Most Preferred Domains Used by Threat Actors

Share post:

Security researchers in Palo Alto recently released some of the top-level domains (TLD) used by threat actors.

These top-level domains have been divided into several categories including Malware, Phishing, Command and control (c2), and Greyware. For malware distribution, most attackers use TLDs such as.ga, xyz, .cf, .tk, .org, and .ml. For phishing attacks, the threat scenarios mainly use .net, .pw, .top, .ga, and .icu.

Commonly used domains for Greyware include .org, .info, .co, .ru, .work, .net, and .club. For the C2 infrastructure, attackers mainly use .top, .gq, .ga, .ml, .cf, .info, .cn, and .tk. Unlike others, phishing offers an evenly distributed category with 99% of domains distributed over 92 different TLDs.

It seems surprising to many that the TLD domains of Tokelau, a small island in the Pacific are among the top ten of all malicious categories.

In its report, Palo Alto claims that such countries offer cheap or free domains to make money from ads, which exposes these domains to abuse by attackers.

For more information, read the original story in Bleeping Computer.

SUBSCRIBE NOW

Related articles

Trump Administration Officials Accidentally Text Journalist Secret U.S. War Plans

The Atlantic’s editor-in-chief Jeffrey Goldberg says he was mistakenly added to a Signal group chat discussing classified U.S....

Oracle Denies Breach After Hacker Claims to Have Stolen 6 Million Records

Oracle is denying claims that its cloud systems were breached after a hacker alleged they had stolen six...

Security Expert Troy Hunt’s Mailchimp Account Compromised in Phishing Attack

Troy Hunt, renowned information security expert and founder of HaveIBeenPwned, has reported a phishing attack that compromised his...

Synology Vulnerability Allows Remote Code Execution

A major security flaw in Synology's DiskStation Manager (DSM) software could allow remote attackers to take full control...

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways