• About Us
  • Advertising
  • Digital Magazine
  • Supplements
  • Media Pack
  • Privacy Policy
  • Contact us
CXO Insight Middle East
  • News
  • Opinion
  • Business
    • Industries
      • Transport
      • Retail
      • Government
      • Real Estate
      • Education
      • Energy
      • Banking and Finance
    • Channel
  • Future
    • Tech
    • Gadgets
    • Science
    • Space
    • Sustainability
  • Events
    • Channel Insights Summit 2025
    • Insight Innovation Summit
    • CXO50 Oman
    • CXO50
    • ICT Awards
      • Dubai 2025
      • Saudi Arabia
    • Cyber Strategists Summit
    • Cloud Connect 2025
    • Channel Awards 2024
    • All events
  • GITEX
  • Digital Magazine
No Result
View All Result
CXO Insight Middle East
  • News
  • Opinion
  • Business
    • Industries
      • Transport
      • Retail
      • Government
      • Real Estate
      • Education
      • Energy
      • Banking and Finance
    • Channel
  • Future
    • Tech
    • Gadgets
    • Science
    • Space
    • Sustainability
  • Events
    • Channel Insights Summit 2025
    • Insight Innovation Summit
    • CXO50 Oman
    • CXO50
    • ICT Awards
      • Dubai 2025
      • Saudi Arabia
    • Cyber Strategists Summit
    • Cloud Connect 2025
    • Channel Awards 2024
    • All events
  • GITEX
  • Digital Magazine
No Result
View All Result
CXO Insight Middle East
No Result
View All Result

The Rising Threat of Lookalike Domain Attacks!

by CXO Staff
January 9, 2024
in Opinions

Mohammed Al-Moneer, Regional Sr. Director, META at Infoblox, highlights the critical role of analyzing over 70 billion daily DNS events to identify and caution organizations against four distinct types of lookalike domain attacks, emphasizing the importance of proactive threat detection.

The Rising Threat of Lookalike Domain Attacks!

If you think you’re seeing double, you probably are. Website domains, that is. Yet, despite the growing threat of lookalike domains, a targeted form of phishing where malicious actors use visually similar website domains to deceive unsuspecting users into clicking links or visiting fake websites, they can be overlooked as a key attack vector for threat actors. As users have learned to scrutinise links in emails they receive – and while the security industry has increased their ability to automatically detect threats, cyber criminals only continue to innovate and get smarter in their tactics.

Threat actors have successfully driven people towards lookalike domains in their attacks via SMS messages, direct messages on social media, and QR codes. Clicking on these links can lead to identity theft.

Wondering how hackers are able to easily reach and trick unsuspecting victims to click on suspicious links? It’s because lookalike domain attacks often start at the domain name system (DNS) level, which is the first point of attack for many threat actors. The most common use of DNS is for computers to be able to find content on the internet for a domain name. Facebook/Meta, for example, can be accessed through the domain name facebook.com. However, DNS is often overlooked and unprotected, meaning that if hackers break through that initial DNS layer with a lookalike domain attack, they can often gain access to an entire network. Even though users are suspicious of email from unknown senders, these domain names may appear indistinguishable from the expected domain and the user may be caught off guard.

The use of lookalike domains is profitable for threat actors because it is an asymmetric attack. Cheap domain registration prices and the ability to distribute large-scale attacks unfortunately give actors the upper hand. While techniques to identify malicious activity have improved recently, it’s still become increasingly difficult for organisations to keep pace. In fact, hackers can buy tool kits on the dark web for just $300, allowing these attacks to be launched at scale with little to no effort.

Infoblox analyzes over 70 billion DNS events daily to find new and potential threats. Here are four types of lookalike domain attacks, in particular, that all organisations should be on the lookout for:

  • Homographs or homoglyphs use visually similar characters from different character sets such as Cyrillic or Greek to create domain names that appear identical to legitimate ones (e.g., substituting “o” with “0”). What makes homographs particularly effective is that the difference between individual characters is not always clearly distinguishable, depending on the fonts and typesets used.
  • Typosquats include sneaky typing errors by registering domains that closely resemble popular websites (e.g., substituting “amazonn[.]com” for “amazon[.]com“) to take users to a fraudulent website. Often, typosquats will be used for popular domains that are already registered for financial gain and to draw in advertising money, but malicious actors also ‘squat’ in these domains with websites that are visually close to what users are expecting to see.
  • Combosquats combine well-known brand or company names with other keywords such as “mail”, “security” or “support”. For instance, the domain wordpresssecurityt[.]store might be searchable on Google for WordPress users seeking help, but actually has a Russia-based IP address. According to Infoblox’s report, around 60% of these abusive combosquatting domains stay active for more than 1,000 days, and only 20% are reported and blocked after 100 days. Combosquatting is around 100 times more prevalent than typosquatting.
  • Soundsquats are the most recent form of lookalike threats, using domain names that sound similar to legitimate ones when spoken aloud (e.g., “hsbsee[.]com” instead of “hsbc[.]com”). This can trick users who hear a domain instead of reading it, and has been researched for its potential impact on smart devices such as Google Home, Siri, and Alexa.

While these four emphasize different types of attacks, threat actors rarely stick to one of these lanes. They often attempt to use a combination of these techniques to defraud users and target businesses. Lookalike domains are designed to trick consumers, and while some may be good at spotting them, it only takes one or two people to engage with these domains to activate the effects of the attack.

While knowing how to spot lookalike domains is key, it won’t completely protect you from falling victim to one. One of the best ways to stay protected from lookalike domain attacks is having a strong DNS security strategy already in place, as it can help to detect and block lookalike domain attacks sooner. At Infoblox, we’re proud to be the first DNS security solution to offer a Lookalike Domain Monitoring capability that works to identify sites attempting to impersonate company brands that are increasingly used to deceive consumers with phishing, malvertising and similar attacks.

Detecting and not falling prey to these kinds of attacks are crucial, but the ability to takedown lookalike domains is equally important. Lookalike domain attacks are increasing in sophistication and prevalence, making specialised solutions like DNS security a must-have for all.

Tags: featured3InfobloxMohammed Al-Moneer
ShareTweet

Related Posts

Channel Vision Strategy: Empowering cyber resilience
Opinions

What most businesses get wrong about data security

In today's AI-driven world, vast amounts of data are generated daily across industries like finance, e-commerce, healthcare, and government services....

June 11, 2025
Why private cloud matters
Opinions

Why private cloud matters

As digital transformation accelerates across industries, private cloud has become a vital infrastructure model for organisations seeking the flexibility of...

June 9, 2025

Discussion about this post

Latest Issue

Tech predictions for 2024 and beyond

Amazon’s Werner Vogels on how cloud, data, and culture are shaping AI

June 13, 2025
WSO2 acquires API analytics and monetisation startup Moesif

Bold visions, stronger partnerships: AWS co-innovates across the Middle East

June 13, 2025
NTT DATA launches AI-powered SDI services for Cisco products

NTT DATA launches AI-powered SDI services for Cisco products

June 13, 2025

The most trusted source of strategic intelligence for IT decision makers in the Middle East.

About

  • About Us
  • Advertising
  • Digital Magazine
  • Supplements
  • Media Pack
  • Contact Us

Policies

  • Privacy Policy

© 2024 – CXO Insight Middle East. All Rights Reserved.

Facebook-f X-twitter Linkedin
Separated they live in Bookmarksgrove right at the coast of the Semantics, a large language ocean. A small river named Duden.

About

  • About Us
  • Site Map
  • Contact Us
  • Career

Policies

  • Help Center
  • Privacy Policy
  • Cookie Setting
  • Term Of Use

Join Our Newsletter

© 2024 – CXO Insight Middle East. All Rights Reserved.

Facebook-f Twitter Youtube Instagram

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
Join our mailing list
Sign up here to get the latest news, updates and special offers delivered directly to your inbox.
No Result
View All Result
  • News
  • Opinions
  • Business
    • Industries
      • Transport
      • Retail
      • Government
      • Real Estate
      • Education
      • Energy
      • Banking and Finance
  • Channel
  • Future
    • Tech
    • Gadgets
    • Science
    • Space
    • Sustainability
  • Events
    • Channel Insights Summit 2025
    • Insight Innovation Summit
    • CX50 Oman
    • CXO50
    • ICT Awards
      • Dubai
      • Saudi Arabia
    • Cyber Strategists Summit
    • Cloud Connect 2025
    • Channel Awards 2023
    • All events
  • Videos
  • GITEX GLOBAL
  • Digital Magazine

© 2024 - CXO Insight Middle East. All Rights Reserved.