Combating phishing attacks using cousin domains requires a comprehensive, multi-layered strategy. This includes proactive domain monitoring for early detection and rapid takedown of fraudulent domains. Contributing to domain-based blacklists (Openphish, Phishtank, URIBL, SURBL) and reporting phishing sites to APWG and Google Safe Browsing are critical. Implementing email authentication protocols (DMARC, SPF, DKIM) prevents spoofing, while educating users through security awareness training and establishing clear brand guidelines reduces the success rate of attacks. Employing advanced threat detection and multi-factor authentication provides further protection. Developing a cybersecurity framework and incident response plan ensures quick identification and recovery. Furthermore, it's important to be cautious about reporting to Cloudflare due to their potential doxing practices, and to understand that UDRP may not always be the most effective solution.
13 marketer opinions
Combating phishing attacks using cousin domains requires a multi-faceted approach. Key strategies include proactive domain monitoring to identify and takedown fraudulent domains, implementing email authentication protocols (DMARC, SPF, DKIM) to prevent spoofing, educating users through security awareness training, and employing advanced threat detection technologies. Reporting suspicious domains to blocklists and domain registrars is crucial, along with establishing clear brand guidelines and implementing multi-factor authentication. Continuous monitoring of social media and newly registered domains, coupled with raising awareness about phishing risks, significantly reduces the attack success rate. Swift takedown actions protect brand reputation and prevent customer deception.
Marketer view
Marketer from Email Geeks says that submitting to URL blocklists if they have data on the cousin domains would be their main action point.
2 Oct 2021 - Email Geeks
Marketer view
Email marketer from security-forums.com shares that setting up domain monitoring alerts for newly registered domains containing your brand name or common misspellings can provide early warnings of potential phishing attempts.
12 Aug 2022 - security-forums.com
5 expert opinions
Combating phishing attacks involving cousin domains requires proactive monitoring and strategic reporting. While direct takedowns may be ineffective due to rapid domain rotation, adding cousin domains to domain-based blacklists, such as Openphish, Phishtank, URIBL, and SURBL, is recommended. Reporting to APWG and setting up domain monitoring alerts for brand name variations are also crucial. It is important to avoid Cloudflare for abuse reporting due to their practice of doxing reporters.
Expert view
Expert from Email Geeks suggests Openphish and Phishtank. Mentions that URIBL and SURBL might be amenable to having a trusted reporter give them domains. Also suggests getting an in to Google Safe Browsing.
3 Jan 2024 - Email Geeks
Expert view
Expert from Email Geeks shares that going for a takedown of the domains isn’t going to help, as they can rotate cousin domains far faster than that process. Suggests getting the cousin domains added to some domain-based blacklists.
31 May 2022 - Email Geeks
5 technical articles
Combating phishing attacks using cousin domains involves a combination of dispute resolution, reporting, user education, and incident response planning. ICANN's UDRP can address trademark infringements, but may not be suitable for subtle phishing attempts. Reporting to APWG and Google Safe Browsing helps add phishing sites to blocklists, protecting users. Educating consumers to avoid sharing sensitive information via email is crucial, and developing a cybersecurity framework with incident response plans aids in quick identification and recovery from phishing incidents.
Technical article
Documentation from apwg.org shares that reporting phishing sites to the APWG helps in aggregating and distributing phishing data to blocklists and security vendors, contributing to a collective defense.
26 May 2024 - apwg.org
Technical article
Documentation from safebrowsing.google.com explains that reporting suspected phishing sites to Google Safe Browsing can help protect users by adding these sites to Google's blocklist, warning users before they visit the site.
5 Apr 2024 - safebrowsing.google.com
Are people still falling for email scams?
How can a phishing email pass SPF and DKIM authentication checks?
How can email senders and users prevent and identify phishing emails?
How can I use DMARC to prevent spammers from using my domain?
How can normal people identify phishing emails when services rewrite headers?