Your brand is likely already being impersonated somewhere online.
In the demo we show you:
How many active threats target your brand right now
How quickly Astra detects them
How fast they can be removed with instant approval
Domain abuse (also called DNS abuse) refers to the malicious use of domain names to conduct phishing, distribute malware, impersonate brands, or perpetrate fraud. ICANN defines five categories of DNS abuse: phishing, malware, botnets, pharming, and spam used to deliver other forms of DNS abuse.
ICANN formally recognizes five categories of DNS abuse in its contractual agreements with registrars and registries:
Beyond ICANN's formal categories, brand owners face additional forms of domain abuse:
Typosquatting — Registering common misspellings of a brand's domain (e.g., goggle.com, amazom.com). Exploits inevitable user typing errors to redirect traffic to malicious sites.
Combosquatting — Adding words to a brand name to create plausible-looking domains (e.g., brand-login.com, brand-support.com, brand-clearance-sale.com). Research has shown combosquatting to be more prevalent than typosquatting.
Homograph attacks — Using Unicode characters that visually resemble Latin letters to create domains that appear identical to legitimate ones. For example, using Cyrillic 'а' (U+0430) instead of Latin 'a' (U+0061).
TLD squatting — Registering a brand's name under different top-level domains (e.g., brand.shop, brand.online, brand.xyz). With over 1,200 gTLDs available as of 2025, this attack surface has expanded significantly.
Subdomain abuse — Using a brand name as a subdomain of a domain the attacker controls (e.g., brand.attacker-site.com). This doesn't create a new domain registration and is therefore invisible to zone file monitoring.
Expired domain hijacking — Acquiring legitimately branded domains that have lapsed (e.g., a brand's old campaign domain) and repurposing them for malicious use. These domains may retain search engine authority and backlinks.
Domain abuse typically follows a pattern:
The attacker registers a domain that contains, resembles, or is associated with the target brand. Bulk registration tools allow hundreds of domains to be registered in minutes. Privacy/proxy services or false WHOIS data obscure the registrant's identity.
DNS records are configured — A records point to hosting, MX records enable email (for phishing), SSL certificates are obtained (Let's Encrypt provides free, automated certificates with no identity verification). This stage can be completed in under an hour.
The malicious content goes live — a phishing page, fake shop, scam site, or malware distribution point. Content is often cloned from the legitimate brand's website.
The domain is used for its intended malicious purpose — sending phishing emails, running ads, appearing in search results, or being shared on social media.
When the domain is detected and reported, the attacker abandons it and activates another from a pre-registered pool. Sophisticated operations maintain hundreds of domains at various stages of this lifecycle.
Since April 5, 2024, ICANN's updated Registrar Accreditation Agreement (RAA) and Base Registry Agreement contain strengthened requirements for DNS abuse mitigation:
In April and May 2024 alone, ICANN received 1,558 complaints related to DNS abuse under the new framework.
ICANN's next round of new gTLD applications is expected in 2026, which will further expand the domain name landscape. Each new TLD creates additional monitoring requirements for brand owners.
The most direct route for domain-level takedowns. File an abuse complaint with the domain's registrar, providing:
For trademark-based domain disputes:
For domains involved in criminal activity (fraud, identity theft, counterfeiting):
The most effective approach targets domain abuse from multiple angles simultaneously:
This multi-vector approach minimizes the time a malicious domain can operate and makes it more costly for attackers to rotate to new domains.
In the demo we show you:
How many active threats target your brand right now
How quickly Astra detects them
How fast they can be removed with instant approval
Cookies on Astra
We use a small set of cookies to run this site and understand how it's used. Essentials are always on. Privacy details.