Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Threat Actors Widely Abuse .COM TLD to Host Credential Phishing Website

Posted on July 3, 2025July 3, 2025 By CWS

The .COM top-level area continues to dominate the cybercriminal panorama as the first car for internet hosting credential phishing web sites, sustaining its place as essentially the most extensively abused TLD by menace actors worldwide.

Current intelligence signifies that malicious actors leverage the trusted fame and widespread recognition of .COM domains to deceive victims into surrendering delicate login credentials throughout numerous platforms and providers.

Cybercriminals exploit the .COM TLD via refined multi-stage assault vectors that start with rigorously crafted phishing emails containing first-stage URLs embedded inside seemingly respectable communications.

These preliminary hyperlinks redirect victims to second-stage URLs the place precise credential harvesting happens, making a layered method that helps evade detection methods and will increase marketing campaign success charges.

The prevalence of .COM area abuse stems from its common acceptance and the psychological belief customers place on this acquainted extension.

Not like country-specific TLDs that will elevate suspicion, .COM domains seamlessly mix into respectable internet site visitors, making them best for sustained malicious operations concentrating on world audiences throughout a number of sectors and industries.

Credential phishing web page (Supply – Cofense)

Cofense researchers recognized that menace actors using .COM domains display outstanding consistency of their concentrating on preferences, with Microsoft-related providers representing the overwhelming majority of spoofed manufacturers in credential phishing campaigns.

This sample displays the ubiquity of Microsoft’s enterprise options and the high-value nature of company credentials for subsequent assaults.

Infrastructure and Internet hosting Patterns

The technical infrastructure supporting .COM-based credential phishing reveals refined operational safety measures employed by trendy menace actors.

Evaluation of malicious .COM domains demonstrates in depth use of cloud internet hosting providers, significantly Cloudflare, which supplies each reliability and anonymity for felony operations.

The internet hosting sample sometimes includes respectable base domains with dynamically generated subdomains that seem as random alphanumeric strings moderately than human-readable textual content.

Instance malicious subdomain construction:

These subdomains host totally practical credential phishing pages that incorporate superior evasion methods, together with Cloudflare Turnstile CAPTCHA methods that serve twin functions of showing respectable whereas probably filtering automated safety scanners.

The bottom domains typically stay unreachable or show benign content material, whereas the subdomains actively harvest credentials via convincing replicas of well-liked login portals.

The standard subdomain technology sample noticed in .COM-based phishing campaigns, displaying the pseudo-random nature of those malicious endpoints utilized by menace actors to maximise their operational effectiveness whereas minimizing detection dangers.

Examine reside malware conduct, hint each step of an assault, and make quicker, smarter safety choices -> Attempt ANY.RUN now

Cyber Security News Tags:.COM, Abuse, Actors, Credential, Host, Phishing, Threat, TLD, Website, Widely

Post navigation

Previous Post: Citrix Warns Authentication Failures Following The Update of NetScaler to Fix Auth Vulnerability
Next Post: How to Identify and Avoid Tech Support Scams

Related Posts

Malicious npm Packages as Utilities Let Attackers Destroy Production Systems Cyber Security News
Hacking Xiaomi Smartwatch Using Touch Point to Find Unlock PIN coordinates Cyber Security News
Password Reset Poisoning Attack Allows Account Takeover Using the Password Reset Link Cyber Security News
Incident Response Planning – Preparing for Data Breaches Cyber Security News
CISOs Playbook for Managing Boardroom Cybersecurity Concerns Cyber Security News
93+ Billion Stolen Users’ Cookies Flooded by Hackers on the Dark Web Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Identify and Avoid Tech Support Scams
  • Threat Actors Widely Abuse .COM TLD to Host Credential Phishing Website
  • Citrix Warns Authentication Failures Following The Update of NetScaler to Fix Auth Vulnerability
  • Apache Tomcat and Camel Vulnerabilities Actively Exploited in The Wild
  • Massive Android Fraud Operations Uncovered: IconAds, Kaleidoscope, SMS Malware, NFC Scams

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • How to Identify and Avoid Tech Support Scams
  • Threat Actors Widely Abuse .COM TLD to Host Credential Phishing Website
  • Citrix Warns Authentication Failures Following The Update of NetScaler to Fix Auth Vulnerability
  • Apache Tomcat and Camel Vulnerabilities Actively Exploited in The Wild
  • Massive Android Fraud Operations Uncovered: IconAds, Kaleidoscope, SMS Malware, NFC Scams

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News