Cyber-Criminals Mimicking Global Brand Domain Names to Launch Scams

Cyber-Criminals Mimicking Global Brand Domain Names to Launch Scams
[Coker, James. “Cyber-Criminals Mimicking Global Brand Domain Names to Launch Scams.” Infosecurity Magazine, September 1, 2020,]

“Cyber-criminals are regularly mimicking the domain names of mainstream global brands to scam consumers, a practice known as cyber-squatting, according to a new study by Palo Alto Networks.”

“It found that the types of domains most commonly impersonated for malicious purposes relate to the most profitable companies worldwide, such as mainstream search engines and social media, financial, shopping, and banking websites. The primary purpose is to launch phishing attacks and scams on users in order to steal credentials or money.”

“Companies mimicked in the top 20 most abused domains in December 2019 based on adjusted malicious rate included PayPal, Apple, Netflix and Amazon.”

“Palo Alto Networks commented: “Domain squatting techniques leverage the fact that users rely on domain names to identify brands and services on the Internet. These squatting domains are often used for nefarious activities, including phishing, malware and PUP distribution, C2 and various scams.”

“It advised: “We recommend that enterprises block and closely monitor their traffic, while consumers should make sure that they type domain names correctly and double-check that the domain owners are trusted before entering any site.”

RevBits Thoughts:

Sophisticated phishing emails escape detection because they are designed to do just that. One of the techniques used in sophisticated malicious emails to bypass detection is page impersonation attacks. The use of page impersonation attacks, or brand impersonation attacks, is a growing threat, designed to harvest valuable user credentials. The ability for malicious actors to build realistic fake login pages to gather credentials allows the actor to have recurring access and possibly the ability to move deeper into the network.

To combat sophisticated phishing emails enterprise’s need to deploy sophisticated solutions that detect and block those emails. Having employees determine malicious URLs or malicious pages from real ones is difficult and likely, asking too much of your employees.

To combat sophisticated phishing emails RevBits built a sophisticated email security solution. For example, RevBits Email Security has a patented technology to detect and block page impersonation attacks. Through unique architecture and methodology, RevBits Email Security is positioned to protect organizations against sophisticated email attacks that can get past secure email gateways and enter the network.

Related Insights

RevBits Detection and Response Engine Blocks All Exploits Before the Attack Chain Begins
November 15, 2022

RevBits Detection and Response Engine Blocks All Exploits Before the Attack Chain Begins

The idea behind a home security system is to deter break-ins and subsequent theft and malicious damage. We hope the ear-shattering alarm and implied promise of police intervention will be enough to cause criminals to flee before entering. Unfortunately, regardless of protective measures, many savvy thieves can breach your system and inflict a great deal of loss and harm in a short time and still evade authorities.

Email Phishing Training and Anti-Phishing Tools Matter Most Before the Holidays
May 13, 2022

Exterminate Cyber Pests with RevBits Award-Winning Deception Technology

Most homeowners have had to deal with a pest problem at some point. In addition to the mess their intrusion may create, they can also cause a great deal of damage. Trying to determine their access point can be a tricky endeavor. You can attempt any number of lures and traps; sometimes with success. But the truly insidious and elusive pest will require the services of an expert.

Difference Between Sandbox and Honeypot Security
March 03, 2020

The Difference Between Sandbox and Honeypot Security Technology

When it comes to cybersecurity, different tactics emerge on a daily basis, which can make it difficult to keep up with current trends. Sandboxing and honeypot security are two cybersecurity tactics that are constantly evolving but can be confused. These two technologies are quite different and both offer valuable solutions to various cybersecurity issues. By understanding the differences in these two technologies, businesses can be sure they have the right solution for their cybersecurity needs.

Contact Details

Contact RevBits

Message icon Request a Demo