{"id":17674,"date":"2021-02-18T18:44:59","date_gmt":"2021-02-18T18:44:59","guid":{"rendered":"https:\/\/easydmarc.com\/blog\/?p=17674"},"modified":"2025-10-15T09:46:49","modified_gmt":"2025-10-15T09:46:49","slug":"types-of-phishing-domains-you-should-blacklist","status":"publish","type":"post","link":"https:\/\/easydmarc.com\/blog\/types-of-phishing-domains-you-should-blacklist\/","title":{"rendered":"Types of Phishing Domains You Should Blacklist"},"content":{"rendered":"\n<p><span style=\"font-weight: 400;\">Phishing isn\u2019t going away. In fact, it\u2019s seen substantial gains by playing off coronavirus fears. While enterprises spend a considerable amount of effort and money to ensure phishing emails never land in inboxes, it\u2019s not foolproof. An additional step that adds another layer of security is blacklisting known phishing domains.&nbsp;<\/span><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-what-s-the-current-state-of-phishing-nbsp\"><strong>What\u2019s the current state of phishing?&nbsp;<\/strong><\/h2>\n\n\n\n<p><span style=\"font-weight: 400;\">What\u2019s the current climate of phishing? What does the data say? Let\u2019s look at what you\u2019re up against in 2020.&nbsp;<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">The <a href=\"https:\/\/apwg.org\/\">Anti-Phishing Working Group (APWG)<\/a>, an international coalition of over 2,200 institutions impacted by phishing, provides regular trend updates. The latest report covers the first quarter of 2020. Here are some critical insights.<\/span><\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p><strong><i>COVID-19 is a perfect storm for phishing opportunists<\/i><\/strong><\/p>\n<\/blockquote>\n\n\n\n<p><span style=\"font-weight: 400;\">COVID-19-themed phishing attacks against workers, healthcare and the unemployed became a severe threat in mid-March. This rise includes emails related to Zoom, one of the leading video conference platforms, which has been in high demand for everything from work meetings to online gatherings with friends and family. You can read our <a href=\"https:\/\/easydmarc.com\/blog\/zoom-phishing-scam-aims-to-steal-login-credentials\/\">article about Zoom phishing scams, here<\/a>.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">Cybercriminals are also using the crisis in business communications. Businesses began to receive emails from their suppliers with look-alike domains. This approach played on the real concerns regarding supply chains. Also, find out business email compromise cybersecurity problems, <a href=\"https:\/\/easydmarc.com\/blog\/business-email-compromise-bec-2021-cybersecurity-problem\/\">following the link<\/a>.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">Furthermore, healthcare has been the target of many phishing schemes. The sector saw an increase of 35 percent, as compared to the same, according to a <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/siem-and-xdr\/microsoft-defender-threat-intelligence\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">RISKIQ study<\/a>.&nbsp;<\/span><\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>Phishing domains are on the rise, and the majority of sites now use SSL.<\/p>\n<\/blockquote>\n\n\n\n<p><span style=\"font-weight: 400;\">The number of phishing domains was 165,772, up slightly from the fourth quarter of 2019. This number has been trending up since November 2019. On top of this, 75 percent of all phishing sites now use SSL. This use of encryption is having an impact on those receiving phishing because it adds more legitimacy to the con.&nbsp;<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">These data points showcase that phishing is alive and well. So, what are some proactive steps to take to mitigate the impact?&nbsp;<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">Blacklisting is an option. Using in conjunction with threat monitoring and education programs creates a more comprehensive shield.&nbsp;<\/span><\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-why-blacklist\"><strong>Why blacklist?<\/strong><\/h3>\n\n\n\n<p><span style=\"font-weight: 400;\">Blacklisting creates governance around what makes it into inboxes. Blacklisting can have many different parameters. It can include the content of the email as well as the domain.&nbsp;<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">Blacklisting doesn\u2019t always work in your favor. There are times when domains get blacklisted that are not phishing-related. The emails may or may not be spam.&nbsp;<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">It\u2019s not a perfect science, but as the owner of your network, you can define blacklisting. What\u2019s critical is to use it as a tool to protect users against <a href=\"https:\/\/easydmarc.com\/blog\/phishing-attacks-recognize-and-avoid-email-phishing\/\">phishing attacks<\/a>. The effectiveness depends on size, scope, update frequency, accuracy and other factors.&nbsp;<\/span><\/p>\n\n\n<div class=\"wp-block-image wp-image-16313 size-large\">\n<figure class=\"aligncenter\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"493\" src=\"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2019\/10\/Screen-Shot-2019-10-02-at-09.51.09-1024x493.png\" alt=\"Types-of-phishing-domains-you-should-blacklist\" class=\"wp-image-16313\" srcset=\"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2019\/10\/Screen-Shot-2019-10-02-at-09.51.09-1024x493.png 1024w, https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2019\/10\/Screen-Shot-2019-10-02-at-09.51.09-300x144.png 300w, https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2019\/10\/Screen-Shot-2019-10-02-at-09.51.09-768x370.png 768w, https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2019\/10\/Screen-Shot-2019-10-02-at-09.51.09.png 1358w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Email phishing<\/figcaption><\/figure>\n<\/div>\n\n\n<h2 class=\"wp-block-heading\" id=\"h-types-of-phishing-domains-to-add-to-your-blacklist\"><strong>Types of phishing domains to add to your blacklist<\/strong><\/h2>\n\n\n\n<p><span style=\"font-weight: 400;\">Various types of phishing domains exist. The sophistication of cybercriminals continues to expand. Here\u2019s an overview of domain attacks and how to defend against them with blacklisting.<\/span><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Active directory and namespace collision<\/strong><\/h3>\n\n\n\n<p><span style=\"font-weight: 400;\">The problem of namespace collision describes a situation where a company intends for a domain to be used exclusively for an internal audience overlap with domains available on the open internet. It\u2019s a scenario ripe for phishing.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">Why does this happen? The root of it goes back to Microsoft\u2019s Active Directory. Within this application, it made it easier for computers or services within a network without having to type out the complete domain name.&nbsp;<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">While this isn\u2019t a concern for most Windows users, the problem occurs when the mapping to the second-level domain isn\u2019t owned or controlled by the organization. It\u2019s a loophole of sorts that can cause catastrophic breaches, especially in the age of remote and mobile working.&nbsp;<\/span><\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-the-dangers-of-namespace-collision\"><strong>The dangers of namespace collision<\/strong><\/h3>\n\n\n\n<p><span style=\"font-weight: 400;\">An illustration of the security dangers of namespace collusion includes the domain corp.com. Domain experts labeled this as a very dangerous domain because its owner could likely be able to access networks from businesses across the world. Microsoft purchased the domain recently, which had, for decades, been owned by a private citizen. Microsoft took the step to ensure the protection of its systems and users.&nbsp;<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">This scenario has a lot to do with probable phishing domains. Users receive messages that appear to mimic their own internal domains, where they share and store documents. That click could result in unauthorized access, breaches and the spread of malware.&nbsp;<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">The lesson here is that you must own second-level or third-level domains. This is typically a given, such as technical.support.portal.website.com. The owner of website.com also owns those other levels. It becomes tricky when you have second-level subdomains.&nbsp;<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">In your phishing due diligence, you either need to ensure you own all the levels or blacklist any you don\u2019t own.&nbsp;<\/span><\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-typosquatting-phishing-domains\"><strong>Typosquatting phishing domains<\/strong><\/h3>\n\n\n\n<p><span style=\"font-weight: 400;\">Typosquatting is the most basic type of phishing domain. It preys on the reality that typos happen quite often.&nbsp; <\/span><span style=\"font-weight: 400;\">What happens in this situation is that someone registers the likely misspellings of the domain, singular\/plural versions, hyphenations or other variations to a known and trusted domain.&nbsp;<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">Also, under the umbrella of typosquatting is kerning faults. Instead of the letter \u201cm,\u201d the domain uses \u201crn.\u201d It looks very close to the real one, especially if the type is small \u2014 say, when being read on a phone. It can be successful for phishers to get users to take the bait.&nbsp;<\/span><\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Typosquatting examples<\/strong><\/h4>\n\n\n\n<p><span style=\"font-weight: 400;\">Typosquatting is executable in many different ways. Here are some examples:<\/span><\/p>\n\n\n\n<p><strong>Typos: The thought is that many won\u2019t notice the typo. Hence, goigle.com may pass for google.com<\/strong><\/p>\n\n\n\n<p><strong>Misspellings: This can occur with just the addition or change of a letter, such as gooogle.com<\/strong><\/p>\n\n\n\n<p><i><span style=\"font-weight: 400;\">Alternative spellings<\/span><\/i><span style=\"font-weight: 400;\">: Many brands use a unique spelling, so hackers create sites that take advantage of this. The URL may be findfotos.com rather than findphotos.com<\/span><\/p>\n\n\n\n<p><i><span style=\"font-weight: 400;\">Hyphens<\/span><\/i><span style=\"font-weight: 400;\">: Adding or omitting a hyphen is a quick way to trick users. The phishing domain could be insta-gram.com, instead of instagram.com<\/span><\/p>\n\n\n\n<p><i><span style=\"font-weight: 400;\">Adding www<\/span><\/i><span style=\"font-weight: 400;\">: Domains still include the www, but it requires a period. www.google.com is authentic, while wwwgoogle.com is not.<\/span><\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-employees-may-be-easily-fooled\"><strong>Employees may be easily fooled<\/strong><\/h3>\n\n\n\n<p><span style=\"font-weight: 400;\">Should an email land in the box of an employee, they may click it because it looks so similar. Training and educating employees on how phishing works is another defense to this. But you\u2019d probably rather it never gets through your email server.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">To protect against this, you should perform a search of any current domains that are possible typos of your domain, following the examples above. If you find that some are registered, blacklist those. If any others exist, buy them and redirect them to your actual home page.<\/span><\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-registrar-imitating-phishing\"><strong>Registrar imitating phishing<\/strong><\/h3>\n\n\n\n<p><span style=\"font-weight: 400;\">Registrar hacking is uncommon but still a risk. If a cybercriminal hacks a registrar, he has access to all the domains in the database. Once inside, they can make changes and clone a site to spread malware. They may then redirect all traffic to the malicious site.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">An example is the recent hacking of a Japanese cryptocurrency Coincheck. Hackers hijacked a domain at Oname.com and used it to contact customers. The incident details that after the seizure of the domain, a lookalike domain was registered, replacing the original domain. The original was awdns-61.org. The new one was awsdns-061.org.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">From there, they sent spear phishing emails to users as Coincheck, redirecting replies to their servers. The hackers had control of their domain for about 48 hours, impacting about 200 users.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">The same principles of <a href=\"https:\/\/easydmarc.com\/blog\/ebook\/phishing-awareness-guide\/\">phishing awareness<\/a> apply here because the domains are different. It may not be possible to blacklist these domains because they don\u2019t have the normal attributes of fake domains. However, it is something to monitor appropriately. If such a phishing attempt occurs and your employee catches it, then you can move to the blacklist.<\/span><\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-generic-tlds\"><strong>Generic TLDs<\/strong><\/h3>\n\n\n\n<p><span style=\"font-weight: 400;\">Generic TLDs (top-level domains) are becoming very prevalent. An uptick in domain registration featuring non-Latin letters is also growing. Phishers are always closely monitoring gTLDs for opportunities for exploitation.&nbsp;<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">Because .com or .net, the most popular, are often unavailable, they have greatly expanded. According to Spamhaus, the most abused gTLDs are .rest, .tk, .gq., .fit, .work, .ml, .cf, .ga, .buzz and .cn.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">For example, .work domains typically associated with employment or people. Something like yourdomain.work might seem legitimate to those involved with recruiting. However, unless you\u2019ve actually purchased it, there\u2019s an opportunity for human error.&nbsp;<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">Based on this knowledge, you can blacklist any domains that use these gTLDs and contain your website, as well as applications your employees use.&nbsp;<\/span><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-conclusion\">Conclusion<\/h2>\n\n\n\n<p><span style=\"font-weight: 400;\">Blacklisting phishing domains can only provide so much protection. Ultimately, your employees should be aware of how to assess <a href=\"https:\/\/easydmarc.com\/blog\/what-to-do-if-you-click-on-a-phishing-link\/\">suspicious phishing emails<\/a>. This level of alertness is possible with simulated phishing training.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Phishing isn\u2019t going away. In fact, it\u2019s seen &#8230;<\/p>\n","protected":false},"author":1,"featured_media":32468,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[204,290,199,293,289],"tags":[],"class_list":["post-17674","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-cyberattacks-cyberthreats","category-cybersecurity","category-phishing","category-social-engineering"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Types of Phishing Domains You Should Blacklist | EasyDMARC<\/title>\n<meta name=\"description\" content=\"While we spend money to ensure phishing emails never land in inboxes, an additional security step is blacklisting known phishing domains.\u00a0\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/easydmarc.com\/blog\/types-of-phishing-domains-you-should-blacklist\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Types of Phishing Domains You Should Blacklist\" \/>\n<meta property=\"og:description\" content=\"While we spend money to ensure phishing emails never land in inboxes, an additional security step is blacklisting known phishing domains.\u00a0\" \/>\n<meta property=\"og:url\" content=\"https:\/\/easydmarc.com\/blog\/types-of-phishing-domains-you-should-blacklist\/\" \/>\n<meta property=\"og:site_name\" content=\"EasyDMARC\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/EasyDMARC\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-02-18T18:44:59+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-15T09:46:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2021\/02\/Types-of-Phishing-Domains-You-Should-Blacklist-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1440\" \/>\n\t<meta property=\"og:image:height\" content=\"910\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EasyDMARC\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@easydmarc\" \/>\n<meta name=\"twitter:site\" content=\"@easydmarc\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EasyDMARC\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/types-of-phishing-domains-you-should-blacklist\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/types-of-phishing-domains-you-should-blacklist\\\/\"},\"author\":{\"name\":\"EasyDMARC\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#\\\/schema\\\/person\\\/449261e9810b270cc697c7c9c5b89e97\"},\"headline\":\"Types of Phishing Domains You Should Blacklist\",\"datePublished\":\"2021-02-18T18:44:59+00:00\",\"dateModified\":\"2025-10-15T09:46:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/types-of-phishing-domains-you-should-blacklist\\\/\"},\"wordCount\":1497,\"publisher\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/types-of-phishing-domains-you-should-blacklist\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/02\\\/Types-of-Phishing-Domains-You-Should-Blacklist-1.jpg\",\"articleSection\":[\"Blog\",\"Cyberattacks and Cyberthreats\",\"Cybersecurity\",\"Phishing\",\"Social Engineering\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/easydmarc.com\\\/blog\\\/types-of-phishing-domains-you-should-blacklist\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/types-of-phishing-domains-you-should-blacklist\\\/\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/types-of-phishing-domains-you-should-blacklist\\\/\",\"name\":\"Types of Phishing Domains You Should Blacklist | EasyDMARC\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/types-of-phishing-domains-you-should-blacklist\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/types-of-phishing-domains-you-should-blacklist\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/02\\\/Types-of-Phishing-Domains-You-Should-Blacklist-1.jpg\",\"datePublished\":\"2021-02-18T18:44:59+00:00\",\"dateModified\":\"2025-10-15T09:46:49+00:00\",\"description\":\"While we spend money to ensure phishing emails never land in inboxes, an additional security step is blacklisting known phishing domains.\u00a0\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/types-of-phishing-domains-you-should-blacklist\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/easydmarc.com\\\/blog\\\/types-of-phishing-domains-you-should-blacklist\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/types-of-phishing-domains-you-should-blacklist\\\/#primaryimage\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/02\\\/Types-of-Phishing-Domains-You-Should-Blacklist-1.jpg\",\"contentUrl\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/02\\\/Types-of-Phishing-Domains-You-Should-Blacklist-1.jpg\",\"width\":1440,\"height\":910,\"caption\":\"A person working on two monitors\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/types-of-phishing-domains-you-should-blacklist\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/category\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cybersecurity\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/category\\\/blog\\\/cybersecurity\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Cyberattacks and Cyberthreats\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/category\\\/blog\\\/cybersecurity\\\/cyberattacks-cyberthreats\\\/\"},{\"@type\":\"ListItem\",\"position\":5,\"name\":\"Social Engineering\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/category\\\/blog\\\/cybersecurity\\\/cyberattacks-cyberthreats\\\/social-engineering\\\/\"},{\"@type\":\"ListItem\",\"position\":6,\"name\":\"Phishing\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/category\\\/blog\\\/cybersecurity\\\/cyberattacks-cyberthreats\\\/social-engineering\\\/phishing\\\/\"},{\"@type\":\"ListItem\",\"position\":7,\"name\":\"Types of Phishing Domains You Should Blacklist\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/\",\"name\":\"EasyDMARC\",\"description\":\"Blog\",\"publisher\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/#organization\",\"name\":\"EasyDMARC\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/img\\\/logo.png\"},\"image\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/EasyDMARC\\\/\",\"https:\\\/\\\/x.com\\\/easydmarc\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/easydmarc\\\/mycompany\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#\\\/schema\\\/person\\\/449261e9810b270cc697c7c9c5b89e97\",\"name\":\"EasyDMARC\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g\",\"caption\":\"EasyDMARC\"},\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/author\\\/easydmarc\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Types of Phishing Domains You Should Blacklist | EasyDMARC","description":"While we spend money to ensure phishing emails never land in inboxes, an additional security step is blacklisting known phishing domains.\u00a0","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/easydmarc.com\/blog\/types-of-phishing-domains-you-should-blacklist\/","og_locale":"en_US","og_type":"article","og_title":"Types of Phishing Domains You Should Blacklist","og_description":"While we spend money to ensure phishing emails never land in inboxes, an additional security step is blacklisting known phishing domains.\u00a0","og_url":"https:\/\/easydmarc.com\/blog\/types-of-phishing-domains-you-should-blacklist\/","og_site_name":"EasyDMARC","article_publisher":"https:\/\/www.facebook.com\/EasyDMARC\/","article_published_time":"2021-02-18T18:44:59+00:00","article_modified_time":"2025-10-15T09:46:49+00:00","og_image":[{"width":1440,"height":910,"url":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2021\/02\/Types-of-Phishing-Domains-You-Should-Blacklist-1.jpg","type":"image\/jpeg"}],"author":"EasyDMARC","twitter_card":"summary_large_image","twitter_creator":"@easydmarc","twitter_site":"@easydmarc","twitter_misc":{"Written by":"EasyDMARC","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/easydmarc.com\/blog\/types-of-phishing-domains-you-should-blacklist\/#article","isPartOf":{"@id":"https:\/\/easydmarc.com\/blog\/types-of-phishing-domains-you-should-blacklist\/"},"author":{"name":"EasyDMARC","@id":"https:\/\/easydmarc.com\/blog\/#\/schema\/person\/449261e9810b270cc697c7c9c5b89e97"},"headline":"Types of Phishing Domains You Should Blacklist","datePublished":"2021-02-18T18:44:59+00:00","dateModified":"2025-10-15T09:46:49+00:00","mainEntityOfPage":{"@id":"https:\/\/easydmarc.com\/blog\/types-of-phishing-domains-you-should-blacklist\/"},"wordCount":1497,"publisher":{"@id":"https:\/\/easydmarc.com\/blog\/#organization"},"image":{"@id":"https:\/\/easydmarc.com\/blog\/types-of-phishing-domains-you-should-blacklist\/#primaryimage"},"thumbnailUrl":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2021\/02\/Types-of-Phishing-Domains-You-Should-Blacklist-1.jpg","articleSection":["Blog","Cyberattacks and Cyberthreats","Cybersecurity","Phishing","Social Engineering"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/easydmarc.com\/blog\/types-of-phishing-domains-you-should-blacklist\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/easydmarc.com\/blog\/types-of-phishing-domains-you-should-blacklist\/","url":"https:\/\/easydmarc.com\/blog\/types-of-phishing-domains-you-should-blacklist\/","name":"Types of Phishing Domains You Should Blacklist | EasyDMARC","isPartOf":{"@id":"https:\/\/easydmarc.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/easydmarc.com\/blog\/types-of-phishing-domains-you-should-blacklist\/#primaryimage"},"image":{"@id":"https:\/\/easydmarc.com\/blog\/types-of-phishing-domains-you-should-blacklist\/#primaryimage"},"thumbnailUrl":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2021\/02\/Types-of-Phishing-Domains-You-Should-Blacklist-1.jpg","datePublished":"2021-02-18T18:44:59+00:00","dateModified":"2025-10-15T09:46:49+00:00","description":"While we spend money to ensure phishing emails never land in inboxes, an additional security step is blacklisting known phishing domains.\u00a0","breadcrumb":{"@id":"https:\/\/easydmarc.com\/blog\/types-of-phishing-domains-you-should-blacklist\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/easydmarc.com\/blog\/types-of-phishing-domains-you-should-blacklist\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/easydmarc.com\/blog\/types-of-phishing-domains-you-should-blacklist\/#primaryimage","url":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2021\/02\/Types-of-Phishing-Domains-You-Should-Blacklist-1.jpg","contentUrl":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2021\/02\/Types-of-Phishing-Domains-You-Should-Blacklist-1.jpg","width":1440,"height":910,"caption":"A person working on two monitors"},{"@type":"BreadcrumbList","@id":"https:\/\/easydmarc.com\/blog\/types-of-phishing-domains-you-should-blacklist\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/easydmarc.com\/"},{"@type":"ListItem","position":2,"name":"Blog","item":"https:\/\/easydmarc.com\/blog\/category\/blog\/"},{"@type":"ListItem","position":3,"name":"Cybersecurity","item":"https:\/\/easydmarc.com\/blog\/category\/blog\/cybersecurity\/"},{"@type":"ListItem","position":4,"name":"Cyberattacks and Cyberthreats","item":"https:\/\/easydmarc.com\/blog\/category\/blog\/cybersecurity\/cyberattacks-cyberthreats\/"},{"@type":"ListItem","position":5,"name":"Social Engineering","item":"https:\/\/easydmarc.com\/blog\/category\/blog\/cybersecurity\/cyberattacks-cyberthreats\/social-engineering\/"},{"@type":"ListItem","position":6,"name":"Phishing","item":"https:\/\/easydmarc.com\/blog\/category\/blog\/cybersecurity\/cyberattacks-cyberthreats\/social-engineering\/phishing\/"},{"@type":"ListItem","position":7,"name":"Types of Phishing Domains You Should Blacklist"}]},{"@type":"WebSite","@id":"https:\/\/easydmarc.com\/blog\/#website","url":"https:\/\/easydmarc.com\/blog\/","name":"EasyDMARC","description":"Blog","publisher":{"@id":"https:\/\/easydmarc.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/easydmarc.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/easydmarc.com\/#organization","name":"EasyDMARC","url":"https:\/\/easydmarc.com\/","logo":{"@type":"ImageObject","url":"https:\/\/easydmarc.com\/img\/logo.png"},"image":{"@id":"https:\/\/easydmarc.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/EasyDMARC\/","https:\/\/x.com\/easydmarc","https:\/\/www.linkedin.com\/company\/easydmarc\/mycompany\/"]},{"@type":"Person","@id":"https:\/\/easydmarc.com\/blog\/#\/schema\/person\/449261e9810b270cc697c7c9c5b89e97","name":"EasyDMARC","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g","caption":"EasyDMARC"},"url":"https:\/\/easydmarc.com\/blog\/author\/easydmarc\/"}]}},"jetpack_featured_media_url":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2021\/02\/Types-of-Phishing-Domains-You-Should-Blacklist-1.jpg","_links":{"self":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts\/17674","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/comments?post=17674"}],"version-history":[{"count":2,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts\/17674\/revisions"}],"predecessor-version":[{"id":53920,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts\/17674\/revisions\/53920"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/media\/32468"}],"wp:attachment":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/media?parent=17674"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/categories?post=17674"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/tags?post=17674"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}