LIVE NEWS
  • Middle East crisis live: Iranian missiles intercepted over Turkey, Qatar and UAE as Israel resumes strikes across Tehran and Beirut | US-Israel war on Iran
  • Institutional Investors Pour $619,000,000 Into Bitcoin and Crypto Assets in One Week: CoinShares
  • How AI Assistants are Moving the Security Goalposts – Krebs on Security
  • Oil Price Spike: What Countries Are Telling People to Do
  • The D Brief: US toll rises to 8; Iran’s new leader; Building military-specific AI; Counting the rationales for war; And a bit more.
  • Sugar Prices Jump as Crude Oil Surges
  • Anthropic sues Trump administration seeking to undo ‘supply chain risk’ designation
  • Wildfire season is shifting, but its new time windows vary across Canada and the US drought-prone West
Prime Reports
  • Home
  • Popular Now
  • Crypto
  • Cybersecurity
  • Economy
  • Geopolitics
  • Global Markets
  • Politics
  • See More
    • Artificial Intelligence
    • Climate Risks
    • Defense
    • Healthcare Innovation
    • Science
    • Technology
    • World
Prime Reports
  • Home
  • Popular Now
  • Crypto
  • Cybersecurity
  • Economy
  • Geopolitics
  • Global Markets
  • Politics
  • Artificial Intelligence
  • Climate Risks
  • Defense
  • Healthcare Innovation
  • Science
  • Technology
  • World
Home»Cybersecurity»Internet Infrastructure TLD .arpa Abused in Phishing Attacks
Cybersecurity

Internet Infrastructure TLD .arpa Abused in Phishing Attacks

primereportsBy primereportsMarch 9, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Internet Infrastructure TLD .arpa Abused in Phishing Attacks
Share
Facebook Twitter LinkedIn Pinterest Email


A threat actor has been abusing the internet infrastructure top-level domain (TLD) .arpa to host phishing content on domains that should not resolve to IP addresses, Infoblox reports.

The .arpa TLD is designed to map IP addresses to domains, providing reverse DNS records, and should not host web content, as other TLDs do.

As part of the newly uncovered campaign, however, a threat actor has been abusing DNS record management controls of certain providers to add IP address records for .arpa domains and serve phishing content to victims.

Impersonating major brands, the phishing emails display an image hiding an embedded hyperlink designed to take the victim to the malicious website after a series of redirects.

The links use a reverse DNS string instead of a standard domain name, but the actual domain is hidden from the victim’s view to avoid raising suspicion.

As part of the .arpa phishing campaign, the threat actor has exploited a vulnerability at DNS providers that allowed them to claim ownership of .arpa domains.

Advertisement. Scroll to continue reading.

“To make this attack work, the threat actor acquires some IPv6 address space, for which they are delegated control of the corresponding .arpa subdomain. Then, instead of adding the expected PTR records, they create A records for the reverse DNS names,” Infoblox explains.

These records were created through Cloudflare and Hurricane Electric, but other DNS providers also allow the configuration.

While .arpa domains are typically trusted and the domain names unlikely to be blocked, the threat actor further made the reverse DNS domains difficult to identify and block by prepending them with randomly generated subdomains, creating unique Fully Qualified Domain Names (FQDNs) that were then used to build phishing email HTMLs.

The identified reverse DNS FQDNs resolved to two IP addresses belonging to Cloudflare’s edge network, essentially hiding the location of the malicious content.

Infoblox also discovered that the threat actor hijacked the Canonical Name (CNAME) records of known education, government, media, retail, and telecommunication entities and abused subdomains of their legitimate domains in their phishing attacks.

“We also saw a few cases of domain shadowing, in which an actor-controlled subdomain is created, typically through credential theft. The lure images are unrelated to the hijacked domains. As with the IPv6 reverse domains, victims are unlikely to ever notice them,” Infoblox notes.

The company observed hijacked CNAMEs being constantly abused in phishing attacks since September 2025, some in more than 100 different email runs per day. Some of the domains have been abused for years, and the toolkit used in this campaign has been used by multiple threat actors since 2017.

Related: Tycoon 2FA Phishing Platform Dismantled in Global Takedown

Related: LastPass Warns of New Phishing Campaign

Related: ‘Stanley’ Malware Toolkit Enables Phishing via Website Spoofing

Related: Complex Routing, Misconfigurations Exploited for Domain Spoofing in Phishing Attacks

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleWhy China can withstand oil’s surge more easily than other countries
Next Article Post-Quantum Shift Could Force Crypto Exchanges to Rethink Wallet Security
primereports
  • Website

Related Posts

Cybersecurity

How AI Assistants are Moving the Security Goalposts – Krebs on Security

March 9, 2026
Cybersecurity

Week in review: Weaponized OAuth redirection logic delivers malware, Patch Tuesday forecast

March 8, 2026
Cybersecurity

The long-awaited Trump cyber strategy has arrived

March 8, 2026
Add A Comment
Leave A Reply Cancel Reply

Top Posts

Global Resources Outlook 2024 | UNEP

December 6, 20255 Views

The D Brief: DHS shutdown likely; US troops leave al-Tanf; CNO’s plea to industry; Crowded robot-boat market; And a bit more.

February 14, 20264 Views

German Chancellor Merz faces difficult mission to Israel – DW – 12/06/2025

December 6, 20254 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Latest Reviews

Subscribe to Updates

Get the latest tech news from FooBar about tech, design and biz.

PrimeReports.org
Independent global news, analysis & insights.

PrimeReports.org brings you in-depth coverage of geopolitics, markets, technology and risk – with context that helps you understand what really matters.

Editorially independent · Opinions are those of the authors and not investment advice.
Facebook X (Twitter) LinkedIn YouTube
Key Sections
  • World
  • Geopolitics
  • Popular Now
  • Artificial Intelligence
  • Cybersecurity
  • Crypto
All Categories
  • Artificial Intelligence
  • Climate Risks
  • Crypto
  • Cybersecurity
  • Defense
  • Economy
  • Geopolitics
  • Global Markets
  • Healthcare Innovation
  • Politics
  • Popular Now
  • Science
  • Technology
  • World
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms & Conditions
  • Disclaimer
  • Cookie Policy
  • DMCA / Copyright Notice
  • Editorial Policy

Sign up for Prime Reports Briefing – essential stories and analysis in your inbox.

By subscribing you agree to our Privacy Policy. You can opt out anytime.
Latest Stories
  • Middle East crisis live: Iranian missiles intercepted over Turkey, Qatar and UAE as Israel resumes strikes across Tehran and Beirut | US-Israel war on Iran
  • Institutional Investors Pour $619,000,000 Into Bitcoin and Crypto Assets in One Week: CoinShares
  • How AI Assistants are Moving the Security Goalposts – Krebs on Security
© 2026 PrimeReports.org. All rights reserved.
Privacy Terms Contact

Type above and press Enter to search. Press Esc to cancel.