Designed to Deceive: 6 Common Look-alike Domain Tactics

Originally published by Abnormal Security.Written by Mick Leach.With threat actors lurking around every digital corner, it can sometimes make scrolling through an inbox feel like traversing a minefield. Employing various strategies to deceive their targets, attackers count on end-user oversight to convince the recipients of their malicious emails that the messages (and any included requests) are legitimate.One effective strategy is the use of look-alike domains—URLs that closely resemble the …