Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Threat Actors Widely Abuse .COM TLD to Host Credential Phishing Website

Posted on July 3, 2025July 3, 2025 By CWS

The .COM top-level area continues to dominate the cybercriminal panorama as the first car for internet hosting credential phishing web sites, sustaining its place as essentially the most extensively abused TLD by menace actors worldwide.

Current intelligence signifies that malicious actors leverage the trusted fame and widespread recognition of .COM domains to deceive victims into surrendering delicate login credentials throughout numerous platforms and providers.

Cybercriminals exploit the .COM TLD via refined multi-stage assault vectors that start with rigorously crafted phishing emails containing first-stage URLs embedded inside seemingly respectable communications.

These preliminary hyperlinks redirect victims to second-stage URLs the place precise credential harvesting happens, making a layered method that helps evade detection methods and will increase marketing campaign success charges.

The prevalence of .COM area abuse stems from its common acceptance and the psychological belief customers place on this acquainted extension.

Not like country-specific TLDs that will elevate suspicion, .COM domains seamlessly mix into respectable internet site visitors, making them best for sustained malicious operations concentrating on world audiences throughout a number of sectors and industries.

Credential phishing web page (Supply – Cofense)

Cofense researchers recognized that menace actors using .COM domains display outstanding consistency of their concentrating on preferences, with Microsoft-related providers representing the overwhelming majority of spoofed manufacturers in credential phishing campaigns.

This sample displays the ubiquity of Microsoft’s enterprise options and the high-value nature of company credentials for subsequent assaults.

Infrastructure and Internet hosting Patterns

The technical infrastructure supporting .COM-based credential phishing reveals refined operational safety measures employed by trendy menace actors.

Evaluation of malicious .COM domains demonstrates in depth use of cloud internet hosting providers, significantly Cloudflare, which supplies each reliability and anonymity for felony operations.

The internet hosting sample sometimes includes respectable base domains with dynamically generated subdomains that seem as random alphanumeric strings moderately than human-readable textual content.

Instance malicious subdomain construction:

These subdomains host totally practical credential phishing pages that incorporate superior evasion methods, together with Cloudflare Turnstile CAPTCHA methods that serve twin functions of showing respectable whereas probably filtering automated safety scanners.

The bottom domains typically stay unreachable or show benign content material, whereas the subdomains actively harvest credentials via convincing replicas of well-liked login portals.

The standard subdomain technology sample noticed in .COM-based phishing campaigns, displaying the pseudo-random nature of those malicious endpoints utilized by menace actors to maximise their operational effectiveness whereas minimizing detection dangers.

Examine reside malware conduct, hint each step of an assault, and make quicker, smarter safety choices -> Attempt ANY.RUN now

Cyber Security News Tags:.COM, Abuse, Actors, Credential, Host, Phishing, Threat, TLD, Website, Widely

Post navigation

Previous Post: Citrix Warns Authentication Failures Following The Update of NetScaler to Fix Auth Vulnerability
Next Post: How to Identify and Avoid Tech Support Scams

Related Posts

Lessons from Oracle E-Business Suite Hack That Allegedly Compromises Nearly 30 Organizations Worldwide Cyber Security News
Italian Adviser Becomes Latest Target in Expanding Paragon Graphite Spyware Surveillance Case Cyber Security News
17K+ SharePoint Servers Exposed to Internet Cyber Security News
Achieving Data Privacy Regulation Compliance in 2025 Frameworks Cyber Security News
Palo Alto Networks GlobalProtect Vulnerability Allows Root User Privilege Escalation Cyber Security News
CISA Adds MDaemon Email Server XSS Vulnerability to KEV Catalog Following Exploitation Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hackers Leveraging WhatsApp That Silently Harvest Logs and Contact Details
  • PoC released for W3 Total Cache Vulnerability that Exposes 1+ Million Websites to RCE Attacks
  • CISA Confirms Exploitation of Recent Oracle Identity Manager Vulnerability
  • CrowdStrike Insider Helped Hackers Falsely Claim System Breach
  • New Fluent Bit Flaws Expose Cloud to RCE and Stealthy Infrastructure Intrusions

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Hackers Leveraging WhatsApp That Silently Harvest Logs and Contact Details
  • PoC released for W3 Total Cache Vulnerability that Exposes 1+ Million Websites to RCE Attacks
  • CISA Confirms Exploitation of Recent Oracle Identity Manager Vulnerability
  • CrowdStrike Insider Helped Hackers Falsely Claim System Breach
  • New Fluent Bit Flaws Expose Cloud to RCE and Stealthy Infrastructure Intrusions

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark