Adversaries may acquire domains that can be used during targeting. Domain names are the human-readable names used to represent one or more IP addresses, and they can be purchased or acquired for free to serve as infrastructure for command-and-control, phishing, malware hosting, and other malicious operations.
MITRE ATT&CK • Enterprise • Sub-technique T1583.001
Over 11,894 domains were registered between December 2024 and June 2025 that were observed communicating with malware infrastructure. Each domain represents a potential entry point for phishing, C2, or payload delivery.
11,894+ domains in 6 monthsThe .cc top-level domain has a staggering 91% malicious domain rate. The .ru TLD follows at 82%, meaning the vast majority of registrations on these extensions are used for fraud, malware, or phishing campaigns.
.cc: 91% | .ru: 82% maliciousAPT groups have registered domains imitating NATO, OSCE, major banks, venture capital firms, and enterprise platforms like LinkedIn, Office 365, and Facebook to deliver targeted attacks against employees and officials.
NATO, banks, LinkedIn impersonatedWhen legitimate companies let domains expire, adversaries re-register them to inherit existing backlinks, email sender reputation, and security allowlisting. This makes previously trusted domains vectors for malware delivery.
Re-registered C2 domains bypass filtersPrivate WHOIS registration services, which are now the default for many registrars, make it nearly impossible to identify who registered a malicious domain. This frustrates incident response, threat intelligence, and law enforcement investigations.
WHOIS privacy blocks attributionIn cloud environments, adversaries leverage services like AWS Route53 to programmatically register and manage hundreds of domains for fast-flux networks, bulletproof hosting, and resilient C2 infrastructure at scale.
Cloud infrastructure accelerates abuseDefinition: Acquiring domains for malicious use refers to the practice of purchasing or registering internet domain names that adversaries then weaponize for command-and-control (C2) communications, phishing campaigns, malware distribution, or social engineering operations. This is a foundational step in the Resource Development (TA0042) tactic of the MITRE ATT&CK framework.
| Latin Character | Cyrillic Lookalike | Example Fake Domain | Legitimate Domain |
|---|---|---|---|
| a (U+0061) | а (U+0430) | pаypal.com | paypal.com |
| e (U+0065) | &cyree; (U+0435) | app&cyree;.com | apple.com |
| o (U+006F) | о (U+043E) | gооgle.com | google.com |
| p (U+0070) | р (U+0440) | ayрal.com | paypal.com |
| x (U+0078) | х (U+0445) | х.com | x.com |
| c (U+0063) | с (U+0441) | сiti.com | citi.com |
Dmitri Volkov is a financially motivated threat actor operating from Eastern Europe. His objective: establish a phishing infrastructure capable of harvesting online banking credentials at scale. Dmitri begins by conducting open-source reconnaissance on major US financial institutions, noting their branding, email templates, and customer-facing domain structures.
Dmitri registers bankofameriica.com, note the extra “i”, through a privacy-protected registrar using cryptocurrency payment. He also monitors domain expiration feeds and acquires secure-trust-finance.net, a domain that belonged to a defunct financial services firm until it expired three weeks ago. Because this domain previously had legitimate SSL certificates and inbound links, it carries residual trust that helps Dmitri's phishing emails bypass spam filters.
Dmitri configures DNS records via a bulletproof hosting provider, setting up MX records for email and A records pointing to a compromised server in a neutral country. He deploys a pixel-perfect clone of the bank's login page, complete with a valid SSL certificate obtained through a lax certificate authority. Within the first 72 hours of his campaign, Dmitri harvests over 2,400 credentials from victims who received spear-phishing emails appearing to originate from the bank's legitimate domain.
Research the target organization's domain portfolio, subdomains, and brand assets. Map out potential typosquatting variations and homoglyph substitutions.
Choose between typosquatting, expired domain acquisition, DGA-generated domains, or lookalike domains with alternative TLDs based on operational requirements and target environment.
Complete domain registration using privacy services, cryptocurrency payments, and operational aliases to prevent attribution. Use multiple registrars to distribute the registration footprint.
Set up DNS records to point domains to attacker-controlled infrastructure. Configure A, MX, NS, and TXT records. Consider using fast-flux DNS or DNS tunneling for resilience.
Host phishing pages, malware payloads, or C2 endpoints on the registered domains. Obtain SSL/TLS certificates to enable HTTPS and increase perceived legitimacy.
When domains are flagged or blocklisted, rotate to pre-registered backup domains. Maintain a pipeline of fresh domains to ensure operational continuity.
How attackers acquire and weaponize domains
How defenders detect and neutralize domain threats
Set up automated alerts for newly registered domains matching your brand names, trademarks, executive names, or common typos. Services like DomainTools, RiskIQ (Microsoft), and brand monitoring platforms can provide real-time notifications. Respond within hours of detection to minimize the window of exploitation.
HIGH PRIORITYMonitor CT logs for new SSL/TLS certificates issued for domains similar to your organization's. Adversaries must obtain certificates to serve HTTPS phishing pages, and CT logs provide an early indicator of domain impersonation campaigns before phishing emails are sent.
HIGH PRIORITYMonitor your organization's domain portfolio for expiring domains and auto-renew critical domains. Additionally, track domains of acquired companies, dissolved partners, and former subsidiaries that may be repurposed by adversaries seeking inherited trust.
MEDIUM PRIORITYAnalyze DNS query logs for domains with high character entropy (random-looking strings), unusual length distributions, and low lexical frequency. DGA domains typically have Shannon entropy above 3.5 and lack common English syllables or words.
HIGH PRIORITYImplement DNS filtering policies that restrict or deeply inspect connections to TLDs with high malicious registration rates (.cc, .ru, .tk, .ml, .ga). While not all domains on these TLDs are malicious, the signal-to-noise ratio justifies aggressive monitoring.
MEDIUM PRIORITYUse passive DNS databases to identify domains that share IP addresses, name servers, or registrant information with known malicious domains. This “guilt by association” approach can reveal newly registered domains before they appear on threat feeds.
MEDIUM PRIORITYT1583.001 covers the foundational step of acquiring domain infrastructure. Once domains are secured, adversaries move to configure DNS records, obtain email accounts, set up web services, and ultimately launch reconnaissance against their targets. Understanding the full lifecycle of infrastructure acquisition is critical for building effective defenses.
Every contribution moves us closer to our goal: making world-class cybersecurity education accessible to ALL.
Choose the amount of donation by yourself.