noglyph
Account Closed (Requested)
- Impact
- 1
Phishing remains one of the most damaging cyber threats, tricking millions of people into handing over sensitive credentials, financial data, or simply downloading malware every fiscal year. While email filters and browser warnings help, the real battle often happens at the DNS level—where attackers register domains, hosts spin-up phishing sites, and cybersecurity defenders scramble to detect and shut them down.
A groundbreaking 2025 research paper, “Registration, Detection, and Deregistration: Analyzing DNS Abuse for Phishing Attacks” by Kyungchan Lim (University of Tennessee; [email protected]), Mattijs Jonker (University of Twente; [email protected]) and additional scholars, provide the most comprehensive look yet into this lifecycle.
By studying 690,502 unique phishing domains over a 39-month period (July 2021 – October 2024), the authors tracked everything from the moment a domain is registered to when it’s finally taken offline.
The findings are eye-opening: 66.1% of these domains were maliciously registered by attackers (not compromised legitimate sites), and once detected, they often stayed accessible for an average of 11.5 days—plenty of time to cause real harm to the millions. The paper also identified bulk registrations (7.9% of malicious domains)—clusters of similar-looking names registered simultaneously through the same registrar. This automation allows attackers to flood the ecosystem with lookalikes in minutes.
Here’s a breakdown of the three critical phases and what the data reveals:
Phase 1 - Registration
The frequently mimic major brands are registered under alternative TLDs rather than the brand’s real one.
Examples:
Attackers further complicate detection with DNS fast-flux techniques:
Phase 3 - Deregistration
Even after detection, phishing domains don’t vanish instantly. The study found they remain accessible for an average of 11.5 days post-detection. Squatted (brand-mimicking) domains lasted even longer—23 days on average.
Conclusively, Phishing isn’t going away, but understanding the full lifecycle—from the cheap registration of a .top domain to its lingering presence after detection—gives defenders a roadmap. The premium research shows that while attackers have optimized every step, the patterns they leave behind are further predictable.
By intervening earlier at registration, accelerating detection through DNS intelligence, and tightening deregistration, we can shrink the window of opportunity for phishing campaigns. The DNS layer isn’t just infrastructure—it’s the front line. Closing the gaps here could prevent millions of successful attacks.
The full paper is available on arXiv and CAIDA—highly recommended reading for anyone working in cybersecurity, DNS operations, anti-phishing or simply just wanting to learn more.
What do you think? Are registrars doing enough, or do we need stronger policy changes?
Drop your thoughts in the comments.
A groundbreaking 2025 research paper, “Registration, Detection, and Deregistration: Analyzing DNS Abuse for Phishing Attacks” by Kyungchan Lim (University of Tennessee; [email protected]), Mattijs Jonker (University of Twente; [email protected]) and additional scholars, provide the most comprehensive look yet into this lifecycle.
By studying 690,502 unique phishing domains over a 39-month period (July 2021 – October 2024), the authors tracked everything from the moment a domain is registered to when it’s finally taken offline.
The findings are eye-opening: 66.1% of these domains were maliciously registered by attackers (not compromised legitimate sites), and once detected, they often stayed accessible for an average of 11.5 days—plenty of time to cause real harm to the millions. The paper also identified bulk registrations (7.9% of malicious domains)—clusters of similar-looking names registered simultaneously through the same registrar. This automation allows attackers to flood the ecosystem with lookalikes in minutes.
Here’s a breakdown of the three critical phases and what the data reveals:
Phase 1 - Registration
The frequently mimic major brands are registered under alternative TLDs rather than the brand’s real one.
Examples:
- USPS-targeted domains: 90% maliciously registered, often under .top instead of .com
- Facebook: 58.2% malicious registrations
- Microsoft and OZON also heavily targeted with squatted variants
Attackers further complicate detection with DNS fast-flux techniques:
- 64.3% of domains showed frequent DNS updates
- 25.8% used TTLs under 3,600 seconds (some as low as 60 seconds)
- 21.4% changed records during their lifetime
Phase 3 - Deregistration
Even after detection, phishing domains don’t vanish instantly. The study found they remain accessible for an average of 11.5 days post-detection. Squatted (brand-mimicking) domains lasted even longer—23 days on average.
Conclusively, Phishing isn’t going away, but understanding the full lifecycle—from the cheap registration of a .top domain to its lingering presence after detection—gives defenders a roadmap. The premium research shows that while attackers have optimized every step, the patterns they leave behind are further predictable.
By intervening earlier at registration, accelerating detection through DNS intelligence, and tightening deregistration, we can shrink the window of opportunity for phishing campaigns. The DNS layer isn’t just infrastructure—it’s the front line. Closing the gaps here could prevent millions of successful attacks.
The full paper is available on arXiv and CAIDA—highly recommended reading for anyone working in cybersecurity, DNS operations, anti-phishing or simply just wanting to learn more.
What do you think? Are registrars doing enough, or do we need stronger policy changes?
Drop your thoughts in the comments.












