Let's Encrypt
In https://infosec.exchange/@aral@mastodon.ar.al/114224524044750719 @aral wants us to pay taxes to keep Let's Encrypt "alive". Here's another reason NOT to do that.
Apparently the *.eu.org domain needed laundrying because it's reputation became too bad. So scammers create zillions of insane domain names and obtain *FREE* (for them) certificates for those sites. Usually such sites are not malicious; they're intended to have virusscanners remove detection, eventually for the sub-TLD ".eu.org".
To see this, you may consider opening
https://crt.sh?q=eu.org
but that will fail because there are WAY too many results.
To restrict the amount of records, try a subdomain name and further restrict output by deduplicating and restricting to not expired, as follows:
https://crt.sh/?Identity=madaline.eu.org&exclude=expired&deduplicate=Y
The screenshot below gives an idea (they're all Let's Encrypt certs by the way, and I marked one with an insane domain name).
I wrote about this phenomenon before, e.g. in https://www.security.nl/posting/781057/Let%27s+Encrypt+git_git_git___ (at the time I did not understand why yet).
VirusTotal knows of 72.5K direct subdomains of *.eu.org:
"Subdomains (72.5 K)"
(open the RELATIONS tab in https://www.virustotal.com/gui/domain/eu.org/).
@TheDutchChief @EUCommission @letsencrypt @nlnet