Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Threat Actors Widely Abuse .COM TLD to Host Credential Phishing Website

Posted on July 3, 2025July 3, 2025 By CWS

The .COM top-level area continues to dominate the cybercriminal panorama as the first car for internet hosting credential phishing web sites, sustaining its place as essentially the most extensively abused TLD by menace actors worldwide.

Current intelligence signifies that malicious actors leverage the trusted fame and widespread recognition of .COM domains to deceive victims into surrendering delicate login credentials throughout numerous platforms and providers.

Cybercriminals exploit the .COM TLD via refined multi-stage assault vectors that start with rigorously crafted phishing emails containing first-stage URLs embedded inside seemingly respectable communications.

These preliminary hyperlinks redirect victims to second-stage URLs the place precise credential harvesting happens, making a layered method that helps evade detection methods and will increase marketing campaign success charges.

The prevalence of .COM area abuse stems from its common acceptance and the psychological belief customers place on this acquainted extension.

Not like country-specific TLDs that will elevate suspicion, .COM domains seamlessly mix into respectable internet site visitors, making them best for sustained malicious operations concentrating on world audiences throughout a number of sectors and industries.

Credential phishing web page (Supply – Cofense)

Cofense researchers recognized that menace actors using .COM domains display outstanding consistency of their concentrating on preferences, with Microsoft-related providers representing the overwhelming majority of spoofed manufacturers in credential phishing campaigns.

This sample displays the ubiquity of Microsoft’s enterprise options and the high-value nature of company credentials for subsequent assaults.

Infrastructure and Internet hosting Patterns

The technical infrastructure supporting .COM-based credential phishing reveals refined operational safety measures employed by trendy menace actors.

Evaluation of malicious .COM domains demonstrates in depth use of cloud internet hosting providers, significantly Cloudflare, which supplies each reliability and anonymity for felony operations.

The internet hosting sample sometimes includes respectable base domains with dynamically generated subdomains that seem as random alphanumeric strings moderately than human-readable textual content.

Instance malicious subdomain construction:

These subdomains host totally practical credential phishing pages that incorporate superior evasion methods, together with Cloudflare Turnstile CAPTCHA methods that serve twin functions of showing respectable whereas probably filtering automated safety scanners.

The bottom domains typically stay unreachable or show benign content material, whereas the subdomains actively harvest credentials via convincing replicas of well-liked login portals.

The standard subdomain technology sample noticed in .COM-based phishing campaigns, displaying the pseudo-random nature of those malicious endpoints utilized by menace actors to maximise their operational effectiveness whereas minimizing detection dangers.

Examine reside malware conduct, hint each step of an assault, and make quicker, smarter safety choices -> Attempt ANY.RUN now

Cyber Security News Tags:.COM, Abuse, Actors, Credential, Host, Phishing, Threat, TLD, Website, Widely

Post navigation

Previous Post: Citrix Warns Authentication Failures Following The Update of NetScaler to Fix Auth Vulnerability
Next Post: How to Identify and Avoid Tech Support Scams

Related Posts

ConnectWise Hacked – Nation State Actors Compromised the Systems to Access Customer Data Cyber Security News
Hackers Attacking Apache Tomcat Manager From 400 Unique IPs Cyber Security News
Hackers Exploit SimpleHelp RMM Tool to Deploy DragonForce Ransomware Cyber Security News
Authorities Dismantled AVCheck, a Tool For Testing Malware Against Antivirus Detection Cyber Security News
Advanced Endpoint Threat Detection in 2025 Network Environments Cyber Security News
Cost of a Breach Calculating ROI for Cybersecurity Investments Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Massive Android Ad Fraud ‘IconAds’ Leverages Google Play to Attack Phone Users
  • Your AI Agents Might Be Leaking Data — Watch this Webinar to Learn How to Stop It
  • Google Ordered to Pay $314M for Misusing Android Users’ Cellular Data Without Permission
  • New Hpingbot Abusing Pastebin for Payload Delivery and Hping3 Tool to Launch DDoS Attacks
  • Azure API Vulnerabilities Leak VPN Keys and Built-In Roles Allow Over-Privileged Access

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Massive Android Ad Fraud ‘IconAds’ Leverages Google Play to Attack Phone Users
  • Your AI Agents Might Be Leaking Data — Watch this Webinar to Learn How to Stop It
  • Google Ordered to Pay $314M for Misusing Android Users’ Cellular Data Without Permission
  • New Hpingbot Abusing Pastebin for Payload Delivery and Hping3 Tool to Launch DDoS Attacks
  • Azure API Vulnerabilities Leak VPN Keys and Built-In Roles Allow Over-Privileged Access

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News