LIVE NEWS
  • Where do the 35 million foreigners living in the GCC come from? | Infographic News
  • Circle (CRCL) shares continued their rally on Monday
  • Malicious npm Package Posing as OpenClaw Installer Deploys RAT, Steals macOS Credentials
  • Live Nation's settlement with DOJ still isn't a done deal
  • Fighting mercenaries: A Ukrainian soldier’s perspective
  • UK inflation likely to rise because of Middle East war, says Rachel Reeves | Rachel Reeves
  • Beijing’s new missile threat to Australia
  • Frailty sets in far earlier than you’d expect, but you can reverse it
Prime Reports
  • Home
  • Popular Now
  • Crypto
  • Cybersecurity
  • Economy
  • Geopolitics
  • Global Markets
  • Politics
  • See More
    • Artificial Intelligence
    • Climate Risks
    • Defense
    • Healthcare Innovation
    • Science
    • Technology
    • World
Prime Reports
  • Home
  • Popular Now
  • Crypto
  • Cybersecurity
  • Economy
  • Geopolitics
  • Global Markets
  • Politics
  • Artificial Intelligence
  • Climate Risks
  • Defense
  • Healthcare Innovation
  • Science
  • Technology
  • World
Home»Cybersecurity»Internet Infrastructure TLD .arpa Abused in Phishing Attacks
Cybersecurity

Internet Infrastructure TLD .arpa Abused in Phishing Attacks

primereportsBy primereportsMarch 9, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Internet Infrastructure TLD .arpa Abused in Phishing Attacks
Share
Facebook Twitter LinkedIn Pinterest Email


A threat actor has been abusing the internet infrastructure top-level domain (TLD) .arpa to host phishing content on domains that should not resolve to IP addresses, Infoblox reports.

The .arpa TLD is designed to map IP addresses to domains, providing reverse DNS records, and should not host web content, as other TLDs do.

As part of the newly uncovered campaign, however, a threat actor has been abusing DNS record management controls of certain providers to add IP address records for .arpa domains and serve phishing content to victims.

Impersonating major brands, the phishing emails display an image hiding an embedded hyperlink designed to take the victim to the malicious website after a series of redirects.

The links use a reverse DNS string instead of a standard domain name, but the actual domain is hidden from the victim’s view to avoid raising suspicion.

As part of the .arpa phishing campaign, the threat actor has exploited a vulnerability at DNS providers that allowed them to claim ownership of .arpa domains.

Advertisement. Scroll to continue reading.

“To make this attack work, the threat actor acquires some IPv6 address space, for which they are delegated control of the corresponding .arpa subdomain. Then, instead of adding the expected PTR records, they create A records for the reverse DNS names,” Infoblox explains.

These records were created through Cloudflare and Hurricane Electric, but other DNS providers also allow the configuration.

While .arpa domains are typically trusted and the domain names unlikely to be blocked, the threat actor further made the reverse DNS domains difficult to identify and block by prepending them with randomly generated subdomains, creating unique Fully Qualified Domain Names (FQDNs) that were then used to build phishing email HTMLs.

The identified reverse DNS FQDNs resolved to two IP addresses belonging to Cloudflare’s edge network, essentially hiding the location of the malicious content.

Infoblox also discovered that the threat actor hijacked the Canonical Name (CNAME) records of known education, government, media, retail, and telecommunication entities and abused subdomains of their legitimate domains in their phishing attacks.

“We also saw a few cases of domain shadowing, in which an actor-controlled subdomain is created, typically through credential theft. The lure images are unrelated to the hijacked domains. As with the IPv6 reverse domains, victims are unlikely to ever notice them,” Infoblox notes.

The company observed hijacked CNAMEs being constantly abused in phishing attacks since September 2025, some in more than 100 different email runs per day. Some of the domains have been abused for years, and the toolkit used in this campaign has been used by multiple threat actors since 2017.

Related: Tycoon 2FA Phishing Platform Dismantled in Global Takedown

Related: LastPass Warns of New Phishing Campaign

Related: ‘Stanley’ Malware Toolkit Enables Phishing via Website Spoofing

Related: Complex Routing, Misconfigurations Exploited for Domain Spoofing in Phishing Attacks

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleWhy China can withstand oil’s surge more easily than other countries
Next Article Post-Quantum Shift Could Force Crypto Exchanges to Rethink Wallet Security
primereports
  • Website

Related Posts

Cybersecurity

Malicious npm Package Posing as OpenClaw Installer Deploys RAT, Steals macOS Credentials

March 9, 2026
Cybersecurity

How AI Assistants are Moving the Security Goalposts – Krebs on Security

March 9, 2026
Cybersecurity

Week in review: Weaponized OAuth redirection logic delivers malware, Patch Tuesday forecast

March 8, 2026
Add A Comment
Leave A Reply Cancel Reply

Top Posts

Global Resources Outlook 2024 | UNEP

December 6, 20255 Views

The D Brief: DHS shutdown likely; US troops leave al-Tanf; CNO’s plea to industry; Crowded robot-boat market; And a bit more.

February 14, 20264 Views

German Chancellor Merz faces difficult mission to Israel – DW – 12/06/2025

December 6, 20254 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Latest Reviews

Subscribe to Updates

Get the latest tech news from FooBar about tech, design and biz.

PrimeReports.org
Independent global news, analysis & insights.

PrimeReports.org brings you in-depth coverage of geopolitics, markets, technology and risk – with context that helps you understand what really matters.

Editorially independent · Opinions are those of the authors and not investment advice.
Facebook X (Twitter) LinkedIn YouTube
Key Sections
  • World
  • Geopolitics
  • Cybersecurity
  • Popular Now
  • Crypto
  • Artificial Intelligence
All Categories
  • Artificial Intelligence
  • Climate Risks
  • Crypto
  • Cybersecurity
  • Defense
  • Economy
  • Geopolitics
  • Global Markets
  • Healthcare Innovation
  • Politics
  • Popular Now
  • Science
  • Technology
  • World
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms & Conditions
  • Disclaimer
  • Cookie Policy
  • DMCA / Copyright Notice
  • Editorial Policy

Sign up for Prime Reports Briefing – essential stories and analysis in your inbox.

By subscribing you agree to our Privacy Policy. You can opt out anytime.
Latest Stories
  • Where do the 35 million foreigners living in the GCC come from? | Infographic News
  • Circle (CRCL) shares continued their rally on Monday
  • Malicious npm Package Posing as OpenClaw Installer Deploys RAT, Steals macOS Credentials
© 2026 PrimeReports.org. All rights reserved.
Privacy Terms Contact

Type above and press Enter to search. Press Esc to cancel.