Proofpoint researchers continually analyze more than 350 million domains—virtually all domains on the web—to identify regional and global trends. The 2019 Domain Fraud Report revealed the following troubling discoveries among Proofpoint Digital Risk Protection customers:
- 96% found exact matches of their brand-owned domain with a different top-level domain (TLD)—for example, “.net” vs. “.com”
- 85% of retail brands found domains selling counterfeit goods
- 76% found lookalike domains posing as their brand
Warn employees about fraudulent domains and lookalike sites
Proofpoint Attack Spotlight security awareness materials provide free content you can immediately share with end-users to help them avoid "lookalike" websites that mimic legitimate sites.
The latest installment in the Attack Spotlight series features an example of a lookalike site and highlights the techniques cyber criminals use to make fraudulent sites appear safe. The awareness materials also inform users of the following facts:
- Lookalike sites are designed to sell counterfeit goods, steal money and credentials, and spread malware.
- Attackers fraudulently use familiar brands (including logos and photos) to lend credibility to lookalike sites.
- Lookalike links in phishing emails, social media posts, and online ads are used to lure people to fraudulent sites.
- Sites that feature https encryption should not be blindly trusted, as cybercriminals are increasingly buying security certificates for malicious sites.
Download and share these free resources
The following Proofpoint Attack Spotlight resources are free to access and distribute:
- Ready-to-use email content for communicating with employees
- A security awareness PDF detailing the threat in easy-to-understand terms
- A short awareness module with action-oriented tips for identifying and avoiding lookalike sites
In addition, customers who use Proofpoint ThreatSim® Phishing Simulations will find options in the template library that will help them test their users' susceptibility to lookalike links.
If you have not used these tools in the past, be sure to visit the Proofpoint Attack Spotlight archive to access free resources about other trending attacks, including those targeting Office 365, OneDrive, and DocuSign users.