{"id":11866,"date":"2022-12-16T10:19:22","date_gmt":"2022-12-16T15:19:22","guid":{"rendered":"https:\/\/www.cscdbs.com\/blog\/?p=11866"},"modified":"2026-05-05T06:52:22","modified_gmt":"2026-05-05T10:52:22","slug":"the-highest-threat-tlds-part-2","status":"publish","type":"post","link":"https:\/\/www.cscdbs.com\/blog\/the-highest-threat-tlds-part-2\/","title":{"rendered":"The Highest Threat TLDs \u2013 Part 2"},"content":{"rendered":"\n<p>In the first article<sup><a href=\"#_ftn1\" id=\"_ftnref1\">[1]<\/a><\/sup> of this two-part blog series, we looked at <a href=\"https:\/\/www.cscdbs.com\/blog\/the-highest-threat-tlds-part-1\/\">how frequently domains were used by bad actors for phishing activity<\/a> across individual top-level domains (TLDs) or domain extensions, using data from CSC\u2019s Fraud Protection services, <a href=\"https:\/\/www.cscdbs.com\/en\/domainsec-threat-intelligence-platform\/\">powered by our DomainSec<sup>SM<\/sup> platform<\/a>. In this second article, we analyze multiple datasets to determine the highest-threat TLDs, based on the frequency with which the domains are used egregiously for a range of cybercrimes.<\/p>\n\n\n\n<p>In this deeper dive, we look at the following datasets:<\/p>\n\n\n\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\">\n<ol style=\"list-style-type:1\" class=\"wp-block-list\">\n<li>Spamhaus\u2019 10 most abused TLDs<a id=\"_ftnref2\" href=\"#_ftn2\"><sup>[2]<\/sup><\/a>, reflecting information in its domain blocking list and containing domains with poor reputations (generally those found to be associated with spam or malware).<\/li>\n\n\n\n<li>Netcraft\u2019s 50 TLDs<sup><a id=\"_ftnref3\" href=\"#_ftn3\">[3]<\/a> <\/sup>with the highest ratios of cybercrime incidents to active sites, generally reflecting phishing and malware incidences.<\/li>\n\n\n\n<li>Palo Alto Networks\u2019 10 TLDs<a id=\"_ftnref4\" href=\"#_ftn4\"><sup>[4]<\/sup><\/a> with the highest rates of malicious domains, reflecting four categories of malicious content (malware, phishing, command and control (C2), and grayware), and expressed as the median of the absolute deviation from the median (MAD).<\/li>\n\n\n\n<li>Data from CSC\u2019s Fraud Protection services, as discussed in <a href=\"https:\/\/www.cscdbs.com\/blog\/the-highest-threat-tlds-part-1\/\">part one<\/a> of this series.<\/li>\n<\/ol>\n<\/div><\/div>\n\n\n\n<p>Each dataset measures the proportion of domains across each TLD deemed to be associated with threatening content<a id=\"_ftnref5\" href=\"#_ftn5\"><sup>[5]<\/sup><\/a>. For datasets 1, 2 and 3 as outlined above, proportions are expressed as the total number of domains analyzed for the TLD in question.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<p><strong><em>Methodology: For ease of comparison, the threat frequency for each TLD within each dataset is again normalized, so that in each case the value for the highest-threat TLD is 1. The overall threat frequency for a TLD is then calculated as the average of the normalized scores across the datasets in which it appears. We excluded any TLDs from the results that were only present in CSC\u2019s dataset and where fewer than 50 phishing cases were recorded.<\/em><\/strong><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Analysis and discussion<\/strong><\/h2>\n\n\n\n<p>The above methodology yields the following list in Table 1 for the top 30 highest-threat TLDs, ranked by overall normalized threat frequency.<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td class=\"has-text-align-center\" data-align=\"center\"><strong>TLD<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>Threat frequency<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>Registry<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>Operator<a id=\"_ftnref6\" href=\"#_ftn6\"><strong><sup>[6]<\/sup><\/strong><\/a><\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>Region (country) or type<\/strong><\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">.CI<\/td><td class=\"has-text-align-center\" data-align=\"center\">1.000<\/td><td class=\"has-text-align-center\" data-align=\"center\">Autorit\u00e9 de R\u00e9gulation des T\u00e9l\u00e9communications; TIC de C\u00f4te d\u2019lvoire (ARTCI)<\/td><td class=\"has-text-align-center\" data-align=\"center\">Autorit\u00e9 de R\u00e9gulation des T\u00e9l\u00e9communications; TIC de C\u00f4te d\u2019lvoire (ARTCI)<\/td><td class=\"has-text-align-center\" data-align=\"center\">Africa (Ivory Coast)<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">.ZW<\/td><td class=\"has-text-align-center\" data-align=\"center\">1.000<\/td><td class=\"has-text-align-center\" data-align=\"center\">Postal and Telecommunications Regulatory Authority of Zimbabwe (POTRAZ)<\/td><td class=\"has-text-align-center\" data-align=\"center\">TelOne Pvt Ltd<\/td><td class=\"has-text-align-center\" data-align=\"center\">Africa (Zimbabwe)<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">.SX<\/td><td class=\"has-text-align-center\" data-align=\"center\">0.945<\/td><td class=\"has-text-align-center\" data-align=\"center\">SX Registry SA B.V.<\/td><td class=\"has-text-align-center\" data-align=\"center\">Canadian Internet Registration Authority (CIRA)<\/td><td class=\"has-text-align-center\" data-align=\"center\">Caribbean (Sint Maarten)<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">.MW<\/td><td class=\"has-text-align-center\" data-align=\"center\">0.862<\/td><td class=\"has-text-align-center\" data-align=\"center\">Malawi Sustainable Development Network Programme<\/td><td class=\"has-text-align-center\" data-align=\"center\">Malawi Sustainable Development Network Programme<\/td><td class=\"has-text-align-center\" data-align=\"center\">Africa (Malawi)<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">.AM<\/td><td class=\"has-text-align-center\" data-align=\"center\">0.608<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u201cInternet Society\u201d Non-Governmental Organization<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u201cInternet Society\u201d Non-Governmental Organization<\/td><td class=\"has-text-align-center\" data-align=\"center\">Asia (Armenia)<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">.DATE*<\/td><td class=\"has-text-align-center\" data-align=\"center\">0.506<\/td><td class=\"has-text-align-center\" data-align=\"center\">.DATE Limited<\/td><td class=\"has-text-align-center\" data-align=\"center\">GoDaddy<sup>\u00ae<\/sup> Registry<\/td><td class=\"has-text-align-center\" data-align=\"center\">New gTLD<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">.CD<\/td><td class=\"has-text-align-center\" data-align=\"center\">0.391<\/td><td class=\"has-text-align-center\" data-align=\"center\">Office Congolais des Postes et T\u00e9l\u00e9communications (OCPT)<\/td><td class=\"has-text-align-center\" data-align=\"center\">Office Congolais des Postes et T\u00e9l\u00e9communications (OCPT)<\/td><td class=\"has-text-align-center\" data-align=\"center\">Africa (Democratic Rep. of the Congo)<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">.KE<\/td><td class=\"has-text-align-center\" data-align=\"center\">0.381<\/td><td class=\"has-text-align-center\" data-align=\"center\">Kenya Network Information Center (KeNIC)<\/td><td class=\"has-text-align-center\" data-align=\"center\">Kenya Network Information Center (KeNIC)<\/td><td class=\"has-text-align-center\" data-align=\"center\">Africa (Kenya)<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">.APP*<\/td><td class=\"has-text-align-center\" data-align=\"center\">0.377<\/td><td class=\"has-text-align-center\" data-align=\"center\">Charleston Road Registry Inc.<\/td><td class=\"has-text-align-center\" data-align=\"center\">Google<sup>\u00ae<\/sup> Inc.<\/td><td class=\"has-text-align-center\" data-align=\"center\">New gTLD<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">.BID*<\/td><td class=\"has-text-align-center\" data-align=\"center\">0.361<\/td><td class=\"has-text-align-center\" data-align=\"center\">.BID Limited<\/td><td class=\"has-text-align-center\" data-align=\"center\">GoDaddy Registry<\/td><td class=\"has-text-align-center\" data-align=\"center\">New gTLD<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">.LY<\/td><td class=\"has-text-align-center\" data-align=\"center\">0.356<\/td><td class=\"has-text-align-center\" data-align=\"center\">General Post and Telecommunication Company<\/td><td class=\"has-text-align-center\" data-align=\"center\">Libya Telecom and Technology<\/td><td class=\"has-text-align-center\" data-align=\"center\">Africa (Libya)<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">.BD<\/td><td class=\"has-text-align-center\" data-align=\"center\">0.351<\/td><td class=\"has-text-align-center\" data-align=\"center\">Posts and Telecommunications Division<\/td><td class=\"has-text-align-center\" data-align=\"center\">Bangladesh Telecommunications Company Limited (BTCL)<\/td><td class=\"has-text-align-center\" data-align=\"center\">Asia (Bangladesh)<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">.SURF*<\/td><td class=\"has-text-align-center\" data-align=\"center\">0.325<\/td><td class=\"has-text-align-center\" data-align=\"center\">Registry Services, LLC<\/td><td class=\"has-text-align-center\" data-align=\"center\">GoDaddy Registry<\/td><td class=\"has-text-align-center\" data-align=\"center\">New gTLD<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">.SBS*<\/td><td class=\"has-text-align-center\" data-align=\"center\">0.250<\/td><td class=\"has-text-align-center\" data-align=\"center\">ShortDot<\/td><td class=\"has-text-align-center\" data-align=\"center\">CentralNic<\/td><td class=\"has-text-align-center\" data-align=\"center\">New gTLD<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">.PW<\/td><td class=\"has-text-align-center\" data-align=\"center\">0.240<\/td><td class=\"has-text-align-center\" data-align=\"center\">Micronesia Investment and Development Corporation<\/td><td class=\"has-text-align-center\" data-align=\"center\">Radix FZC<\/td><td class=\"has-text-align-center\" data-align=\"center\">Asia (Palau)<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">.DEV*<\/td><td class=\"has-text-align-center\" data-align=\"center\">0.222<\/td><td class=\"has-text-align-center\" data-align=\"center\">Charleston Road Registry Inc.<\/td><td class=\"has-text-align-center\" data-align=\"center\">Google Inc.<\/td><td class=\"has-text-align-center\" data-align=\"center\">New gTLD<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">.QUEST*<\/td><td class=\"has-text-align-center\" data-align=\"center\">0.209<\/td><td class=\"has-text-align-center\" data-align=\"center\">XYZ.COM LLC<\/td><td class=\"has-text-align-center\" data-align=\"center\">CentralNic<\/td><td class=\"has-text-align-center\" data-align=\"center\">New gTLD<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">.TOP*<\/td><td class=\"has-text-align-center\" data-align=\"center\">0.196<\/td><td class=\"has-text-align-center\" data-align=\"center\">Jiangsu Bangning Science and Technology Co., Ltd.<\/td><td class=\"has-text-align-center\" data-align=\"center\">Jiangsu Bangning Science and Technology Co., Ltd.<\/td><td class=\"has-text-align-center\" data-align=\"center\">New gTLD<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">.PAGE*<\/td><td class=\"has-text-align-center\" data-align=\"center\">0.195<\/td><td class=\"has-text-align-center\" data-align=\"center\">Charleston Road Registry Inc.<\/td><td class=\"has-text-align-center\" data-align=\"center\">Google Inc.<\/td><td class=\"has-text-align-center\" data-align=\"center\">New gTLD<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">.GQ<\/td><td class=\"has-text-align-center\" data-align=\"center\">0.192<\/td><td class=\"has-text-align-center\" data-align=\"center\">GETESA<\/td><td class=\"has-text-align-center\" data-align=\"center\">Equatorial Guinea Domains B.V. (Freenom)<\/td><td class=\"has-text-align-center\" data-align=\"center\">Africa (Equatorial Guinea)<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">.CF<\/td><td class=\"has-text-align-center\" data-align=\"center\">0.168<\/td><td class=\"has-text-align-center\" data-align=\"center\">Societe Centrafricaine de Telecommunications (SOCATEL)<\/td><td class=\"has-text-align-center\" data-align=\"center\">Centrafrique TLD B.V. (Freenom)<\/td><td class=\"has-text-align-center\" data-align=\"center\">Africa (Central African Republic)<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">.GA<\/td><td class=\"has-text-align-center\" data-align=\"center\">0.164<\/td><td class=\"has-text-align-center\" data-align=\"center\">Agence Nationale des Infrastructures Num\u00e9riques et des Fr\u00e9quences (ANINF)<\/td><td class=\"has-text-align-center\" data-align=\"center\">Agence Nationale des Infrastructures Num\u00e9riques et des Fr\u00e9quences (ANINF) (Freenom)<\/td><td class=\"has-text-align-center\" data-align=\"center\">Africa (Gabon)<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">.ML<\/td><td class=\"has-text-align-center\" data-align=\"center\">0.157<\/td><td class=\"has-text-align-center\" data-align=\"center\">Agence des Technologies de l\u2019Information et de la Communication<\/td><td class=\"has-text-align-center\" data-align=\"center\">Mali Dili B.V. (Freenom)<\/td><td class=\"has-text-align-center\" data-align=\"center\">Africa (Mali)<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">.BUZZ*<\/td><td class=\"has-text-align-center\" data-align=\"center\">0.149<\/td><td class=\"has-text-align-center\" data-align=\"center\">DOTSTRATEGY CO.<\/td><td class=\"has-text-align-center\" data-align=\"center\">GoDaddy Registry<\/td><td class=\"has-text-align-center\" data-align=\"center\">New gTLD<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">.CYOU*<\/td><td class=\"has-text-align-center\" data-align=\"center\">0.141<\/td><td class=\"has-text-align-center\" data-align=\"center\">ShortDot<\/td><td class=\"has-text-align-center\" data-align=\"center\">CentralNic<\/td><td class=\"has-text-align-center\" data-align=\"center\">New gTLD<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">.CN<\/td><td class=\"has-text-align-center\" data-align=\"center\">0.130<\/td><td class=\"has-text-align-center\" data-align=\"center\">CNNIC<\/td><td class=\"has-text-align-center\" data-align=\"center\">CNNIC<\/td><td class=\"has-text-align-center\" data-align=\"center\">Asia (China)<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">.MONSTER*<\/td><td class=\"has-text-align-center\" data-align=\"center\">0.106<\/td><td class=\"has-text-align-center\" data-align=\"center\">XYZ.COM LLC<\/td><td class=\"has-text-align-center\" data-align=\"center\">CentralNic<\/td><td class=\"has-text-align-center\" data-align=\"center\">New gTLD<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">.BAR*<\/td><td class=\"has-text-align-center\" data-align=\"center\">0.104<\/td><td class=\"has-text-align-center\" data-align=\"center\">Punto 2012 Sociedad Anonima Promotora de Inversion de Capital Variable<\/td><td class=\"has-text-align-center\" data-align=\"center\">CentralNic<\/td><td class=\"has-text-align-center\" data-align=\"center\">New gTLD<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">.HOST*<\/td><td class=\"has-text-align-center\" data-align=\"center\">0.101<\/td><td class=\"has-text-align-center\" data-align=\"center\">Radix FZC<\/td><td class=\"has-text-align-center\" data-align=\"center\">CentralNic<\/td><td class=\"has-text-align-center\" data-align=\"center\">New gTLD<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">.IO<\/td><td class=\"has-text-align-center\" data-align=\"center\">0.085<\/td><td class=\"has-text-align-center\" data-align=\"center\">Internet Computer Bureau Limited<\/td><td class=\"has-text-align-center\" data-align=\"center\">Internet Computer Bureau Limited<\/td><td class=\"has-text-align-center\" data-align=\"center\">Asia (British Indian Ocean Territory)<\/td><\/tr><\/tbody><\/table><figcaption class=\"wp-element-caption\"><strong>Table 1: <\/strong>The top 30 TLDs with the highest overall normalized threat frequencies.<br \/>*Extensions where there are currently no customer domains under CSC\u2019s management.<\/figcaption><\/figure>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Table 2 shows the datasets in which each of the top 30 TLDs appear.<\/p>\n\n\n\n<figure class=\"wp-block-table aligncenter\"><table><tbody><tr><td><strong>TLD<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>Spamhaus<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>Netcraft<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>Palo Alto Networks<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>CSC<\/strong><\/td><\/tr><tr><td>.CI<\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>\u2713<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>\u2713<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><\/td><td class=\"has-text-align-center\" data-align=\"center\">&nbsp;<\/td><\/tr><tr><td>.ZW<\/td><td class=\"has-text-align-center\" data-align=\"center\"><\/td><td class=\"has-text-align-center\" data-align=\"center\">&nbsp;<\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>\u2713<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\">&nbsp;<\/td><\/tr><tr><td>.SX<\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>\u2713<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\">&nbsp;<\/td><td class=\"has-text-align-center\" data-align=\"center\">&nbsp;<\/td><td class=\"has-text-align-center\" data-align=\"center\">&nbsp;<\/td><\/tr><tr><td>.MW<\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>\u2713<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>\u2713<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\">&nbsp;<\/td><td class=\"has-text-align-center\" data-align=\"center\">&nbsp;<\/td><\/tr><tr><td>.AM<\/td><td class=\"has-text-align-center\" data-align=\"center\">&nbsp;<\/td><td class=\"has-text-align-center\" data-align=\"center\">&nbsp;<\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>\u2713<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\">&nbsp;<\/td><\/tr><tr><td>.DATE<\/td><td class=\"has-text-align-center\" data-align=\"center\">&nbsp;<\/td><td class=\"has-text-align-center\" data-align=\"center\">&nbsp;<\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>\u2713<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\">&nbsp;<\/td><\/tr><tr><td>.CD<\/td><td class=\"has-text-align-center\" data-align=\"center\">&nbsp;<\/td><td class=\"has-text-align-center\" data-align=\"center\">&nbsp;<\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>\u2713<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\">&nbsp;<\/td><\/tr><tr><td>.KE<\/td><td class=\"has-text-align-center\" data-align=\"center\">&nbsp;<\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>\u2713<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>\u2713<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>\u2713<\/strong><\/td><\/tr><tr><td>.APP<\/td><td class=\"has-text-align-center\" data-align=\"center\">&nbsp;<\/td><td class=\"has-text-align-center\" data-align=\"center\">&nbsp;<\/td><td class=\"has-text-align-center\" data-align=\"center\"><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>\u2713<\/strong><\/td><\/tr><tr><td>.BID<\/td><td class=\"has-text-align-center\" data-align=\"center\">&nbsp;<\/td><td class=\"has-text-align-center\" data-align=\"center\">&nbsp;<\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>\u2713<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><\/td><\/tr><tr><td>.LY<\/td><td class=\"has-text-align-center\" data-align=\"center\">&nbsp;<\/td><td class=\"has-text-align-center\" data-align=\"center\">&nbsp;<\/td><td class=\"has-text-align-center\" data-align=\"center\"><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>\u2713<\/strong><\/td><\/tr><tr><td>.BD<\/td><td class=\"has-text-align-center\" data-align=\"center\">&nbsp;<\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>\u2713<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>\u2713<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>\u2713<\/strong><\/td><\/tr><tr><td>.SURF<\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>\u2713<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>\u2713<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\">&nbsp;<\/td><td class=\"has-text-align-center\" data-align=\"center\">&nbsp;<\/td><\/tr><tr><td>.SBS<\/td><td class=\"has-text-align-center\" data-align=\"center\">&nbsp;<\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>\u2713<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>\u2713<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>\u2713<\/strong><\/td><\/tr><tr><td>.PW<\/td><td class=\"has-text-align-center\" data-align=\"center\">&nbsp;<\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>\u2713<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>\u2713<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><\/td><\/tr><tr><td>.DEV<\/td><td class=\"has-text-align-center\" data-align=\"center\">&nbsp;<\/td><td class=\"has-text-align-center\" data-align=\"center\">&nbsp;<\/td><td class=\"has-text-align-center\" data-align=\"center\">&nbsp;<\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>\u2713<\/strong><\/td><\/tr><tr><td>.QUEST<\/td><td class=\"has-text-align-center\" data-align=\"center\"><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>\u2713<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>\u2713<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><\/td><\/tr><tr><td>.TOP<\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>\u2713<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>\u2713<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\">&nbsp;<\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>\u2713<\/strong><\/td><\/tr><tr><td>.PAGE<\/td><td class=\"has-text-align-center\" data-align=\"center\"><\/td><td class=\"has-text-align-center\" data-align=\"center\">&nbsp;<\/td><td class=\"has-text-align-center\" data-align=\"center\">&nbsp;<\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>\u2713<\/strong><\/td><\/tr><tr><td>.GQ<\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>\u2713<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\">&nbsp;<\/td><td class=\"has-text-align-center\" data-align=\"center\">&nbsp;<\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>\u2713<\/strong><\/td><\/tr><tr><td>.CF<\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>\u2713<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\">&nbsp;<\/td><td class=\"has-text-align-center\" data-align=\"center\">&nbsp;<\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>\u2713<\/strong><\/td><\/tr><tr><td>.GA<\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>\u2713<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\">&nbsp;<\/td><td class=\"has-text-align-center\" data-align=\"center\">&nbsp;<\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>\u2713<\/strong><\/td><\/tr><tr><td>.ML<\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>\u2713<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\">&nbsp;<\/td><td class=\"has-text-align-center\" data-align=\"center\">&nbsp;<\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>\u2713<\/strong><\/td><\/tr><tr><td>.BUZZ<\/td><td class=\"has-text-align-center\" data-align=\"center\">&nbsp;<\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>\u2713<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\">&nbsp;<\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>\u2713<\/strong><\/td><\/tr><tr><td>.CYOU<\/td><td class=\"has-text-align-center\" data-align=\"center\">&nbsp;<\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>\u2713<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\">&nbsp;<\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>\u2713<\/strong><\/td><\/tr><tr><td>.CN<\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>\u2713<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>\u2713<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\">&nbsp;<\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>\u2713<\/strong><\/td><\/tr><tr><td>.MONSTER<\/td><td class=\"has-text-align-center\" data-align=\"center\">&nbsp;<\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>\u2713<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\">&nbsp;<\/td><td class=\"has-text-align-center\" data-align=\"center\">&nbsp;<\/td><\/tr><tr><td>.BAR<\/td><td class=\"has-text-align-center\" data-align=\"center\">&nbsp;<\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>\u2713<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\">&nbsp;<\/td><td class=\"has-text-align-center\" data-align=\"center\">&nbsp;<\/td><\/tr><tr><td>.HOST<\/td><td class=\"has-text-align-center\" data-align=\"center\">&nbsp;<\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>\u2713<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\">&nbsp;<\/td><td class=\"has-text-align-center\" data-align=\"center\">&nbsp;<\/td><\/tr><tr><td>.IO<\/td><td class=\"has-text-align-center\" data-align=\"center\">&nbsp;<\/td><td class=\"has-text-align-center\" data-align=\"center\"><\/td><td class=\"has-text-align-center\" data-align=\"center\">&nbsp;<\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>\u2713<\/strong><\/td><\/tr><\/tbody><\/table><figcaption class=\"wp-element-caption\"><strong>Table 2:<\/strong> Datasets in which each of the top 30 TLDs by overall threat frequency appear.<\/figcaption><\/figure>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>It\u2019s significant that this list is dominated by extensions from Africa, Asia, and the Caribbean, as well as several new gTLDs. The latter is consistent with the observation that new gTLDs tend to be disproportionately more abused than legacy TLDs, although they tend to have better processes for tackling infringements<a id=\"_ftnref7\" href=\"#_ftn7\"><sup>[7]<\/sup><\/a>. Nearly half of the TLDs in this list are operated by just three organizations, namely CentralNic (six TLDs), Freenom (four), and GoDaddy Registry (four)\u2014all consumer-grade registrars.<\/p>\n\n\n\n<p>The Anti-Phishing Working Group\u2019s (APWG\u2019s) comprehensive Global Phishing Survey<a id=\"_ftnref8\" href=\"#_ftn8\"><sup>[8]<\/sup><\/a> of 2017, which analyzed the TLDs most frequently associated with phishing domains, also showed some similar trends (although the landscape may have changed somewhat since 2017). Its top 10 TLDs by frequency of phishing domains was dominated by African and Asian country-code TLDs (ccTLDs), with three of the top five (.ML, .BD and .KE) featuring in our top 30 list.<\/p>\n\n\n\n<p>The below observations from the analysis are also notable:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Some of the TLDs in the list have special significance:\n<ul class=\"wp-block-list\">\n<li><strong>.LY<\/strong> \u2013 The frequency of this extension\u2019s use in conjunction with threatening content is strongly influenced by its appearance in URL-shortening services (e.g., bit.ly, cutt.ly and ow.ly). This means its threat frequency is disproportionately large compared with what would be expected from its use solely as a ccTLD.<\/li>\n\n\n\n<li><strong>.IO<\/strong> \u2013 The .IO extension is popularly used in domains with technology-related content, particularly anything associated with the range of Apple (iOS) operating systems. Many of the threat sites in this analysis are on compromised .IO domains, or subdomains of sites such as github.io, rather than reflecting any factors related to the British Indian Ocean Territory.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The top 30 highest-threat TLDs includes four of the five free extensions offered by Freenom (with the exception of .TK, where the threat frequency is likely to be diminished by the large absolute number of registrations across the TLD). Their business model allows customers to register domains for free, with the option to make subsequent payments, depending on how the domain will be used. This makes these extensions particularly popular with phishers, who may discard their domains after a few days\u2019 use for a phishing attack.<\/li>\n<\/ul>\n\n\n\n<p>Figure 1 shows how the threat scores compare with the total number of customer domains under CSC\u2019s management across the observed TLDs<a id=\"_ftnref9\" href=\"#_ftn9\"><sup>[9]<\/sup><\/a>.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><img decoding=\"async\" src=\"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/images\/TLD%202%20chart%201.png\" alt=\"\" style=\"width:840px;height:624px\" \/><figcaption class=\"wp-element-caption\"><strong>Figure 1:<\/strong> Total numbers of customer domains under CSC\u2019s management (where not zero) as a function of overall normalized TLD threat frequency, for the top 30 highest threat TLDs.<\/figcaption><\/figure>\n<\/div>\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>It\u2019s notable that most of the highest threat TLDs are associated with only small numbers of domains under CSC\u2019s management. Therefore, one clear recommendation is that brand owners may want to consider defensively registering domain names featuring high-relevance brand terms across the high-risk extensions where possible, to prevent them from being fraudulently registered by third parties.<\/p>\n\n\n\n<p>When exploring a defensive registration strategy, brand owners should also consider registering domains containing specific brand variants or keywords that are frequently associated with phishing activity, rather than just registering exact brand matches across TLDs of particular concern. These might include common character replacements, keywords like &#8220;login&#8221;, &#8220;jobs&#8221;, &#8220;invest&#8221; or other industry-related keywords.<\/p>\n\n\n\n<p><strong><em>Where relevant domains have already been taken across high-threat TLDs, it may be advantageous to monitor them for possible future changes in content, or to launch enforcement actions or acquisition processes in cases where infringing content is identified.<\/em><\/strong><\/p>\n\n\n\n<p>It\u2019s also worth considering the list of top TLDs by the number of customer domains under CSC\u2019s management (Figure 2). It\u2019s noteworthy that only one of the TLDs from the top 30 highest-threat extensions (.CN) currently appears in this list (alongside .COM.CN).<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" src=\"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/images\/TLD%202%20chart%202.png\" alt=\"\" \/><figcaption class=\"wp-element-caption\"><strong>Figure 2:<\/strong> Top TLDs by most registered customer domains under CSC\u2019s management.<\/figcaption><\/figure>\n<\/div>\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>It\u2019s often observed that many of the highest-risk TLDs do, however, experience high levels of registration activity overall\u2014with significant proportions associated with fraudulent use\u2014of which much is via consumer-grade registrars, often with little legitimate activity seen by enterprise-class providers. Previous CSC studies established that most brand-related domain names on risky domain extensions are typically registered by third parties and are often involved in cybersquatting or malicious use. In one study looking at the .ICU \u201ccousins\u201d of the core domains of several top brands\u2014i.e., the same second-level domain name, but on the. ICU extension\u2014around three quarters of the domains used suspect DNS providers that were not under the control of the brand owner.<\/p>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>CSC recommendations<\/strong><\/h2>\n\n\n\n<p>CSC has a short list of recommendations to help brand owners tackle the issues outlined in these articles.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>1. Start at the foundations<\/strong><\/h3>\n\n\n\n<p>Everything in cybersecurity comes back to the humble domain name. It\u2019s vital to have a comprehensive view of your domain portfolio\u2014what domains you have, and which are business-critical, tactical, or defensive. <a href=\"https:\/\/www.cscdbs.com\/en\/domain-management\/\">CSC\u2019s Domain Management services<\/a> allow organizations to manage their portfolios of official corporate domains. Deploying blocking or alerting services provides visibility of attempts by third parties to register domains containing brand-related terms. CSC\u2019s Brand Advisory Team can consult on domain registration strategies.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>2. Keep them secure<\/strong><\/h3>\n\n\n\n<p>Third parties registering branded domains is just part of the issue. Keeping your official domains secure from the unauthorized changes to a domain\u2019s infrastructure that form the basis for targeted attacks like domain hijacking, email spoofing, and phishing, is another part of the picture. As an enterprise-class provider, CSC offers several <a href=\"https:\/\/www.cscdbs.com\/en\/domainsec-threat-intelligence-platform\/\">domain security solutions<\/a> that allow organizations to secure their corporate domains and maintain a defense-in-depth approach as part of a robust security posture. These measures include CSC\u2019s MultiLock, domain name system security extensions (DNSSEC), use of certificate authority authorization (CAA) records, domain-based message authentication, reporting, and conformance (DMARC), sender policy framework (SPF), and domain keys identified mail (DKIM).<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>3. Monitor closely for potential threats<\/strong><\/h3>\n\n\n\n<p>Domain intelligence is power. Monitoring for the registration, re-registration, and dropping of brand-related domain names is highly recommended, together with using this knowledge to inform when a brand should act. <a href=\"https:\/\/www.cscdbs.com\/en\/solutions\/3d-domain-security-enforcement\/\">CSC&#8217;s 3D Domain Security and Enforcement service<\/a> does just this, encompassing a range of brand variants including fuzzy matches and character replacements. The monitoring covers a wide range of domain extensions, including high-threat TLDs. This service also monitors high-relevance domains 24&#215;7, tracking them for relevant changes in content.<\/p>\n\n\n\n<p>For brands where phishing is a concern, we recommend augmenting domain or internet content monitoring with a phishing protection service. This will improve coverage over areas that may not otherwise be detected, e.g., non-brand-specific domain names or unindexed internet content. <a href=\"https:\/\/www.cscdbs.com\/en\/solutions\/enterprise-fraud-protection\/\">CSC\u2019s phishing detection products<\/a> use a range of data sources, including spam traps and honeypots, alongside other data feeds such as customer abuse mailbox data and webserver logs. The results are fed into a correlation engine\u2014driven by CSC&#8217;s machine learning deep search (MLDS) technology\u2014to detect fraudulent sites by analyzing URL patterns and comparing the sites with known predictors of fraudulent content.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>4. Enforce on infringements<\/strong><\/h3>\n\n\n\n<p>Points 1 to 3 aim to reduce the appearance of cyber risks, but for existing infringements it\u2019s important to have an effective enforcement solution to protect your brand. <a href=\"https:\/\/www.cscdbs.com\/en\/solutions\/brand-monitoring\/\">CSC\u2019s Enforcement services<\/a> includes 24&#215;7 rapid take down of a variety of infringement types. We use a toolkit approach with a wide range of enforcement methodology options, using the most efficient and cost-effective option in any given case, while reserving other options for escalation. Effective use of enforcement enables any brand to protect its reputation, and potentially reclaim lost revenue from fraudulent activity and redirection to third-party sites.<\/p>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>We\u2019re ready to talk<\/strong><\/h2>\n\n\n\n<p>If you\u2019d like more information about any of the services mentioned in this article or would like to talk to one of our experts about a how you can improve your organization&#8217;s overall domain security posture, <a href=\"https:\/\/www.cscdbs.com\/en\/contact-us\/\">fill in our contact form<\/a>. Mention this article name and the service and issue you\u2019d like to talk about.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<p style=\"font-size:15px\"><a href=\"#_ftnref1\" id=\"_ftn1\">[1]<\/a> cscdbs.com\/blog\/the-highest-threat-tlds-part-1\/<\/p>\n\n\n\n<p style=\"font-size:15px\"><a id=\"_ftn2\" href=\"#_ftnref2\">[2]<\/a> spamhaus.org\/statistics\/tlds\/<\/p>\n\n\n\n<p style=\"font-size:15px\"><a href=\"#_ftnref3\" id=\"_ftn3\">[3]<\/a> trends.netcraft.com\/cybercrime\/tlds<\/p>\n\n\n\n<p style=\"font-size:15px\"><a href=\"#_ftnref4\" id=\"_ftn4\">[4]<\/a> unit42.paloaltonetworks.com\/top-level-domains-cybercrime\/<\/p>\n\n\n\n<p style=\"font-size:15px\"><a href=\"#_ftnref5\" id=\"_ftn5\">[5]<\/a> For datasets one and two, all statistics are correct as of 13 June 2022.<\/p>\n\n\n\n<p style=\"font-size:15px\"><a href=\"#_ftnref6\" id=\"_ftn6\">[6]<\/a> From iana.org<\/p>\n\n\n\n<p style=\"font-size:15px\"><a id=\"_ftn7\" href=\"#_ftnref7\">[7]<\/a> op.europa.eu\/en\/publication-detail\/-\/publication\/7d16c267-7f1f-11ec-8c40-01aa75ed71a1<\/p>\n\n\n\n<p style=\"font-size:15px\"><a href=\"#_ftnref8\" id=\"_ftn8\">[8]<\/a> docs.apwg.org\/\/reports\/APWG_Global_Phishing_Report_2015-2016.pdf<\/p>\n\n\n\n<p style=\"font-size:15px\"><a href=\"#_ftnref9\" id=\"_ftn9\">[9]<\/a> Data correct as of June 2022<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In the first article[1] of this two-part blog series, we looked at how frequently domains were used by bad actors for phishing activity across individual top-level domains (TLDs) or domain extensions, using data from CSC\u2019s Fraud Protection services, powered by our DomainSecSM platform. In this second article, we analyze multiple datasets to determine the highest-threat [&hellip;]<\/p>\n","protected":false},"author":17,"featured_media":10443,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[9,521],"tags":[],"class_list":["post-11866","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-brands","category-send-email"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The Highest Threat TLDs \u2013 Part 2 | CSC<\/title>\n<meta name=\"description\" content=\"In the first article of this two-part blog series, we looked at how frequently domains were used by bad actors for phishing activity across individual\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cscdbs.com\/blog\/the-highest-threat-tlds-part-2\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Highest Threat TLDs \u2013 Part 2 | CSC\" \/>\n<meta property=\"og:description\" content=\"In the first article of this two-part blog series, we looked at how frequently domains were used by bad actors for phishing activity across individual\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cscdbs.com\/blog\/the-highest-threat-tlds-part-2\/\" \/>\n<meta property=\"og:site_name\" content=\"Digital Brand Services Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/corporationserviceco\" \/>\n<meta property=\"article:published_time\" content=\"2022-12-16T15:19:22+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-05-05T10:52:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2021\/11\/cscdbsblog_1000x55023.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"550\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Arielle Wallace\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@cscdbs\" \/>\n<meta name=\"twitter:site\" content=\"@cscdbs\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Arielle Wallace\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"11 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/the-highest-threat-tlds-part-2\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/the-highest-threat-tlds-part-2\\\/\"},\"author\":{\"name\":\"Arielle Wallace\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/person\\\/9f28d3ffdbe4e71bc030903c8037afe8\"},\"headline\":\"The Highest Threat TLDs \u2013 Part 2\",\"datePublished\":\"2022-12-16T15:19:22+00:00\",\"dateModified\":\"2026-05-05T10:52:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/the-highest-threat-tlds-part-2\\\/\"},\"wordCount\":2203,\"publisher\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/the-highest-threat-tlds-part-2\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2021\\\/11\\\/cscdbsblog_1000x55023.jpg\",\"articleSection\":[\"Brand Protection\",\"Send email\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/the-highest-threat-tlds-part-2\\\/\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/the-highest-threat-tlds-part-2\\\/\",\"name\":\"The Highest Threat TLDs \u2013 Part 2 | CSC\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/the-highest-threat-tlds-part-2\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/the-highest-threat-tlds-part-2\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2021\\\/11\\\/cscdbsblog_1000x55023.jpg\",\"datePublished\":\"2022-12-16T15:19:22+00:00\",\"dateModified\":\"2026-05-05T10:52:22+00:00\",\"description\":\"In the first article of this two-part blog series, we looked at how frequently domains were used by bad actors for phishing activity across individual\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/the-highest-threat-tlds-part-2\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/the-highest-threat-tlds-part-2\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/the-highest-threat-tlds-part-2\\\/#primaryimage\",\"url\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2021\\\/11\\\/cscdbsblog_1000x55023.jpg\",\"contentUrl\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2021\\\/11\\\/cscdbsblog_1000x55023.jpg\",\"width\":1000,\"height\":550},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/the-highest-threat-tlds-part-2\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Highest Threat TLDs \u2013 Part 2\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\",\"name\":\"Digital Brand Services Blog\",\"description\":\"Domains, new gTLDs, brand protection, security &amp; trademark news\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\",\"name\":\"CSC Digital Brand Services\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2018\\\/06\\\/cropped-dbs_small.gif\",\"contentUrl\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2018\\\/06\\\/cropped-dbs_small.gif\",\"width\":200,\"height\":200,\"caption\":\"CSC Digital Brand Services\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/corporationserviceco\",\"https:\\\/\\\/x.com\\\/cscdbs\",\"https:\\\/\\\/www.linkedin.com\\\/showcase\\\/csc-digital-brand-services\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/person\\\/9f28d3ffdbe4e71bc030903c8037afe8\",\"name\":\"Arielle Wallace\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Highest Threat TLDs \u2013 Part 2 | CSC","description":"In the first article of this two-part blog series, we looked at how frequently domains were used by bad actors for phishing activity across individual","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cscdbs.com\/blog\/the-highest-threat-tlds-part-2\/","og_locale":"en_US","og_type":"article","og_title":"The Highest Threat TLDs \u2013 Part 2 | CSC","og_description":"In the first article of this two-part blog series, we looked at how frequently domains were used by bad actors for phishing activity across individual","og_url":"https:\/\/www.cscdbs.com\/blog\/the-highest-threat-tlds-part-2\/","og_site_name":"Digital Brand Services Blog","article_publisher":"https:\/\/www.facebook.com\/corporationserviceco","article_published_time":"2022-12-16T15:19:22+00:00","article_modified_time":"2026-05-05T10:52:22+00:00","og_image":[{"width":1000,"height":550,"url":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2021\/11\/cscdbsblog_1000x55023.jpg","type":"image\/jpeg"}],"author":"Arielle Wallace","twitter_card":"summary_large_image","twitter_creator":"@cscdbs","twitter_site":"@cscdbs","twitter_misc":{"Written by":"Arielle Wallace","Est. reading time":"11 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cscdbs.com\/blog\/the-highest-threat-tlds-part-2\/#article","isPartOf":{"@id":"https:\/\/www.cscdbs.com\/blog\/the-highest-threat-tlds-part-2\/"},"author":{"name":"Arielle Wallace","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/person\/9f28d3ffdbe4e71bc030903c8037afe8"},"headline":"The Highest Threat TLDs \u2013 Part 2","datePublished":"2022-12-16T15:19:22+00:00","dateModified":"2026-05-05T10:52:22+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cscdbs.com\/blog\/the-highest-threat-tlds-part-2\/"},"wordCount":2203,"publisher":{"@id":"https:\/\/www.cscdbs.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.cscdbs.com\/blog\/the-highest-threat-tlds-part-2\/#primaryimage"},"thumbnailUrl":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2021\/11\/cscdbsblog_1000x55023.jpg","articleSection":["Brand Protection","Send email"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.cscdbs.com\/blog\/the-highest-threat-tlds-part-2\/","url":"https:\/\/www.cscdbs.com\/blog\/the-highest-threat-tlds-part-2\/","name":"The Highest Threat TLDs \u2013 Part 2 | CSC","isPartOf":{"@id":"https:\/\/www.cscdbs.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cscdbs.com\/blog\/the-highest-threat-tlds-part-2\/#primaryimage"},"image":{"@id":"https:\/\/www.cscdbs.com\/blog\/the-highest-threat-tlds-part-2\/#primaryimage"},"thumbnailUrl":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2021\/11\/cscdbsblog_1000x55023.jpg","datePublished":"2022-12-16T15:19:22+00:00","dateModified":"2026-05-05T10:52:22+00:00","description":"In the first article of this two-part blog series, we looked at how frequently domains were used by bad actors for phishing activity across individual","breadcrumb":{"@id":"https:\/\/www.cscdbs.com\/blog\/the-highest-threat-tlds-part-2\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cscdbs.com\/blog\/the-highest-threat-tlds-part-2\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cscdbs.com\/blog\/the-highest-threat-tlds-part-2\/#primaryimage","url":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2021\/11\/cscdbsblog_1000x55023.jpg","contentUrl":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2021\/11\/cscdbsblog_1000x55023.jpg","width":1000,"height":550},{"@type":"BreadcrumbList","@id":"https:\/\/www.cscdbs.com\/blog\/the-highest-threat-tlds-part-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cscdbs.com\/blog\/"},{"@type":"ListItem","position":2,"name":"The Highest Threat TLDs \u2013 Part 2"}]},{"@type":"WebSite","@id":"https:\/\/www.cscdbs.com\/blog\/#website","url":"https:\/\/www.cscdbs.com\/blog\/","name":"Digital Brand Services Blog","description":"Domains, new gTLDs, brand protection, security &amp; trademark news","publisher":{"@id":"https:\/\/www.cscdbs.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cscdbs.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cscdbs.com\/blog\/#organization","name":"CSC Digital Brand Services","url":"https:\/\/www.cscdbs.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2018\/06\/cropped-dbs_small.gif","contentUrl":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2018\/06\/cropped-dbs_small.gif","width":200,"height":200,"caption":"CSC Digital Brand Services"},"image":{"@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/corporationserviceco","https:\/\/x.com\/cscdbs","https:\/\/www.linkedin.com\/showcase\/csc-digital-brand-services\/"]},{"@type":"Person","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/person\/9f28d3ffdbe4e71bc030903c8037afe8","name":"Arielle Wallace"}]}},"_links":{"self":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/11866","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/comments?post=11866"}],"version-history":[{"count":30,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/11866\/revisions"}],"predecessor-version":[{"id":15590,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/11866\/revisions\/15590"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/media\/10443"}],"wp:attachment":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/media?parent=11866"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/categories?post=11866"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/tags?post=11866"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}