Tuesday, 02 January 2024 12:17 GMT

New Phishing Campaigns Weaponize Reserved Domain Name Space


(MENAFN- Procre8) DUBAI, UAE, xx February, 2026 - Phishing attacks are everywhere, but historically, their tactics follow clear patterns and trends. Research by Infoblox Threat Intel uncovers an anomaly – a new method utilized by cybercriminals to target victims. The malicious campaigns use a novel, previously unreported method to bypass security controls: abusing a part of the domain name space reserved for internet infrastructure to deliver phishing via spam. The actors are creating IPv6 tunnels and then using reverse DNS records to host the fraudulent sites. It’s a confusing, but equally effective attack vector, as these DNS records, hosted in the .arpa top-level-domain, are unlikely to be noticed by security products.

Unlike familiar TLDs such as and .net, which are used for web content, .arpa plays a special role in the Domain Name System (DNS). It is primarily used to map IP addresses to domains, providing reverse DNS records – not to host websites. Threat actors have discovered a feature in some DNS providers’ record-management controls that let them add IP address records for .arpa domains and then freely host malicious content behind that infrastructure. Then they acquire a free IPv6 tunnel to get a large number of IP addresses to use in the campaigns. IPv6 tunnels aren’t meant for this purpose either! They are intended to help transit the internet where only legacy IPv4 equipment exists.

“When we see attackers abusing .arpa, they’re weaponizing the very core of the internet,” said Dr. Renée Burton, VP, Infoblox Threat Intel. “Reverse DNS space was never designed to host web content, so most defenses don’t even look at it as a potential threat surface. By turning .arpa into a delivery mechanism for phishing, these actors effectively step around traditional controls that depend on domain reputation or URL structure. Defenders need to start treating DNS infrastructure itself as high value real estate for attackers, and they need the visibility to see abuse in any type of location.”

The phishing emails observed in these campaigns impersonate major brands and promise “free gifts” or prizes. The messages consist of a single image that hides an embedded hyperlink, sending victims through traffic distribution systems (TDSs) to fraudulent websites. All the while, the visible URL never reveals the strange .arpa-based reverse DNS strings that attackers are pulling.

MENAFN01032026003749002651ID1110805023



Procre8

Legal Disclaimer:
MENAFN provides the information “as is” without warranty of any kind. We do not accept any responsibility or liability for the accuracy, content, images, videos, licenses, completeness, legality, or reliability of the information contained in this article. If you have any complaints or copyright issues related to this article, kindly contact the provider above.

Search