Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Threat Actors Widely Abuse .COM TLD to Host Credential Phishing Website

Threat Actors Widely Abuse .COM TLD to Host Credential Phishing Website

Posted on July 3, 2025July 3, 2025 By CWS

The .COM top-level area continues to dominate the cybercriminal panorama as the first car for internet hosting credential phishing web sites, sustaining its place as essentially the most extensively abused TLD by menace actors worldwide.

Current intelligence signifies that malicious actors leverage the trusted fame and widespread recognition of .COM domains to deceive victims into surrendering delicate login credentials throughout numerous platforms and providers.

Cybercriminals exploit the .COM TLD via refined multi-stage assault vectors that start with rigorously crafted phishing emails containing first-stage URLs embedded inside seemingly respectable communications.

These preliminary hyperlinks redirect victims to second-stage URLs the place precise credential harvesting happens, making a layered method that helps evade detection methods and will increase marketing campaign success charges.

The prevalence of .COM area abuse stems from its common acceptance and the psychological belief customers place on this acquainted extension.

Not like country-specific TLDs that will elevate suspicion, .COM domains seamlessly mix into respectable internet site visitors, making them best for sustained malicious operations concentrating on world audiences throughout a number of sectors and industries.

Credential phishing web page (Supply – Cofense)

Cofense researchers recognized that menace actors using .COM domains display outstanding consistency of their concentrating on preferences, with Microsoft-related providers representing the overwhelming majority of spoofed manufacturers in credential phishing campaigns.

This sample displays the ubiquity of Microsoft’s enterprise options and the high-value nature of company credentials for subsequent assaults.

Infrastructure and Internet hosting Patterns

The technical infrastructure supporting .COM-based credential phishing reveals refined operational safety measures employed by trendy menace actors.

Evaluation of malicious .COM domains demonstrates in depth use of cloud internet hosting providers, significantly Cloudflare, which supplies each reliability and anonymity for felony operations.

The internet hosting sample sometimes includes respectable base domains with dynamically generated subdomains that seem as random alphanumeric strings moderately than human-readable textual content.

Instance malicious subdomain construction:

These subdomains host totally practical credential phishing pages that incorporate superior evasion methods, together with Cloudflare Turnstile CAPTCHA methods that serve twin functions of showing respectable whereas probably filtering automated safety scanners.

The bottom domains typically stay unreachable or show benign content material, whereas the subdomains actively harvest credentials via convincing replicas of well-liked login portals.

The standard subdomain technology sample noticed in .COM-based phishing campaigns, displaying the pseudo-random nature of those malicious endpoints utilized by menace actors to maximise their operational effectiveness whereas minimizing detection dangers.

Examine reside malware conduct, hint each step of an assault, and make quicker, smarter safety choices -> Attempt ANY.RUN now

Cyber Security News Tags:.COM, Abuse, Actors, Credential, Host, Phishing, Threat, TLD, Website, Widely

Post navigation

Previous Post: Citrix Warns Authentication Failures Following The Update of NetScaler to Fix Auth Vulnerability
Next Post: How to Identify and Avoid Tech Support Scams

Related Posts

Tsundere Botnet Abusing Popular Node.js and Cryptocurrency Packages to Attack Windows, Linux, and macOS Users Tsundere Botnet Abusing Popular Node.js and Cryptocurrency Packages to Attack Windows, Linux, and macOS Users Cyber Security News
12-Year-Old Sudo Linux Vulnerability Enables Privilege Escalation to Root User 12-Year-Old Sudo Linux Vulnerability Enables Privilege Escalation to Root User Cyber Security News
Ransomware Attack on Romanian Waters Authority Ransomware Attack on Romanian Waters Authority Cyber Security News
Cl0P Ransomware Group Allegedly Claims Breach of Entrust in Oracle 0-Day EBS Hack Cl0P Ransomware Group Allegedly Claims Breach of Entrust in Oracle 0-Day EBS Hack Cyber Security News
SerpApi Challenges SearchApi Over Technology Misuse SerpApi Challenges SearchApi Over Technology Misuse Cyber Security News
New Analysis Uncovers LockBit 5.0 Key Capabilities and Two-Stage Execution Model New Analysis Uncovers LockBit 5.0 Key Capabilities and Two-Stage Execution Model Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Russian Group Star Blizzard Utilizes DarkSword iOS Exploit
  • Secrets Sprawl Expands in 2026: Key Insights for CISOs
  • Urgent Patches Address Critical Grafana Security Flaws
  • Telnyx Python SDK Faces Supply Chain Attack
  • Russian Toolkit Exploits RDP via Malicious LNK Files

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Russian Group Star Blizzard Utilizes DarkSword iOS Exploit
  • Secrets Sprawl Expands in 2026: Key Insights for CISOs
  • Urgent Patches Address Critical Grafana Security Flaws
  • Telnyx Python SDK Faces Supply Chain Attack
  • Russian Toolkit Exploits RDP via Malicious LNK Files

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark