Signal
Phishing attacks exploiting .arpa domain
Evidence first: scan the strongest sources, then decide whether to go deeper.
Published 2026-03-09 12:06 UTCUpdated 2026-03-10 02:14 UTC
rss
securitysecurityweek_cso_online
Source links open
Source links and full evidence are open here. Archive history, compare-over-time, alerts, exports, API, integrations, and workflow are paid.
No card needed for the free brief.
Evidence trail (top sources)
top sources (2 domains)domains are deduped. counts indicate coverage, not truth.2 top sources shown
limited source diversity in top sources
Overview
Threat actors are exploiting the .arpa TLD to evade phishing detection by manipulating DNS records. This tactic allows them to host malicious content on domains that shouldn't resolve to an IP address, bypassing many security platforms.
Score total
1.01
Momentum 24h
2
Posts
2
Origins
2
Source types
1
Duplicate ratio
0%
LLM analysis
Topic mix: lowPromo risk: lowSource quality: high
Recurring claims
- Threat actors are abusing the .arpa domain to evade phishing detection by manipulating DNS records.
How sources frame it
- Infoblox: neutral
All evidence
All evidence
Hacker abusing .arpa domain to evade phishing detection, says Infoblox
CSO Online · csoonline.com · 2026-03-10 02:14 UTC
Internet Infrastructure TLD .arpa Abused in Phishing Attacks
SecurityWeek · securityweek.com · 2026-03-09 12:06 UTC
Show filters & breakdown
Posts loaded: 0Publishers: 2Origin domains: 2Duplicates: -
Showing 2 / 0
Top publishers (this list)
- CSO Online (1)
- SecurityWeek (1)
Top origin domains (this list)
- csoonline.com (1)
- securityweek.com (1)