Skip to main content

Can We Move Past Blocklists to Automated Takedowns?

In the struggle to prevent phishing, cyber defenders use URL blocklists. URL blocklists are ever-changing and difficult to keep current. Attackers make use of automation and other methods to bypass their effectiveness.

Rather than everyone struggling to keep their ever-changing blocklists accurate and up-to-date, is it possible to ease the burden on cyber defenders by automating “verified” phishing site takedowns? There are for-profit companies that claim they have implemented automated API-based phishing site takedowns with trusted web host providers. Would it be effective to implement a community-driven automated takedown request method?

can-we-move-past-blocklists-to-automated-takedowns (PDF, 1.01MB)

6 Oct 2021
BySusan Ramsey
Share
All papers are copyrighted

No re-posting of papers is permitted