Complete Story


The Anatomy of a Look-alike Domain Attack

Security Boulevard

Cybercriminals register hundreds of thousands of look-alike domains every year to impersonate reputable organizations and make a profit. These domains are used for a variety of attacks including phishing emails, fraudulent websites, web traffic diversion, and malware delivery.

Look-alike domains are intentionally misleading to give customers the false impression that they’re interacting with trusted brands, leading to significant reputation damage, financial losses, and data compromise for established enterprises. The process of creating an attack is inexpensive, and if threat actors move quickly to evade detection, they can make a large return on their time and money.

In this post, we’ll show how often the most common threat types show up, walk through the process of creating a look-alike domain threat from an attacker’s perspective, and share helpful resources that will enable security professionals to minimize the risk these threats pose to their organizations.


Printer-Friendly Version