Lookalike domains used to boost effectiveness of email scams


Lookalike domains, crafted to closely resemble authentic domains, enable a wide range of deceptive activities. By sending emails that appear to originate from trusted sources, attackers can effectively conduct a variety of scams from phishing and social engineering attacks to invoice fraud.
A new report from BlueVoyant looks at how cybercriminals encourage their victims to click on lookalike domains, whilst highlighting the critical need for vigilance and proactive measures to counteract these threats.
The report's authors note, "The rise of lookalike domains is an increasing concern affecting a wide array of sectors, including finance, insurance, construction, and legal industries, among others. These types of domains have experienced a significant surge in registrations, posing substantial risks to businesses and individuals alike. The widespread nature of this threat highlights the urgent need for vigilance and comprehensive security measures across all industries to counteract the deceptive tactics employed by cyber criminals."
Lookalikes typically employ tactics like using visually similar characters, such as replacing an 'o' with a '0' or an 'l' with a '1', subtly rearranging letters, or incorporating terms closely related to a company's brand.
Once they've identified a target, attackers will register a domain, setup email servers then choose potential victims before launching the campaign.
Detecting lookalike domains presents tough challenges, particularly when client names are generic or made up of of initials. This increases the complexity of detecting and monitoring a large volume of domains that might resemble legitimate ones. Tools, such as string similarity models, are crucial in this process. These evaluate how closely a lookalike domain matches the original, helping to identify subtle variations that traditional methods may miss. The huge number of fake domains and their rapid emergence means there's a need continuous monitoring and sophisticated models to prevent potential fraud.
The report concludes, "Understanding the lifecycle of lookalike domain scams -- from domain registration to targeted email campaigns -- underscores the importance of sophisticated detection and mitigation strategies. Challenges such as detection difficulties, proving malicious intent, and social engineering tactics complicate the landscape, requiring a concerted effort that combines advanced detection capabilities, comprehensive takedown processes, and effective communication with clients."
You can get the full report from the BlueVoyant site.
Image credit: stevanovicigor/depositphotos.com