403
Sorry!!
Error! We're sorry, but the page you were looking for doesn't exist.
New Phishing Campaigns Weaponize Reserved Domain Name Space
(MENAFN- Mid-East Info) New research from Infoblox Threat Intel shows how criminals twist a core part of the internet to slip past many of today's standard security checks.
DUBAI, UAE, February, 2026 – Phishing attacks are everywhere, but historically, their tactics follow clear patterns and trends. Research by Infoblox Threat Intel uncovers an anomaly – a new method utilized by cybercriminals to target victims. The malicious campaigns use a novel, previously unreported method to bypass security controls: abusing a part of the domain name space reserved for internet infrastructure to deliver phishing via spam. The actors are creating IPv6 tunnels and then using reverse DNS records to host the fraudulent sites. It's a confusing, but equally effective attack vector, as these DNS records, hosted in the top-level-domain, are unlikely to be noticed by security products. Unlike familiar TLDs such as and, which are used for web content,.arpa plays a special role in the Domain Name System (DNS). It is primarily used to map IP addresses to domains, providing reverse DNS records – not to host websites. Threat actors have discovered a feature in some DNS providers' record-management controls that let them add IP address records for domains and then freely host malicious content behind that infrastructure. Then they acquire a free IPv6 tunnel to get a large number of IP addresses to use in the campaigns. IPv6 tunnels aren't meant for this purpose either! They are intended to help transit the internet where only legacy IPv4 equipment exists. “When we see attackers abusing, they're weaponizing the very core of the internet,” said Dr. Renée Burton, VP, Infoblox Threat Intel.“Reverse DNS space was never designed to host web content, so most defenses don't even look at it as a potential threat surface. By turning into a delivery mechanism for phishing, these actors effectively step around traditional controls that depend on domain reputation or URL structure. Defenders need to start treating DNS infrastructure itself as high value real estate for attackers, and they need the visibility to see abuse in any type of location.” The phishing emails observed in these campaigns impersonate major brands and promise“free gifts” or prizes. The messages consist of a single image that hides an embedded hyperlink, sending victims through traffic distribution systems (TDSs) to fraudulent websites. All the while, the visible URL never reveals the strange reverse DNS strings that attackers are pulling. Attachments:
Infoblox unites networking, security and cloud to form a platform for operations that's as resilient as it is agile. Trusted by over 6,000 customers, including 92 of the Fortune 100, we seamlessly integrate, secure and automate critical network services so businesses can move fast without compromise.
DUBAI, UAE, February, 2026 – Phishing attacks are everywhere, but historically, their tactics follow clear patterns and trends. Research by Infoblox Threat Intel uncovers an anomaly – a new method utilized by cybercriminals to target victims. The malicious campaigns use a novel, previously unreported method to bypass security controls: abusing a part of the domain name space reserved for internet infrastructure to deliver phishing via spam. The actors are creating IPv6 tunnels and then using reverse DNS records to host the fraudulent sites. It's a confusing, but equally effective attack vector, as these DNS records, hosted in the top-level-domain, are unlikely to be noticed by security products. Unlike familiar TLDs such as and, which are used for web content,.arpa plays a special role in the Domain Name System (DNS). It is primarily used to map IP addresses to domains, providing reverse DNS records – not to host websites. Threat actors have discovered a feature in some DNS providers' record-management controls that let them add IP address records for domains and then freely host malicious content behind that infrastructure. Then they acquire a free IPv6 tunnel to get a large number of IP addresses to use in the campaigns. IPv6 tunnels aren't meant for this purpose either! They are intended to help transit the internet where only legacy IPv4 equipment exists. “When we see attackers abusing, they're weaponizing the very core of the internet,” said Dr. Renée Burton, VP, Infoblox Threat Intel.“Reverse DNS space was never designed to host web content, so most defenses don't even look at it as a potential threat surface. By turning into a delivery mechanism for phishing, these actors effectively step around traditional controls that depend on domain reputation or URL structure. Defenders need to start treating DNS infrastructure itself as high value real estate for attackers, and they need the visibility to see abuse in any type of location.” The phishing emails observed in these campaigns impersonate major brands and promise“free gifts” or prizes. The messages consist of a single image that hides an embedded hyperlink, sending victims through traffic distribution systems (TDSs) to fraudulent websites. All the while, the visible URL never reveals the strange reverse DNS strings that attackers are pulling. Attachments:
-
Infographic: An overview of the process used to abuse the TLD in phishing emails
Photograph: Dr. Renée Burton, VP, Infoblox Threat Intel
Infoblox unites networking, security and cloud to form a platform for operations that's as resilient as it is agile. Trusted by over 6,000 customers, including 92 of the Fortune 100, we seamlessly integrate, secure and automate critical network services so businesses can move fast without compromise.
Legal Disclaimer:
MENAFN provides the
information “as is” without warranty of any kind. We do not accept
any responsibility or liability for the accuracy, content, images,
videos, licenses, completeness, legality, or reliability of the information
contained in this article. If you have any complaints or copyright
issues related to this article, kindly contact the provider above.

Comments
No comment