Categories: Cyber Security News

Phishing Campaigns Target .arpa TLD and IPv6 Tunnels to Evade Security Measures

Phishing campaigns are utilizing a newly discovered evasion technique by exploiting the .arpa top-level domain (TLD) and IPv6 tunnels to bypass traditional security controls.

By hosting malicious links on domains strictly designed for internet infrastructure, threat actors are weaponizing trusted reverse DNS spaces to deliver fraudulent content without triggering domain reputation blocklists.

The .arpa and IPv6 Loophole

The .arpa TLD operates differently from standard consumer-facing domains like .com or .net.

It is primarily used for reverse DNS lookups, which map IP addresses back to domain names, and is never intended to host web content.

To execute this attack, threat actors acquire free IPv6 address space and gain administrative control of the corresponding .arpa subdomain.

Instead of adding expected PTR records, they exploit a feature in the DNS record management of certain providers to create ‘A’ records for reverse DNS names.

This allows attackers to use complex reverse DNS strings (e.g., d.d.e...ip6.arpa) as functioning domain names in phishing emails.

An overview of the process used to abuse the. Arpa tld in phishing emails (source: infoblox)

Because .arpa is critical for global internet operations, security tools rarely block or scrutinize these infrastructure domains.

According to Infoblox, the phishing campaigns typically begin with spam emails that impersonate well-known brands, promising a “free gift” or warning users of expired cloud storage limits.

These messages consist of a single image containing a hidden hyperlink, ensuring victims do not see the unusual .arpa domain string before clicking.

Once a victim clicks the lure, they are not immediately taken to the phishing page. Instead, they are routed through a Traffic Distribution System (TDS) that fingerprints their device and connection type.

If the user meets specific criteria, such as using a mobile device on a residential IP network, they are redirected through a chain of domains to the malicious landing page.

Sponsored

If they do not meet the criteria, the TDS redirects them to a benign site or displays an error message.

Alongside .arpa abuse, attackers are hijacking dangling CNAME records to bypass email security filters.

the phishing emails use a variety of lures to entice users into clicking on the hyperlinked image (source: infoblox)

When legitimate organizations fail to update DNS records after a domain expires, threat actors purchase the abandoned domain to gain control over subdomains belonging to highly reputable entities.

For example, the expiration of domains like publicnoticessites[.]com and hobsonsms[.]com allowed attackers to instantly hijack multiple trusted subdomains connected to government agencies, universities, and global corporations.

Indicators of Compromise (IOCs)

Organizations should monitor network traffic for unusual .arpa queries and review DNS configurations.

Below is a selection of indicators associated with these phishing campaigns.

Indicator Type Description
<10 random letters>.5.2.1.6.3...[.]ip6[.]arpa Reverse DNS IPv6 reverse DNS domain with DGA subdomain ​.
<10 random letters>.9.a.d.0.6...[.]ip6[.]arpa Reverse DNS IPv6 reverse DNS domain with DGA subdomain ​.
actinismoleil[.]sbs Malicious Domain Phishing landing page ​.
cablecomparison[.]shop Malicious Domain Phishing landing page ​.
dulcetoj[.]com TDS Domain Traffic Distribution System domain ​.
golandof[.]com TDS Domain Traffic Distribution System domain ​.
publicnoticessites[.]com Hijacked CNAME Domain with a subdomain acting as a hijacked CNAME ​.
hobsonsms[.]com Hijacked CNAME Domain with a subdomain serving as a hijacked CNAME ​.
hyfnrsx1[.]com Hijacked CNAME Domain with a subdomain acting as a hijacked CNAME ​.

Follow us on Google NewsLinkedIn and X to Get More Instant UpdatesSet Cyberpress as a Preferred Source in Google

The post Phishing Campaigns Target .arpa TLD and IPv6 Tunnels to Evade Security Measures appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

VoidLink Malware Framework Attacking Kubernetes and AI Workloads

In December 2025, Check Point Research disclosed one of the most carefully engineered cloud-native malware…

7 minutes ago

Stolen Gemini API Key Turned $180 Bill to $82000 in Two Days

A three-person development team in Mexico is facing bankruptcy after a stolen Google Cloud API…

7 minutes ago

Escalating Iranian APT Threats Against Critical Infrastructure Amid Geopolitical Conflict

A dangerous new chapter in Middle Eastern geopolitics has unfolded following the outbreak of open…

8 minutes ago

Trusted Azure Utility AzCopy Turned into Data Exfiltration Tool in Active Ransomware Campaigns

The cybersecurity landscape has taken a sharp and dangerous turn. Ransomware operators, long associated with…

8 minutes ago

CISA warns of Qualcomm Chipsets Memory Corruption Vulnerability Exploited in Attacks

CISA has warned that a memory corruption flaw in Qualcomm chipsets is being exploited in attacks,…

8 minutes ago

Phishing Campaign Exploits Google Cloud to Host Malicious Redirects via GCS Bucket

A highly organized phishing campaign has been discovered, one that abuses Google Cloud Storage (GCS)…

8 minutes ago

This website uses cookies.