Wednesday, May 14, 2025
Homecyber securityThreat Actors Register Over 26,000 Domains Imitating Brands to Deceive Users

Threat Actors Register Over 26,000 Domains Imitating Brands to Deceive Users

Published on

SIEM as a Service

Follow Us on Google News

Researchers from Unit 42 have uncovered a massive wave of SMS phishing, or “smishing,” activity targeting unsuspecting users.

Since the FBI’s initial warning in April 2024, over 91,500 root domains associated with smishing have been identified and blocked.

However, the momentum of this malicious activity has intensified in 2025, with a staggering peak of 26,328 domains registered in March alone.

- Advertisement - Google News

According to the team of researchers, including Reethika Ramesh and Daiping Liu, the past three months have seen over 31 million queries for these malicious domains, underscoring the scale and persistence of this campaign.

Evolving Techniques and Geolocation-Based Lures

The smishing domains follow distinct naming patterns designed to mimic legitimate entities, such as “gov-[a-z0-9]*” or “paytoll[a-z0-9],” often using varied top-level domains (TLDs) like .top, .vip, .xin, or .com.

These domains are typically short-lived, with 70% of the associated traffic occurring within just seven days of registration.

This ephemeral nature makes timely detection and mitigation critical.

Unit 42’s telemetry reveals that blocking Newly Registered Domains (NRDs) for a month can filter out 85% of smishing traffic, offering a potent defense strategy for organizations.

Alarmingly, attackers are employing cloaking techniques to evade detection and are increasingly customizing their lures based on the geolocation of recipients’ phone numbers, derived from area codes.

This tailored approach heightens the likelihood of victims falling for scams that appear hyper-local and relevant, such as fraudulent toll payment requests or delivery notifications.

The data also highlights a concentration of domain registrations, with 75.4% tied to a single registrar, Dominet (HK) Limited, based in Hong Kong.

This centralization suggests a coordinated effort by threat actors to exploit registrar vulnerabilities or lax oversight.

Compared to 2024, smishing traffic has surged in 2025, reflecting an adaptive and aggressive strategy by cybercriminals.

Recent examples of malicious domains include “gov-mfc[.]com” registered on April 23, 2025, and “paytollwec[.]vip” from March 11, 2025, often hosting URLs that impersonate trusted brands like USPS or regional toll services to trick users into providing sensitive information or making payments.

According to the Report, this smishing epidemic serves as a stark reminder of the evolving sophistication of cyber threats.

The rapid registration of tens of thousands of domains, coupled with geolocation-based targeting, demonstrates how threat actors continuously refine their tactics to maximize impact.

Organizations and individuals must remain vigilant, leveraging advanced threat intelligence and proactive defenses like NRD blocking to counteract these short-lived but highly disruptive campaigns.

As Unit 42 continues to monitor and share indicators of compromise (IOCs), staying ahead of these deceptive practices will require a collaborative effort across cybersecurity communities to protect users from falling prey to these meticulously crafted scams.

Find this News Interesting! Follow us on Google NewsLinkedIn, & X to Get Instant Updates!

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Microsoft Patch Tuesday May 2025 Released With the Fixes for 72 Flaws With 5 Actively Exploited 0-Day

Microsoft has released its May 2025 Patch Tuesday updates, addressing 72 security vulnerabilities across...

Ivanti Released Security Updates to Fix for the Mutiple RCE Vulnerabilities – Patch Now

Ivanti, a leading enterprise software provider, has released critical security updates addressing vulnerabilities across...

Fortinet FortiVoice Zero-day Vulnerability Actively Exploited in The Wild

A critical stack-based buffer overflow vulnerability (CWE-121) has been discovered in multiple Fortinet products,...

Ransomware Attacks Surge by 123% Amid Evolving Tactics and Strategies

The 2025 Third-Party Breach Report from Black Kite highlights a staggering 123% surge in...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Microsoft Patch Tuesday May 2025 Released With the Fixes for 72 Flaws With 5 Actively Exploited 0-Day

Microsoft has released its May 2025 Patch Tuesday updates, addressing 72 security vulnerabilities across...

Ivanti Released Security Updates to Fix for the Mutiple RCE Vulnerabilities – Patch Now

Ivanti, a leading enterprise software provider, has released critical security updates addressing vulnerabilities across...

Fortinet FortiVoice Zero-day Vulnerability Actively Exploited in The Wild

A critical stack-based buffer overflow vulnerability (CWE-121) has been discovered in multiple Fortinet products,...