Technical Analysis & Remediation
Attack Vectors & IOCs
The campaigns utilize four primary obfuscation techniques to deceive victims.
Typosquatting
gooogle[.]com (Character omission/duplication).
Combosquatting
netflix-login[.]com (Brand + Keyword appending).
TLD Squatting
smartproxy[.]org vs. legitimate smartproxy[.]com (Extension pivoting).
Homograph Attacks
Utilizing Cyrillic/Greek characters to render visually identical domains.
Live Evidence Extraction
Targeted Entity (Case Study)
Decodo (formerly Smartproxy).
Malicious Infrastructure
smartproxy[.]org
smartproxy[.]cn
tiktoks[.]com
amuldistributor[.]com
Payload Delivery
The infrastructure is actively used for Credential Phishing and Ransomware deployment.
MITRE ATT&CK Mapping
Resource Development
[T1583.001] Acquire Infrastructure: Domains.
Initial Access
[T1566.002] Phishing: Spearphishing Link.
Defense Evasion
[T1036] Masquerading
(Homograph/Typosquatting).
Remediation - THE ENTERPRISE TRACK (SANS PICERL)
Phase 1: Identification & Containment
Audit
Immediately conduct a domain portfolio audit to identify unprotected TLDs (.io, .ai, .co.uk).
Monitoring
Deploy automated brand monitoring services to scan for newly registered domains (NRDs) utilizing fuzzy matching against corporate trademarks.
Blocklist
Ingest identified squatter domains (e.g., smartproxy[.]org) into firewall/proxy denylists immediately.
Phase 2: Eradication
Takedown
File UDRP (Uniform Domain-Name Dispute-Resolution Policy) complaints with WIPO for verified infringing domains. WIPO handled 6,200 such disputes in 2025.
Defensive Registration
Preemptively register common misspellings and combo-variants of core brand assets to deny attacker infrastructure.
Phase 3: Recovery
Communication
Issue clear advisories to customers listing only official domains to mitigate reputation damage seen in the Decodo case.
Validation
Verify email authentication standards (DMARC/SPF/DKIM) are strictly enforced to prevent squatters from spoofing corporate communications.
Phase 4: Lessons Learned
Integrate "Combosquatting" detection into Threat Intelligence platforms.
Educate employees on inspecting URLs for homograph attacks (e.g., relying on password manager auto-fill which refuses to fill on fake domains).
Remediation - THE HOME USER TRACK
Priority 1: Safety (Verification)
Inspect the URL
Do not trust a link just because it has a "padlock" icon. Verify the spelling character-by-character. Be wary of domains ending in .net, .org, or .cn if the service usually uses .com.
Use a Password Manager
If your password manager does not offer to auto-fill your credentials, DO NOT manually type them. You are likely on a squatted site (e.g., netflix-login[.]com instead of netflix[.]com).
Priority 2: Identity
If you suspect you visited a squatted site like amuldistributor[.]com, assume your credentials are compromised. Reset passwords immediately from a known safe device.
Enable MFA (Hardware keys preferred) to prevent account takeover even if you fall for a typosquatting phish.
Priority 3: Persistence
Scan your device for malware. Squatted domains are confirmed to distribute ransomware and other malware loaders.
Hardening & References
Baseline
CIS Control 13 (Network Monitoring and Defense) – Automate the detection of lookalike domains.
Framework
NIST CSF (ID.RA) – Identify risks associated with brand impersonation and supply chain trust.
Tactical
Use tools like dnstwist to generate potential squatting permutations for your organization's domain and monitor them.
Sources
Cyber Security News
Trust, but verify. In 2026, your domain is your perimeter.