Hackers Increasingly Rely on Non-Mainstream Domains and Sophisticated Tactics to Evade Security Systems

Hackers Increasingly Rely on Non-Mainstream Domains and Sophisticated Tactics to Evade Security Systems

Hackers Increasingly Rely on Non-Mainstream Domains and Sophisticated Tactics to Evade Security Systems

Redmond, WashingtonCybersecurity experts have raised alarms about cybercriminals adjusting their strategies to bypass advanced email security systems. According to the Cofense Intelligence Q3 Trends Report, phishing attacks have increased in both frequency and sophistication, particularly through the use of non-mainstream top-level domains (TLDs), making malicious activities harder to trace.

Rising Phishing Attacks and Malicious Emails

Data shows that the frequency of malicious emails bypassing secure email gateways (SEGs) has risen from one every 57 seconds in 2023 to one every 45 seconds in 2024, signaling more complex and evasive phishing campaigns.

A significant increase in Remote Access Trojans (RATs) usage has also been observed. RATs allow attackers to remotely control victims’ devices to steal data, install malware, or maintain stealth for prolonged damage. Open redirect attacks surged by 627%, leading users to malicious URLs via cloned pages of legitimate websites. Additionally, malicious Microsoft Office documents, particularly in .docx format, have grown by 600%, embedding phishing links or QR codes that redirect to RAT-infected websites.

The Rise of Non-Mainstream Domains: .ru and .su

Experts noted a sharp increase in the use of non-mainstream TLDs like .ru (Russia) and .su (Soviet Union). These domains make it more difficult for security systems to track and mitigate attacks, giving hackers an added layer of obfuscation.

You need to log in to view the full content

Already logged in?Refresh Now

News Source:John Colascione ,This article does not represent our position.

Namebit's avatarNamebitAuthor
Previous 2 days ago
Next 1 day ago

Related News