsp;<\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>\u2713<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>\u2713<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>\u2713<\/strong><\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">.APP<\/td><td class=\"has-text-align-center\" data-align=\"center\">&nbsp;<\/td><td class=\"has-text-align-center\" data-align=\"center\">&nbsp;<\/td><td class=\"has-text-align-center\" data-align=\"center\">\ufeff<\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>\u2713<\/strong><\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">.BID<\/td><td class=\"has-text-align-center\" data-align=\"center\">&nbsp;<\/td><td class=\"has-text-align-center\" data-align=\"center\">&nbsp;<\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>\u2713<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\">\ufeff<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">.LY<\/td><td class=\"has-text-align-center\" data-align=\"center\">&nbsp;<\/td><td class=\"has-text-align-center\" data-align=\"center\">&nbsp;<\/td><td class=\"has-text-align-center\" data-align=\"center\">\ufeff<\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>\u2713<\/strong><\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">.BD<\/td><td class=\"has-text-align-center\" data-align=\"center\">&nbsp;<\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>\u2713<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>\u2713<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>\u2713<\/strong><\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">.SURF<\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>\u2713<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>\u2713<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\">&nbsp;<\/td><td class=\"has-text-align-center\" data-align=\"center\">&nbsp;<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">.SBS<\/td><td class=\"has-text-align-center\" data-align=\"center\">&nbsp;<\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>\u2713<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>\u2713<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>\u2713<\/strong><\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">.PW<\/td><td class=\"has-text-align-center\" data-align=\"center\">&nbsp;<\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>\u2713<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>\u2713<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\">\ufeff<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">.DEV<\/td><td class=\"has-text-align-center\" data-align=\"center\">&nbsp;<\/td><td class=\"has-text-align-center\" data-align=\"center\">&nbsp;<\/td><td class=\"has-text-align-center\" data-align=\"center\">&nbsp;<\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>\u2713<\/strong><\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">.QUEST<\/td><td class=\"has-text-align-center\" data-align=\"center\">\ufeff<\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>\u2713<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>\u2713<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\">\ufeff<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">.TOP<\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>\u2713<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>\u2713<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\">&nbsp;<\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>\u2713<\/strong><\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">.PAGE<\/td><td class=\"has-text-align-center\" data-align=\"center\">\ufeff<\/td><td class=\"has-text-align-center\" data-align=\"center\">&nbsp;<\/td><td class=\"has-text-align-center\" data-align=\"center\">&nbsp;<\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>\u2713<\/strong><\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">.GQ<\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>\u2713<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\">&nbsp;<\/td><td class=\"has-text-align-center\" data-align=\"center\">&nbsp;<\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>\u2713<\/strong><\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">.CF<\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>\u2713<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\">&nbsp;<\/td><td class=\"has-text-align-center\" data-align=\"center\">&nbsp;<\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>\u2713<\/strong><\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">.GA<\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>\u2713<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\">&nbsp;<\/td><td class=\"has-text-align-center\" data-align=\"center\">&nbsp;<\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>\u2713<\/strong><\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">.ML<\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>\u2713<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\">&nbsp;<\/td><td class=\"has-text-align-center\" data-align=\"center\">&nbsp;<\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>\u2713<\/strong><\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">.BUZZ<\/td><td class=\"has-text-align-center\" data-align=\"center\">&nbsp;<\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>\u2713<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\">&nbsp;<\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>\u2713<\/strong><\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">.CYOU<\/td><td class=\"has-text-align-center\" data-align=\"center\">&nbsp;<\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>\u2713<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\">&nbsp;<\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>\u2713<\/strong><\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">.CN<\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>\u2713<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>\u2713<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\">&nbsp;<\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>\u2713<\/strong><\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">.MONSTER<\/td><td class=\"has-text-align-center\" data-align=\"center\">&nbsp;<\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>\u2713<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\">&nbsp;<\/td><td class=\"has-text-align-center\" data-align=\"center\">&nbsp;<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">.BAR<\/td><td class=\"has-text-align-center\" data-align=\"center\">&nbsp;<\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>\u2713<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\">&nbsp;<\/td><td class=\"has-text-align-center\" data-align=\"center\">&nbsp;<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">.HOST<\/td><td class=\"has-text-align-center\" data-align=\"center\">&nbsp;<\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>\u2713<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\">&nbsp;<\/td><td class=\"has-text-align-center\" data-align=\"center\">&nbsp;<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">.IO<\/td><td class=\"has-text-align-center\" data-align=\"center\">&nbsp;<\/td><td class=\"has-text-align-center\" data-align=\"center\">\ufeff<\/td><td class=\"has-text-align-center\" data-align=\"center\">&nbsp;<\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>\u2713<\/strong><\/td><\/tr><\/tbody><\/table><figcaption class=\"wp-element-caption\"><strong>Tableau 2&nbsp;: <\/strong>Ensembles de donn\u00e9es dans lesquels appara\u00eet chacun des 30&nbsp;premiers TLD class\u00e9s par fr\u00e9quence de menace globale.<\/figcaption><\/figure>\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Il est int\u00e9ressant de noter que cette liste est domin\u00e9e par des extensions des pays d\u2019Afrique, d\u2019Asie et des Cara\u00efbes, ainsi que par plusieurs <strong>nouveaux<\/strong> gTLD. Ce dernier point confirme l\u2019observation selon laquelle les nouveaux gTLD sont beaucoup plus susceptibles d\u2019h\u00e9berger du contenu malveillant que les anciens&nbsp;TLD, bien qu\u2019ils b\u00e9n\u00e9ficient de proc\u00e9dures am\u00e9lior\u00e9es en mati\u00e8re de d\u00e9tection des infractions<a id=\"_ftnref1\" href=\"#_ftn1\"><sup>[6]<\/sup><\/a>. Pr\u00e8s de la moiti\u00e9 des&nbsp;TLD de cette liste sont g\u00e9r\u00e9s par trois op\u00e9rateurs uniquement, \u00e0 savoir CentralNic (six TLD), Freenom (quatre) et GoDaddy Registry (quatre).<\/p>\n\n\n\n<p>Le rapport complet sur l\u2019\u00e9tat des attaques de phishing au niveau mondial (\u00ab&nbsp;Global Phishing Survey&nbsp;\u00bb)<a id=\"_ftnref2\" href=\"#_ftn2\"><sup>[7]<\/sup><\/a> publi\u00e9 en&nbsp;2017 par le groupe de travail anti-phishing (APWG), qui analysait les&nbsp;TLD les plus fr\u00e9quemment associ\u00e9s aux noms de domaine h\u00e9bergeant du phishing, relevait d\u00e9j\u00e0 des tendances similaires (bien que le paysage des menaces ait quelque peu chang\u00e9 depuis&nbsp;2017). Les 10&nbsp;principaux TLD en fr\u00e9quence de noms de domaine li\u00e9s au phishing incluaient en majorit\u00e9 des ccTLD de pays d\u2019Afrique et d\u2019Asie, avec trois des cinq premiers&nbsp;TLD (.ML, .BD et .KE) apparaissant dans notre liste des 30&nbsp;TLD les plus dangereux.<\/p>\n\n\n\n<p>L\u2019analyse met \u00e9galement en \u00e9vidence les points suivants&nbsp;:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Certains des&nbsp;TLD de cette liste ont une importance particuli\u00e8re&nbsp;:<ul><li><strong>.LY<\/strong> \u2013 La fr\u00e9quence d\u2019utilisation de cette extension pour l\u2019h\u00e9bergement de contenu malveillant est fortement influenc\u00e9e par le fait qu\u2019elle apparaisse dans les services de raccourcissement d\u2019URL (par exemple, bit.ly, cutt.ly et ow.ly). Cela signifie que la fr\u00e9quence de menace est beaucoup plus \u00e9lev\u00e9e par rapport \u00e0 ce que l\u2019on pourrait attendre de son utilisation uniquement en tant que ccTLD.<\/li><\/ul>\n<ul class=\"wp-block-list\">\n<li><strong>.IO<\/strong> \u2013 L\u2019extension .IO est tr\u00e8s utilis\u00e9e dans les noms de domaine affichant du contenu orient\u00e9 technologie, notamment pour tout ce qui est associ\u00e9 aux syst\u00e8mes d\u2019exploitation (iOS) d\u2019Apple. Bon nombre des sites dangereux qui apparaissent dans cette analyse se trouvent sur des domaines .IO, ou des sous-domaines de sites tels que github.io, plut\u00f4t qu\u2019en lien avec le Territoire britannique de l\u2019oc\u00e9an Indien.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Les 30&nbsp;premiers TLD les plus \u00e0 risque incluent quatre des cinq extensions gratuites propos\u00e9es par Freenom (\u00e0 l\u2019exception de .TK, pour laquelle la fr\u00e9quence de menaces est susceptible d\u2019\u00eatre r\u00e9duite en raison du nombre absolu \u00e9lev\u00e9 d\u2019enregistrements sous ce TLD). Le mod\u00e8le \u00e9conomique de Freenom permet aux clients d\u2019enregistrer des noms de domaine gratuitement, avec la possibilit\u00e9 d\u2019effectuer des paiements par la suite, en fonction de l\u2019utilisation du nom de domaine en question. Ce syst\u00e8me rend leurs extensions particuli\u00e8rement attractives pour les phishers, qui peuvent abandonner leurs noms de domaine apr\u00e8s quelques jours d\u2019utilisation pour une attaque de phishing.<\/li>\n<\/ul>\n\n\n\n<p>La Figure&nbsp;1 compare les coefficients de risque avec le nombre total de noms de domaine clients g\u00e9r\u00e9s par CSC pour tous les TLD&nbsp;analys\u00e9s<a id=\"_ftnref1\" href=\"#_ftn1\"><sup>[8]<\/sup><\/a>.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/images\/TLD%202%20chart%201.png\" alt=\"\" \/><figcaption class=\"wp-element-caption\"><strong>Figure 1&nbsp;: <\/strong>Le nombre total de noms de domaine g\u00e9r\u00e9s par CSC (lorsqu\u2019il n\u2019est pas \u00e9gal \u00e0&nbsp;0) par rapport \u00e0 la fr\u00e9quence de menace normalis\u00e9e globale des&nbsp;TLD, pour les 30&nbsp;TLD les plus dangereux.<\/figcaption><\/figure>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Soulignons que la plupart des&nbsp;TLD les plus \u00e0 risque sont associ\u00e9s \u00e0 un petit nombre <s>seulement<\/s> de noms de domaine g\u00e9r\u00e9s par&nbsp;<strong>CSC<\/strong>. Nous recommandons donc clairement que les titulaires de marques envisagent, lorsque c\u2019est possible, d\u2019enregistrer \u00e0 titre d\u00e9fensif les noms de domaine qui incluent des termes li\u00e9s \u00e0 la marque sous les extensions \u00e0 haut risque, afin d\u2019emp\u00eacher que ces noms soient enregistr\u00e9s abusivement par des tiers.<\/p>\n\n\n\n<p>En mati\u00e8re de strat\u00e9gie d\u2019enregistrement d\u00e9fensif, les titulaires de marques devraient \u00e9galement songer \u00e0 enregistrer les noms de domaine contenant des variantes orthographiques ou des mots cl\u00e9s li\u00e9s \u00e0 une marque sp\u00e9cifique et qui sont fr\u00e9quemment associ\u00e9s \u00e0 des activit\u00e9s de phishing, plut\u00f4t que se contenter d\u2019enregistrer les noms correspondant exactement \u00e0 la marque sous les&nbsp;TLD pr\u00e9sentant des risques particuliers. Ceux-ci peuvent inclure des termes o\u00f9 des caract\u00e8res sont habituellement remplac\u00e9s, des mots cl\u00e9s comme \u00ab&nbsp;login&nbsp;\u00bb, \u00ab&nbsp;jobs&nbsp;\u00bb ou \u00ab&nbsp;invest&nbsp;\u00bb, ou tout autre mot cl\u00e9 li\u00e9 \u00e0 un secteur d\u2019activit\u00e9 sp\u00e9cifique.<\/p>\n\n\n\n<p><strong><em>Lorsque des noms de domaine pertinents ont d\u00e9j\u00e0 \u00e9t\u00e9 enregistr\u00e9s sous les&nbsp;TLD \u00e0 haut risque, il peut \u00eatre utile de les surveiller pour d\u00e9tecter d\u2019\u00e9ventuels changements de contenu, et\/ou intervenir ou lancer un processus d\u2019acquisition en cas de contenu illicite.<\/em><\/strong><strong><em><\/em><\/strong><\/p>\n\n\n\n<p>Il est \u00e9galement int\u00e9ressant d\u2019examiner la liste des principaux&nbsp;TLD en fonction du nombre de noms de domaine qui sont g\u00e9r\u00e9s par&nbsp;CSC (Figure&nbsp;2). Soulignons le fait que seul un de ces&nbsp;TLD (.CN), parmi les 30&nbsp;extensions les plus risqu\u00e9es, figure actuellement dans la liste (avec .COM.CN).<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/images\/TLD%202%20chart%202.png\" alt=\"\" \/><figcaption class=\"wp-element-caption\">Figure 2&nbsp;: Principaux TLD par noms de domaine clients les plus enregistr\u00e9s g\u00e9r\u00e9s par CSC.<\/figcaption><\/figure>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>On observe souvent qu\u2019un grand nombre de&nbsp;TLD \u00e0 haut risque affichent pourtant, dans l\u2019ensemble, des niveaux \u00e9lev\u00e9s d\u2019enregistrement \u2013&nbsp;une part importante de ceux-ci \u00e9tant associ\u00e9e \u00e0 une utilisation frauduleuse&nbsp;\u2013, une grande partie de ses enregistrements s\u2019effectuant aupr\u00e8s de registrars grand public, avec souvent peu d\u2019activit\u00e9s l\u00e9gitimes au niveau des prestataires de services aux entreprises. Des \u00e9tudes pr\u00e9c\u00e9dentes r\u00e9alis\u00e9es par&nbsp;CSC ont montr\u00e9 que la plupart des noms de domaine de marque utilisant des extensions dangereuses sont g\u00e9n\u00e9ralement enregistr\u00e9s par des tiers et sont souvent impliqu\u00e9s dans du cybersquatting ou des utilisations malveillantes. Dans une \u00e9tude portant sur les noms de domaine similaires\/identiques aux principaux noms de domaine de plusieurs grandes marques et utilisant l\u2019extension .ICU \u2013&nbsp;c\u2019est-\u00e0-dire utilisant le m\u00eame nom de domaine de deuxi\u00e8me niveau, mais avec l\u2019extension .ICU&nbsp;\u2013, pr\u00e8s des trois quarts des noms de domaine faisaient appel \u00e0 des fournisseurs&nbsp;DNS suspects qui n\u2019\u00e9taient pas sous le contr\u00f4le du titulaire de la marque.<\/p>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Nos recommandations<\/strong><\/h2>\n\n\n\n<p>CSC a \u00e9tabli une liste de recommandations pour aider les titulaires de marque \u00e0 faire face aux probl\u00e8mes cit\u00e9s dans ces articles.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>1. Commencez par la base<\/strong><\/h3>\n\n\n\n<p>En mati\u00e8re de cybers\u00e9curit\u00e9, le nom de domaine est l\u2019\u00e9l\u00e9ment de base. Il est essentiel que vous ayez une vue compl\u00e8te sur votre portefeuille de noms de domaine\u00a0: quels noms d\u00e9tenez-vous, lesquels sont critiques pour votre activit\u00e9, ou tactiques ou d\u00e9fensifs. Les <a href=\"https:\/\/www.cscdbs.com\/fr\/solutions\/gestion-portefeuille-nom-de-domaine\/\" target=\"_blank\" rel=\"noreferrer noopener\">services de gestion des noms de domaine de CSC<\/a> permettent \u00e0 nos clients de g\u00e9rer leurs portefeuilles de noms de domaine d\u2019entreprise officiels. Le d\u00e9ploiement de services de blocage ou d\u2019alerte permet de d\u00e9tecter les tentatives d\u2019enregistrement par des tiers de noms de domaine contenant des termes li\u00e9s \u00e0 votre marque. L\u2019\u00e9quipe Brand\u00a0Advisory de CSC peut vous conseiller sur les strat\u00e9gies d\u2019enregistrement de nom de domaine.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>2. Gardez-les en s\u00e9curit\u00e9<\/strong><\/h3>\n\n\n\n<p>L\u2019enregistrement de noms de domaine de marque par des tiers n\u2019est qu\u2019une partie du probl\u00e8me. Un autre principe de base consiste \u00e0 s\u00e9curiser vos noms de domaine officiels pour \u00e9viter toute modification non autoris\u00e9e de l\u2019infrastructure d\u2019un nom de domaine, qui est \u00e0 l\u2019origine d\u2019attaques de type d\u00e9tournement de nom de domaine, spoofing par e-mail et phishing. En tant que prestataire de services aux entreprises, CSC propose plusieurs <a href=\"https:\/\/www.cscdbs.com\/fr\/surveillance-sous-domaine\/\" target=\"_blank\" rel=\"noreferrer noopener\">solutions de s\u00e9curit\u00e9 des noms de domaine<\/a> qui permettent \u00e0 nos clients de s\u00e9curiser leurs noms de domaine Corporate et d\u2019adopter une approche D\u00e9fense en profondeur (DiD) dans le cadre d\u2019une strat\u00e9gie de s\u00e9curit\u00e9 robuste. Ces mesures incluent notamment la technologie Multilock, le protocole\u00a0DNSSEC, l\u2019utilisation d\u2019enregistrements\u00a0CAA, ainsi que les protocoles d\u2019authentification DMARC, SPF et DKIM.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>3. Surveillez de pr\u00e8s les menaces potentielles<\/strong><\/h3>\n\n\n\n<p>La veille de noms de domaine fait toute la diff\u00e9rence. Il est fortement recommand\u00e9 de surveiller les enregistrements, les r\u00e9enregistrements et les abandons de noms de domaine li\u00e9s \u00e0 une marque, et d\u2019utiliser ces informations pour savoir quand une marque doit agir. C\u2019est exactement ce que fait le <a href=\"https:\/\/www.cscdbs.com\/fr\/solutions\/application-securite-domaine-3d\/\">service 3D\u00a0Domain Monitoring de CSC<\/a>, qui analyse toute une s\u00e9rie de variantes orthographiques du nom de la marque, y compris les correspondances floues et les caract\u00e8res intervertis\/remplac\u00e9s. La surveillance couvre un large \u00e9ventail d\u2019extensions de noms de domaine, y compris les\u00a0TLD \u00e0 haut risque. Ce service surveille \u00e9galement les noms de domaine particuli\u00e8rement importants 24h\/24, 7j\/7, en identifiant toute modification de contenu digne d\u2019int\u00e9r\u00eat.<\/p>\n\n\n\n<p>Pour les marques particuli\u00e8rement sensibles au phishing, nous recommandons de compl\u00e9ter la surveillance du nom de domaine ou du contenu Internet par un service de protection contre le phishing. Cette option compl\u00e9mentaire permettra d\u2019am\u00e9liorer la couverture d\u2019\u00e9l\u00e9ments qui, sinon, pourraient ne pas \u00eatre d\u00e9tect\u00e9s, comme des noms de domaine non sp\u00e9cifiques \u00e0 une marque ou du contenu Internet non index\u00e9. Le <a href=\"https:\/\/www.cscdbs.com\/fr\/solutions\/detournements-phishing-marque\/\">service de d\u00e9tection du phishing de CSC<\/a> s\u2019appuie sur un vaste \u00e9ventail de sources de donn\u00e9es, y compris les pi\u00e8ges \u00e0 spam (\u00ab\u00a0spam traps\u00a0\u00bb) et les honeypots, ainsi que d\u2019autres flux de donn\u00e9es comme les donn\u00e9es issues de bo\u00eetes de messagerie vers lesquelles sont achemin\u00e9es les e-mails suspects re\u00e7us par nos clients (\u00ab\u00a0abuse mailbox\u00a0\u00bb) et celles des journaux de serveurs\u00a0web. Ces donn\u00e9es sont saisies dans notre moteur de corr\u00e9lation\u00a0\u2013 optimis\u00e9 par le machine learning (apprentissage automatique)\u00a0\u2013 qui d\u00e9tecte les sites frauduleux en analysant automatiquement les mod\u00e8les d\u2019URL et en comparant les sites \u00e0 l\u2019aide des pr\u00e9dicteurs de contenu frauduleux que nous d\u00e9finissons.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>4. Intervenez en cas d\u2019infraction<\/strong><\/h3>\n\n\n\n<p>Les points\u00a01 \u00e0\u00a03 visent \u00e0 r\u00e9duire l\u2019occurrence de risques cyber, mais pour les infractions existantes, il est important de disposer d\u2019une solution d\u2019intervention efficace pour prot\u00e9ger votre marque. Les <a href=\"https:\/\/www.cscdbs.com\/fr\/solutions\/surveillance-marque\/\" target=\"_blank\" rel=\"noreferrer noopener\">services d\u2019intervention de CSC<\/a> sont disponibles 24h\/24, 7j\/7 pour obtenir le retrait rapide de divers types de contenus abusifs. Nous utilisons une approche \u00ab\u00a0bo\u00eete \u00e0 outils\u00a0\u00bb, avec un large \u00e9ventail de m\u00e9thodologies d\u2019intervention, ce qui vous permet de choisir l\u2019option la plus efficace et la plus \u00e9conomique dans un cas donn\u00e9, tout en disposant d\u2019options plus complexes, si n\u00e9cessaire. L\u2019utilisation efficace de cette approche permet \u00e0 n\u2019importe quelle marque de prot\u00e9ger sa r\u00e9putation, et de r\u00e9cup\u00e9rer potentiellement les revenus perdus en raison d\u2019activit\u00e9s frauduleuses et de redirections vers des sites tiers.<\/p>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Discutons-en<\/strong><\/h2>\n\n\n\n<p>Si vous souhaitez plus d\u2019informations sur l\u2019un des services mentionn\u00e9s dans cet article, ou si vous aimeriez parler avec l\u2019un de nos experts concernant l\u2019une des questions soulev\u00e9es ici, merci de <a href=\"https:\/\/www.cscdbs.com\/fr\/contactez-nous\/\" target=\"_blank\" rel=\"noreferrer noopener\">remplir notre formulaire de contact<\/a>, en indiquant le nom de l\u2019article et le service\/probl\u00e8me dont vous voulez discuter.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<p style=\"font-size:15px\"><a id=\"_ftn1\" href=\"#_ftnref1\">[1]<\/a> spamhaus.org\/statistics\/tlds\/<\/p>\n\n\n\n<p style=\"font-size:15px\"><a id=\"_ftn2\" href=\"#_ftnref2\">[2]<\/a> <a href=\"https:\/\/trends.netcraft.com\/cybercrime\/tlds\" target=\"_blank\" rel=\"noreferrer noopener\">trends.netcraft.com\/cybercrime\/tlds<\/a><\/p>\n\n\n\n<p style=\"font-size:15px\"><a id=\"_ftn3\" href=\"#_ftnref3\">[3]<\/a> <a href=\"https:\/\/unit42.paloaltonetworks.com\/top-level-domains-cybercrime\/\" target=\"_blank\" rel=\"noreferrer noopener\">unit42.paloaltonetworks.com\/top-level-domains-cybercrime\/<\/a><\/p>\n\n\n\n<p style=\"font-size:15px\"><a href=\"#_ftnref4\" id=\"_ftn4\">[4]<\/a> Pour les ensembles de donn\u00e9es&nbsp;1 et&nbsp;2, toutes les statistiques sont correctes au 13&nbsp;juin 2022.<\/p>\n\n\n\n<p style=\"font-size:15px\"><a id=\"_ftn1\" href=\"#_ftnref1\">[5]<\/a> Source&nbsp;: iana.org<\/p>\n\n\n\n<p style=\"font-size:15px\"><a id=\"_ftn1\" href=\"#_ftnref1\">[6]<\/a> <a href=\"https:\/\/op.europa.eu\/en\/publication-detail\/-\/publication\/7d16c267-7f1f-11ec-8c40-01aa75ed71a1\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/op.europa.eu\/en\/publication-detail\/-\/publication\/7d16c267-7f1f-11ec-8c40-01aa75ed71a1<\/a><\/p>\n\n\n\n<p style=\"font-size:15px\"><a id=\"_ftn2\" href=\"#_ftnref2\">[7]<\/a> <a href=\"https:\/\/docs.apwg.org\/reports\/APWG_Global_Phishing_Report_2015-2016.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">docs.apwg.org\/\/reports\/APWG_Global_Phishing_Report_2015-2016.pdf<\/a><\/p>\n\n\n\n<p style=\"font-size:15px\"><a id=\"_ftn1\" href=\"#_ftnref1\">[8]<\/a> Donn\u00e9es correctes en juin&nbsp;2022<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Dans le premier article de ce blog en deux parties, nous avions analys\u00e9 les donn\u00e9es recueillies par les services de protection contre la fraude de CSC pour mettre en \u00e9vidence la fr\u00e9quence d\u2019utilisation de certains noms de domaine pour des activit\u00e9s de phishing parmi les extensions de premier niveau (TLD \u2013 aussi appel\u00e9s \u00ab&nbsp;extensions de [&hellip;]<\/p>\n","protected":false},"author":17,"featured_media":10443,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[545],"tags":[],"class_list":["post-12144","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-fr"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Les TLD les plus dangereux \u2013 2\u00e8me partie | CSC<\/title>\n<meta name=\"description\" content=\"Dans le premier article de ce blog en deux parties, nous avions analys\u00e9 les donn\u00e9es recueillies par les services de protection contre la fraude de CSC\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cscdbs.com\/blog\/les-tld-les-plus-dangereux-2eme-partie\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Les TLD les plus dangereux \u2013 2\u00e8me partie | CSC\" \/>\n<meta property=\"og:description\" content=\"Dans le premier article de ce blog en deux parties, nous avions analys\u00e9 les donn\u00e9es recueillies par les services de protection contre la fraude de CSC\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cscdbs.com\/blog\/les-tld-les-plus-dangereux-2eme-partie\/\" \/>\n<meta property=\"og:site_name\" content=\"Digital Brand Services Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/corporationserviceco\" \/>\n<meta property=\"article:published_time\" content=\"2023-01-18T08:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-15T13:17:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2021\/11\/cscdbsblog_1000x55023.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"550\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Arielle Wallace\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@cscdbs\" \/>\n<meta name=\"twitter:site\" content=\"@cscdbs\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Arielle Wallace\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"13 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/les-tld-les-plus-dangereux-2eme-partie\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/les-tld-les-plus-dangereux-2eme-partie\\\/\"},\"author\":{\"name\":\"Arielle Wallace\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/person\\\/9f28d3ffdbe4e71bc030903c8037afe8\"},\"headline\":\"Les TLD les plus dangereux \u2013 2\u00e8me partie\",\"datePublished\":\"2023-01-18T08:00:00+00:00\",\"dateModified\":\"2026-01-15T13:17:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/les-tld-les-plus-dangereux-2eme-partie\\\/\"},\"wordCount\":3010,\"publisher\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/les-tld-les-plus-dangereux-2eme-partie\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2021\\\/11\\\/cscdbsblog_1000x55023.jpg\",\"articleSection\":[\"Fran\u00e7ais\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/les-tld-les-plus-dangereux-2eme-partie\\\/\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/les-tld-les-plus-dangereux-2eme-partie\\\/\",\"name\":\"Les TLD les plus dangereux \u2013 2\u00e8me partie | CSC\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/les-tld-les-plus-dangereux-2eme-partie\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/les-tld-les-plus-dangereux-2eme-partie\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2021\\\/11\\\/cscdbsblog_1000x55023.jpg\",\"datePublished\":\"2023-01-18T08:00:00+00:00\",\"dateModified\":\"2026-01-15T13:17:51+00:00\",\"description\":\"Dans le premier article de ce blog en deux parties, nous avions analys\u00e9 les donn\u00e9es recueillies par les services de protection contre la fraude de CSC\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/les-tld-les-plus-dangereux-2eme-partie\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/les-tld-les-plus-dangereux-2eme-partie\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/les-tld-les-plus-dangereux-2eme-partie\\\/#primaryimage\",\"url\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2021\\\/11\\\/cscdbsblog_1000x55023.jpg\",\"contentUrl\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2021\\\/11\\\/cscdbsblog_1000x55023.jpg\",\"width\":1000,\"height\":550},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/les-tld-les-plus-dangereux-2eme-partie\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Les TLD les plus dangereux \u2013 2\u00e8me partie\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\",\"name\":\"Digital Brand Services Blog\",\"description\":\"Domains, new gTLDs, brand protection, security &amp; trademark news\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\",\"name\":\"CSC Digital Brand Services\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2018\\\/06\\\/cropped-dbs_small.gif\",\"contentUrl\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2018\\\/06\\\/cropped-dbs_small.gif\",\"width\":200,\"height\":200,\"caption\":\"CSC Digital Brand Services\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/corporationserviceco\",\"https:\\\/\\\/x.com\\\/cscdbs\",\"https:\\\/\\\/www.linkedin.com\\\/showcase\\\/csc-digital-brand-services\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/person\\\/9f28d3ffdbe4e71bc030903c8037afe8\",\"name\":\"Arielle Wallace\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Les TLD les plus dangereux \u2013 2\u00e8me partie | CSC","description":"Dans le premier article de ce blog en deux parties, nous avions analys\u00e9 les donn\u00e9es recueillies par les services de protection contre la fraude de CSC","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cscdbs.com\/blog\/les-tld-les-plus-dangereux-2eme-partie\/","og_locale":"en_US","og_type":"article","og_title":"Les TLD les plus dangereux \u2013 2\u00e8me partie | CSC","og_description":"Dans le premier article de ce blog en deux parties, nous avions analys\u00e9 les donn\u00e9es recueillies par les services de protection contre la fraude de CSC","og_url":"https:\/\/www.cscdbs.com\/blog\/les-tld-les-plus-dangereux-2eme-partie\/","og_site_name":"Digital Brand Services Blog","article_publisher":"https:\/\/www.facebook.com\/corporationserviceco","article_published_time":"2023-01-18T08:00:00+00:00","article_modified_time":"2026-01-15T13:17:51+00:00","og_image":[{"width":1000,"height":550,"url":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2021\/11\/cscdbsblog_1000x55023.jpg","type":"image\/jpeg"}],"author":"Arielle Wallace","twitter_card":"summary_large_image","twitter_creator":"@cscdbs","twitter_site":"@cscdbs","twitter_misc":{"Written by":"Arielle Wallace","Est. reading time":"13 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cscdbs.com\/blog\/les-tld-les-plus-dangereux-2eme-partie\/#article","isPartOf":{"@id":"https:\/\/www.cscdbs.com\/blog\/les-tld-les-plus-dangereux-2eme-partie\/"},"author":{"name":"Arielle Wallace","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/person\/9f28d3ffdbe4e71bc030903c8037afe8"},"headline":"Les TLD les plus dangereux \u2013 2\u00e8me partie","datePublished":"2023-01-18T08:00:00+00:00","dateModified":"2026-01-15T13:17:51+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cscdbs.com\/blog\/les-tld-les-plus-dangereux-2eme-partie\/"},"wordCount":3010,"publisher":{"@id":"https:\/\/www.cscdbs.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.cscdbs.com\/blog\/les-tld-les-plus-dangereux-2eme-partie\/#primaryimage"},"thumbnailUrl":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2021\/11\/cscdbsblog_1000x55023.jpg","articleSection":["Fran\u00e7ais"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.cscdbs.com\/blog\/les-tld-les-plus-dangereux-2eme-partie\/","url":"https:\/\/www.cscdbs.com\/blog\/les-tld-les-plus-dangereux-2eme-partie\/","name":"Les TLD les plus dangereux \u2013 2\u00e8me partie | CSC","isPartOf":{"@id":"https:\/\/www.cscdbs.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cscdbs.com\/blog\/les-tld-les-plus-dangereux-2eme-partie\/#primaryimage"},"image":{"@id":"https:\/\/www.cscdbs.com\/blog\/les-tld-les-plus-dangereux-2eme-partie\/#primaryimage"},"thumbnailUrl":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2021\/11\/cscdbsblog_1000x55023.jpg","datePublished":"2023-01-18T08:00:00+00:00","dateModified":"2026-01-15T13:17:51+00:00","description":"Dans le premier article de ce blog en deux parties, nous avions analys\u00e9 les donn\u00e9es recueillies par les services de protection contre la fraude de CSC","breadcrumb":{"@id":"https:\/\/www.cscdbs.com\/blog\/les-tld-les-plus-dangereux-2eme-partie\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cscdbs.com\/blog\/les-tld-les-plus-dangereux-2eme-partie\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cscdbs.com\/blog\/les-tld-les-plus-dangereux-2eme-partie\/#primaryimage","url":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2021\/11\/cscdbsblog_1000x55023.jpg","contentUrl":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2021\/11\/cscdbsblog_1000x55023.jpg","width":1000,"height":550},{"@type":"BreadcrumbList","@id":"https:\/\/www.cscdbs.com\/blog\/les-tld-les-plus-dangereux-2eme-partie\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cscdbs.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Les TLD les plus dangereux \u2013 2\u00e8me partie"}]},{"@type":"WebSite","@id":"https:\/\/www.cscdbs.com\/blog\/#website","url":"https:\/\/www.cscdbs.com\/blog\/","name":"Digital Brand Services Blog","description":"Domains, new gTLDs, brand protection, security &amp; trademark news","publisher":{"@id":"https:\/\/www.cscdbs.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cscdbs.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cscdbs.com\/blog\/#organization","name":"CSC Digital Brand Services","url":"https:\/\/www.cscdbs.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2018\/06\/cropped-dbs_small.gif","contentUrl":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2018\/06\/cropped-dbs_small.gif","width":200,"height":200,"caption":"CSC Digital Brand Services"},"image":{"@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/corporationserviceco","https:\/\/x.com\/cscdbs","https:\/\/www.linkedin.com\/showcase\/csc-digital-brand-services\/"]},{"@type":"Person","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/person\/9f28d3ffdbe4e71bc030903c8037afe8","name":"Arielle Wallace"}]}},"_links":{"self":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/12144","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/comments?post=12144"}],"version-history":[{"count":10,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/12144\/revisions"}],"predecessor-version":[{"id":14761,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/12144\/revisions\/14761"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/media\/10443"}],"wp:attachment":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/media?parent=12144"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/categories?post=12144"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/tags?post=12144"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}