Registration Patterns of Deceptive Domains

Registration Patterns of Deceptive Domains

A key requirement for a bad actor wanting to launch a brand attack is the registration of a carefully chosen domain name. The most convincing infringements frequently use a domain name that’s deceptively similar to that of the official site of the target brand. This allows a variety of attacks to be executed, including phishing attacks—where the domain is used to host a lookalike site or produce a deceptive sender address for emails—and other kinds of brand infringement where users are misdirected to fake sites via mistyped URLs or search engine manipulation.

One well established threat vector used in creating fraudulent websites is the use of strings like “www” or “http” within the domain name itself—e.g., registering domains such as or to impersonate the legitimate site (i.e., or

CSC carried out a study in August 2022 using its 3D Domain Monitoring technology to consider patterns of activity in domain registrations for names beginning with “www” or “http” over the preceding one-year period. The analysis includes identification of newly registered domains (N), re-registered domains (R) or dropped (i.e., lapsed) domains (D). Each instance of these activities for a particular domain is referred to as an “event.”


Between August 2021 and August 2022, more than 230,000 events were identified for “www” domains, and more than 12,000 for “http” domains. Figure 1 shows the continuous activity across the one-year period, with numerous peaks and troughs.

Figure 1:  Daily numbers of new registrations (N), re-registrations (R) and dropped (D) domains, for domain names beginning with “http” (left axis; blues / dark grey) and “www” (right axis; red / yellow / light grey).

Among the full dataset, a number of specific keyword strings were found to appear as the second-level domain names (the part of the domain name to the left of the dot) multiple times. They represent either repeated lapses and re-registrations of particular domain names, or the registration of distinct domains with the same second-level domain name but different top-level domain (TLD) extensions—so-called “cousin” domains. Of these keyword strings, several referenced well known brand names, or variations or typos of those names, indicating an intention to target the brand in question, as shown in Tables 1 and 2.

Keyword stringNo. registration or drop events
Table 1: Most frequently occurring brand-specific keyword second-level domain names in the dataset of “www” domains.

Keyword stringNo. registration or drop events
Table 2: Most frequently occurring brand-specific keyword second-level domain names in the dataset of “http” domains.

Tables 3 and 4 show the top TLDs represented within the dataset.

TLDNo. registration or drop events
Table 3: Top 10 TLDs represented in the dataset of events for “www” domains.

TLDNo. registration or drop events
Table 4: Top 10 TLDs represented in the dataset of events for “http” domains.

Unsurprisingly, .COM dominates the dataset, reflecting both the continued popularity of the TLD, and its extensive use in official domain names of the brands being impersonated. However, a range of new generic TLDs (gTLDs) such as .XYZ, .TOP, .VIP, .ONLINE, .LIVE, and .SITE also feature in the lists, consistent with previous observations that these extensions are popular with fraudsters[1],[2],[3].

Infringements targeting top brands

CSC also analysed the frequency of registration and drop events for “www” and “http” domains names incorporating any of the top 10 most valuable company brands in 2022[4], on the assumption that these are likely to be attractive targets for bad actors. The findings are shown in Table 5.

Brand stringNo. registration or drop events for “www” domainsNo. registration or drop events for “http” domains
Table 5: Numbers of registration and drop events for domains containing the names of the top 10 most valuable company brands in 2022.

The associated keywords also present in the domain names may give further insight into the intentions of those registering the domains. For example, in the dataset of 255 “apple” domain events, we frequently see certain keywords, their variants or misspellings, that may indicate phishing activity, including “login” (13 instances), “support” (47) and “activate” (17).

Significantly, of the 564 active, unique domains containing any of the top 10 brand names taken from the dataset above, 16% feature active MX records, meaning they’re configured to send or receive emails, another indicator that they may have been registered for use in phishing campaigns.

Looking at the content of the websites among the brand specific dataset, the majority of domains were inactive by the time of analysis, although several had been flagged as dangerous or deceptive at the browser level, suggesting they may have previously hosted fraudulent sites. Others included pay-per-click links, monetizing the misdirected web traffic attracted to these sites, and potentially driving users to competitor sites. Some of the sites also display banner advertisements to gambling-related or adult sites. Figure 2 shows three examples of websites found to feature live, infringing content.

Figure 2: Live fraudulent or infringing websites hosted on “www” or “http” domains, targeting Apple® (a potential phishing site), Microsoft®, and Facebook®.


Over one year, CSC’s 3D Domain Monitoring technology identified nearly a quarter of a million registration or drop events of domains designed to be deliberately deceptive, by virtue of the inclusion of the strings “www” or “http” at the start. A significant proportion of these appear to target specific brands, with 830 of the events corresponding to just the 10 most valuable brands.

Several domains were found to resolve (or previously resolved) to infringing content, while 16% of the domains relating to the 10 most valuable brands were configured with active MX records. This indicates they may have been registered for their email function—an indicator of possible phishing campaigns.

These findings highlight the importance of brand owners employing an active domain monitoring and enforcement program. CSC’s 3D Domain Monitoring technology can detect the registration, re-registration, and dropping of domain names containing brand terms and other keywords of interest—including variants like fuzzy matches and character replacements—across a wide range of extensions. This enables brand owners to identify and mediate the risks associated with infringing third-party domain registration activity.

If you’d like to find out more about CSC’s 3D Domain Monitoring and Enforcement services, please complete our contact form to speak to one of our specialists.