{"id":12679,"date":"2025-12-16T05:55:43","date_gmt":"2025-12-16T13:55:43","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=12679"},"modified":"2025-12-19T04:24:56","modified_gmt":"2025-12-19T12:24:56","slug":"parked-domains-become-weapons-with-direct-search-advertising","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/parked-domains-become-weapons-with-direct-search-advertising\/","title":{"rendered":"Parked Domains Become Weapons with Direct Search Advertising"},"content":{"rendered":"<h3>Executive Summary<\/h3>\n<p>Just how dangerous is a parked domain? A lot more than you might think. Defenders often associate parked domains with bland pages filled with search advertisements, leading many to conclude they are harmless. But the landscape has changed. Increasingly, the user is led directly to an \u201cadvertisement.\u201d We use quotes here because an extensive investigation into the modern parking ecosystem found that the landing page was malicious more often than not. But it\u2019s not just malicious advertisers that make parked domains risky; threat actors operating within the complex ecosystem abuse it in ways that make crime easy and attribution difficult. We\u2019ve spent the last several months trying to untangle it. Along the way, we found actors pulling DNS shenanigans. This report describes why parking has become more dangerous and details three previously unpublished actors who play an underreported role in the threat landscape.<\/p>\n<p>Parking threats are fueled by lookalike domains. No domain is immune. When one of our researchers tried to report a crime to the FBI\u2019s Internet Crime Complaint Center (IC3), they accidentally visited ic3[.]org instead of ic3[.]gov. Their phone was quickly redirected to a false \u201cDrive Subscription Expired\u201d page. They were lucky to receive a scam; based on what we\u2019ve learnt, they could just as easily receive an information stealer or trojan malware.   The real threat from parked domains comes from their ability to hide malicious activity. If we visit that same domain from a website scanner, it delivers a stereotypical parking page, leading people and automated systems to believe it is harmless. See Figure 1. See a recording of how the same domain delivers different threats <a href=\"https:\/\/www.infoblox.com\/video\/cardinal-health-malicious-typo\/\" target=\"_blank\"><strong>here<\/strong><\/a>.<\/p>\n<div class=\"img-container\">\n<img decoding=\"async\" src=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/domain_parking_figure_1a-v2.jpg\" alt=\"Figure 1\" \/><br \/>\n<img decoding=\"async\" src=\"\/wp-content\/uploads\/domain_parking_figure_1b.jpg\" alt=\"Figure 1\" style=\"width:175px\" \/>\n<\/div>\n<p class=\"image-caption\">Figure 1. A <a href=\"https:\/\/urlscan.io\/result\/019a2c06-df9d-739e-83ce-c470a8552f11\/\" target=\"_blank\"><strong>scan<\/strong><\/a> of ic3[.]org, a lookalike to the FBI Internet Crime Complaint Center website, returned a non-threatening parking page (left) whereas a mobile user was instantly directed to deceptive content in October 2025 (right).<\/p>\n<p>At the heart of the matter is a feature referred to as <a href=\"https:\/\/www.trillion.com\/why-use-trellians-domain-redirect-traffic\" target=\"_blank\"><strong>direct search<\/strong><\/a> or <a href=\"https:\/\/doc.zeropark.com\/article\/creating-a-new-domain-redirect-campaign\" target=\"_blank\"><strong>zero click parking<\/strong><\/a>, which is intended to directly deliver users relevant content based on the parked domain name. When a domain owner opts into direct search, traffic to the domain is sold to advertisers who bid on keywords and traffic characteristics. In practice, the site visitor is usually funneled through a series of traffic distribution systems (TDSs) operated by third-party advertising platforms, creating a complex web where a legitimate business model is weaponized for abuse.<\/p>\n<p>The likelihood of encountering malicious content has risen dramatically since a major <a href=\"https:\/\/www.usenix.org\/system\/files\/conference\/usenixsecurity14\/sec14-paper-alrwais.pdf\" target=\"_blank\"><strong>study was published<\/strong><\/a> over a decade ago. Those researchers, although alarmed by the potential risks, estimated that malicious content was delivered less than 5% of the time via parked domains. We\u2019ve found that the situation is now reversed: malicious content is the norm. Aside from incidental typos, unscrupulous parties purchase formerly legitimate domains or lookalike domains and drive victims to them. Additionally, the rapid proliferation of generative AI tools plays a role in this threat landscape. AI chat systems incorporate internet history into their training models and can include outdated URLs in their answers. When these domains are picked up by bad actors, the seemingly trustworthy AI link can <a href=\"https:\/\/blog.kinto-technologies.com\/posts\/2025-05-30-Gen-AI-Lead-to-a-Support-Scam-Site-en%20\/\" target=\"_blank\"><strong>lead users to malicious content<\/strong><\/a>.<\/p>\n<p>In large scale experiments, we found that over 90% of the time, visitors to a parked domain would be directed to illegal content, scams, scareware and anti-virus software subscriptions, or malware, as the \u201cclick\u201d was sold from the parking company to advertisers, who often resold that traffic to yet another party. None of this displayed content was related to the domain name we visited.<\/p>\n<p>The details of the parking threat ecosystem are complex, so to illustrate the risks we will primarily examine a single domain: &lt;redacted&gt;[.]com, a typosquat of the legitimate domain for a large financial institution. Through this example, we\u2019ll demonstrate how accidental typos, or lookalike domains, deliberately placed by cybercriminals can lead to a variety of threats.<\/p>\n<p>&lt;redacted&gt;[.]com is part of a domain portfolio full of lookalikes to major brands, who own some of the most popular sites on the internet. These lookalike domains are not directly parked with a major company. Instead, an intermediary server operates as a simple TDS and will redirect to a standard parking page if the visitor is not from a residential IP address. Otherwise, the domain controller will redirect to one of a few parking companies where even more sophisticated user fingerprinting occurs before the landing page is displayed.<\/p>\n<p>We studied parking platforms, domain portfolio owners, publishers, and advertising networks for their role in delivering malvertising to end users. Sketchy players, along with abused entities, exist in every part of the ecosystem. While the scam or malware comes from the advertiser, we found domain portfolio holders often engage in suspicious practices and are an underreported element of the threat landscape. In this paper, we detail how:<\/p>\n<ul class=\"list-spacing\">\n<li>The &lt;redacted&gt;[.]com actor uses dedicated name servers and has a portfolio of nearly three thousand lookalike domains, including common typos like gmai[.]com. This Gmail lookalike is among many configured to receive mail and by all accounts it receives lots of it. We also found evidence that it is used deliberately in phishing and malware campaigns. The collection of personal information through mail is a risk associated with parked domains that goes beyond malvertising.<\/li>\n<li>Another actor\u2014the one who holds ic3[.]org\u2014rapidly rotates name servers and IP addresses for the parked domains in a \u201cdouble fast flux\u201d way. This sophisticated and rarely seen technique leverages dynamic DNS to avoid detection.<\/li>\n<li>A third actor owns domaincntrol[.]com, a domain that differs from GoDaddy\u2019s name servers by a single character. They use this lookalike domain to take advantage of typos in innocent people\u2019s DNS configurations, as well as to drive users to malware through their TDS. Recently, this actor altered their system to target Cloudflare Secure DNS (1.1.1.1) users specifically.<\/li>\n<li>These three domain portfolio holders target different demographics with a large collection of lookalike domains.<\/li>\n<\/ul>\n<p>Many thanks to <a href=\"https:\/\/www.surbl.org\/\" target=\"_blank\"><strong>SURBL<\/strong><\/a> for their collaboration in this research. One of the earliest threats we investigated together were domains that were clever lookalikes to major corporations leading through parking platforms and funky captchas to advertisements for a variety of \u201cprivacy\u201d applications. We were able to repeatedly go from a collection of parked domains to the same landing pages. Alarmed, we began to reach out to the parking platforms. Nearly a year later, <a href=\"https:\/\/www.trinitycyber.com\/blog\/blurred-lines-adtech-abuse-delivers-browser-hijackers-through-the-microsoft-store\" target=\"_blank\"><strong>Trinity Cyber released research<\/strong><\/a> demonstrating that these applications are powerful spyware.<\/p>\n<p>During the past year, we contacted multiple companies in the parking industry to discuss the malvertising we observed through their platforms. Each firm recognized that both domain holders and advertisers could abuse the parking platforms. Even with a desire to help reduce abuse, direct search creates a paradox. The threats are downstream, and since the redirection chains leading to threats can pass through multiple advertising networks, \u201cKnow Your Customer\u201d (KYC) doesn\u2019t extend to these final destinations. Team Internet AG was particularly helpful to us during this investigation.<\/p>\n<p><em>The malicious activity described in this report is not attributed to any known party. The parking or advertising platforms named in this report were not implicated in the malvertising we observed. In addition, the brands targeted by these malicious actors are innocent parties to an economy that makes accountability very difficult.<\/em><\/p>\n<h3>Direct Search Parking<\/h3>\n<p>Domains without a current webpage can be monetized by hosting them at a domain parking company that displays ads to visitors, generating passive income for the domain owner. Individuals who invested in domain names for future resale hope to make enough by parking them to pay for their annual domain renewals, and ideally a little extra for themselves. Some investors have large collections of domains; they are called \u201cdomainers\u201d in the industry.<\/p>\n<p>Traditional parking sites show advertisements that the website visitor must click on for the domain holder to be paid. But an alternative \u201czero click\u201d model, referred to as direct search, has been available for years. Advertisers bid on traffic based on a variety of criteria, including keywords, location, and device information. The user will then be redirected to the winning bidder, which might be an advertising network. Trillion Direct <a href=\"https:\/\/www.trillion.com\/direct.html\" target=\"_blank\"><strong>explains it this way<\/strong><\/a>:<\/p>\n<p style=\"text-align:center\"><em>\u201cDirect navigation search occurs when a user types a keyword-filled domain name into their browser\u2019s address bar. These are high-intent search users who are bypassing search engines because they know exactly what they want, and they want it now.\u201d<\/em><\/p>\n<p>In practice, we found this isn\u2019t true: rarely was the displayed content related to the parked domain name. The advertisements might have been related to the domain keywords a decade ago, but today that simply isn\u2019t the case.<\/p>\n<p>Whatever is advertised, high value domain portfolios can profit tremendously. According to <a href=\"https:\/\/www.above.com\/monetization.html\" target=\"_blank\"><strong>Above.com<\/strong><\/a>, domainers might see an 188% increase in revenue within a few months; see Figure 2. <\/p>\n<p><img decoding=\"async\" src=\"\/wp-content\/uploads\/domain_parking_figure_2.png\" alt=\"Figure 2\" \/><\/p>\n<p class=\"image-caption\">Figure 2. A monetization case study from Above.com demonstrates that domain portfolio owners can benefit greatly from using direct search.<\/p>\n<p>While Above.com emphasizes \u201c<a href=\"https:\/\/www.above.com\/blog\/maximizer-offers-exclusive-access-to-premium-ad-network\" target=\"_blank\"><strong>premium advertisers<\/strong><\/a>,\u201d in practice we found that the traffic was frequently sold to affiliate advertising networks, who often sold the traffic again, meaning that the final advertiser had no business relationship with Above. This disconnect between the parked domain and the advertisement isn\u2019t unique to Above; it was seen in every parking platform we examined.<\/p>\n<p>Recent policy changes by Google may inadvertently increase the risk to users from direct search abuse. Google is the large traffic buyer in the advertising industry. To combat fraud from parked domains, in March 2025, they began requiring advertisers to deliberately \u201copt-in\u201d to parking traffic. Domain investors immediately saw a dramatic reduction in their income. In response, parking platforms like Above <a href=\"https:\/\/www.above.com\/blog\/google-domain-parking-affect-profits-vs-alternatives\" target=\"_blank\"><strong>recommended that their clients<\/strong><\/a> adopt direct search to maintain a stable income from parked domains. Unfortunately, a greater adoption of direct search as it is today may help domainers but increase the risk for internet users and enterprises.<\/p>\n<p>While threats are delivered by advertisers, domainers can profit enormously from direct search and also play a part in the threat landscape. Researchers in 2014 demonstrated that they could control the flow of traffic from parked domains to advertisements. During our investigation, we identified domainers who appeared to do exactly that. Team Internet referred to this scheme as \u201cwhitewashing\u201d and it is similar to practices associated with  master134. We found multiple large domainers, including the one who holds &lt;redacted&gt;[.]com, who actively participated in screening website visits. Some affiliate advertising networks, like RichAds, claim to own portfolios of parked domains and sell traffic from them to their customers.<\/p>\n<h3>Visitor Profiling<\/h3>\n<p>&lt;redacted&gt;[.]com provides a good demonstration of the many ways that direct search is risky for internet users. We visited this domain hundreds of times and recorded the results. Figure 3 shows some of the redirection paths we observed while simulating different devices and browsers from different locations. The red boxes are domains connected to malware, scams, and deceptive content; the yellow to landing pages irrelevant to the initial domain such as gambling or antivirus; and the purple to the parking page that is essentially a decoy site. This figure reveals the complexity of traffic distribution for parked domains as well as the high level of risk for visitors.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/domain_parking_figure_3-scaled-v2.png\" alt=\"Figure 3\" \/><\/p>\n<p class=\"image-caption\">Figure 3: Samples of redirection paths when visiting &lt;redacted&gt;[.]com. Each branch includes a series of domains observed, including the color-coded landing page.<\/p>\n<p>A visit to &lt;redacted&gt;[.]com starts with lightweight fingerprinting. Based on the IP geolocation and user agent (UA) information, the site will either redirect to a stereotypical parking page or into a third-party advertising system. Connecting to the domain from a commercial VPN will display a standard parking page, but visiting from a residential IP address will lead into one of a handful of direct search platforms. In detail, when a user visits &lt;redacted&gt;[.]com:<\/p>\n<ol class=\"list-spacing\">\n<li>A DNS query is initiated for the A record of &lt;redacted&gt;[.]com.<\/li>\n<li>The name server, in this case ns1\/ns2[.]torresdns[.]com, responds with an IP address.<\/li>\n<li>The visitor performs a GET request to the IP, which will include certain details such as the user agent string and requestor\u2019s IP address.<\/li>\n<li>Software at the IP address fingerprints the user device and operates as a simple TDS:\n<ol class=\"list-spacing\">\n<li>If it recognizes the IP as belonging to a cloud service or a commercial VPN, it will redirect the traffic to ww1[.]&lt;redacted&gt;[.]com. \u2018ww1\u2019 has a CNAME configured in DNS to resolve 9145[.]searchmagnified[.]com, which leads to a park page operated by the company Skenzo.<\/li>\n<li>If it recognizes the IP as a residential IP (and likely a human), it will provide a 302 redirect to send the traffic onward into another TDS.<\/li>\n<\/ol>\n<\/li>\n<\/ol>\n<p>In over 1000 scans from residential proxies and Tor, we were never sent to a standard parking page, and we never received content related to banking. Instead, our traffic was sold through advertising networks, sometimes several times, before an \u201cadvertisement\u201d was displayed. Approximately 90% of the time we were directed to scams, malware, or unwanted content, but this content never came from a direct advertising partner of the major parking platforms, e.g., Zeropark and Trillion. Instead, it was delivered by  downstream advertisers, making it impossible for them to know the identity of the malvertiser, and demonstrating the shortcomings of KYC mechanisms to address cybercrime in the case of direct search. The initial visit was funneled from the domain owner of &lt;redacted&gt;[.]com to one of four platforms: <a href=\"https:\/\/zeropark.com\/\" target=\"_blank\"><strong>Zeropark<\/strong><\/a>, <a href=\"https:\/\/www.trillion.com\/direct.html\" target=\"_blank\"><strong>Trillion Direct Search<\/strong><\/a>, <a href=\"https:\/\/explorads.media\/\" target=\"_blank\"><strong>ExplorAds<\/strong><\/a>, and <a href=\"https:\/\/www.techtarget.com\/searchsecurity\/feature\/Inside-Master134-More-ad-networks-tied-to-malvertising-campaign\" target=\"_blank\"><strong>AdventureFeeds<\/strong><\/a>. <\/p>\n<p>Each advertising platform performs fingerprinting and may resell the traffic again as a result. To demonstrate the depth of secondary profiling that these firms conduct, let\u2019s consider a script used by one of the advertising affiliates of ExplorAds. It monitors iframes on the page, collects browser and hardware information, attempts to identify bots, and then sends a base64-encoded fingerprint to their TDS domain. See Figure 4. The data gathered includes:<\/p>\n<ul class=\"list-spacing\">\n<li>JavaScript and cookie support<\/li>\n<li>User-Agent, platform, languages<\/li>\n<li>Screen dimensions, pixel ratio, color depth<\/li>\n<li>WebGL vendor and renderer<\/li>\n<li>Audio\/media capabilities<\/li>\n<li>Touch and pointer events<\/li>\n<li>LocalStorage, SessionStorage, IndexedDB availability<\/li>\n<li>Network info (downlink, RTT, type)<\/li>\n<li>Notification API support<\/li>\n<li>Service worker and vibration support<\/li>\n<\/ul>\n<p><img decoding=\"async\" src=\"\/wp-content\/uploads\/domain_parking_figure_4.png\" alt=\"Figure 4\" \/><\/p>\n<p class=\"image-caption\">Figure 4. Device fingerprinting by ExplorAds advertising affiliate, arentmarket[.]com, an unknown actor. This script contains comments in Russian.<\/p>\n<h3>&lt;redacted&gt;[.]com Landing Pages<\/h3>\n<p>After profiling the user&#8217;s device, each TDS will redirect the user until they reach a final advertiser. Even then, in many cases, the user sees what advertisers call a pre-landing page, which funnels traffic even further. The click chain often also includes captchas, both real and fake, that limit access to the landing page and drive push notification subscriptions.<\/p>\n<p>The landing pages we observed ranged from irrelevant to suspicious to outright malware. The legitimate sites appear to be decoys, served when some TDS in the redirect chain decided our traffic was bot-generated (in fairness, it was). Some of the landing pages we encountered were:<\/p>\n<ul class=\"list-spacing\">\n<li>Standard search parking page at Skenzo (seen for all VPN traffic)<\/li>\n<li>Aliexpress, a popular online shopping website<\/li>\n<li>A page that automatically downloaded an installer for the web browser Opera GX<\/li>\n<li>Suspicious gambling sites<\/li>\n<li>Fake porn and dating sites<\/li>\n<li>Scareware and anti-virus subscription pages<\/li>\n<\/ul>\n<p>Occasionally, we were directed to malware. In one example, we were prompted to download an archive file containing a trojan. The lure was hosted at chatterjamtagbirdfile[.]monster. We were led to the payload from both <a href=\"https:\/\/urlscan.io\/result\/0199f649-d900-724d-b821-f71ed551c45a\/\" target=\"_blank\"><strong>ExplorAds<\/strong><\/a> and <a href=\"https:\/\/urlscan.io\/result\/0199f69b-be40-70ab-8d00-e23878bbc302\/\" target=\"_blank\"><strong>AdventureFeeds<\/strong><\/a>.<\/p>\n<p>The chatterjamtagbirdfile[.]monster site said, \u201cYour archive is ready\u201d and gave us instructions to download the file and provided a password for the archive (Figure 5). Clicking the button showed a link to mega[.]nz, a popular file sharing website where the malware was hosted.<\/p>\n<p><img decoding=\"async\" src=\"\/wp-content\/uploads\/domain_parking_figure_5.png\" alt=\"Figure 5\" \/><\/p>\n<p class=\"image-caption\">Figure 5: chatterjamtagbirdfile[.]monster page leading to Tedy malware<\/p>\n<p>The <a href=\"https:\/\/www.virustotal.com\/gui\/file\/86586f6954da38e5a5df7e56334ef98e74838dee68de0355ae4fe03d36c82502\/detection\" target=\"_blank\"><strong>ZIP<\/strong><\/a> file was not actually password protected. When we extracted it, it contained another archive inside: a .7z file named SourceOpen v.2.4.7z. This archive contained multiple files, a .DLL and an .EXE. Several security vendors\u2019 products detected this as Tedy malware.<\/p>\n<p>Tedy isn\u2019t the only malware being delivered via direct search from parked domains; it is simply the one we saw from this single lookalike domain. We also encountered ClickFix attacks delivering Babar malware, information stealers, and spyware.<\/p>\n<h3>&lt;redacted&gt;.com &#038; Gmai: Held by the Same Lookalike Domainer<\/h3>\n<p>Malicious advertisers are one component of the risks associated with visiting parked domains, but they would not receive any traffic without domainers\u2014those who hold investment portfolios of domains that drive traffic through the networks. Domainers often hold large numbers of lookalike domains, particularly ones that are common typos of major brands. Some have tens\u2014or even hundreds\u2014of thousands of domains. Domain monetization is <a href=\"https:\/\/www.namepros.com\/threads\/why-domain-parking-works-for-me.1228013\/\" target=\"_blank\"><strong>big business<\/strong><\/a> for those who invest wisely.<\/p>\n<p>Our research discovered several large domainers, including the owner of &lt;redacted&gt;[.]com, who appear to be directly involved in user profiling and not directly parking their domains at commercial platforms. These actors use IP geolocation, device fingerprinting, and cookies to determine where to redirect domain visitors. We analyzed their domain portfolios, DNS behavior, and redirection patterns.<\/p>\n<p>The name servers of &lt;redacted&gt;[.]com are subdomains of torresdns[.]com and served nearly three thousand lookalike domains in 2025. While the identity of the domain holder is unknown, we associate the &lt;redacted&gt;[.]com holder with the torresdns[.]com owner based on consistent naming and behavior patterns. The torresdns domain was registered in 2016 but only appears as an authoritative name server starting in late-2019.<\/p>\n<p>So, what other domains are part of the torresdns portfolio? We ran a proprietary lookalike detection algorithm on the domain names and uncovered a high density of typosquats of  websites that the average person would visit: Craigslist, YouTube, Google, Wikipedia, and Netflix, to name the most common ones. Craigslist was the most prevalent, with 89 lookalikes. See Figure 6 for a depiction of the top 50 imitated brands.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/domain_parking_figure_6-v2.png\" alt=\"Figure 6\" \/><\/p>\n<p class=\"image-caption\">Figure 6: Visualization of lookalike targets using torresdns[.] name servers, based on prevalence in the dataset.<\/p>\n<p>Torresdns is not a simple domain investor: they actively evaluate visitors to the domains to determine where to forward the traffic. Referring to the sample click chains in Figure 3, security vendors, scanners, and bot traffic are consistently directed from the initial IP address to a traditional parking page hosted by Skenzo. Real users are instead sent into direct search parking systems through HTTP redirect.<\/p>\n<p>Parked domains can be used for other malfeasances as well. The actor also holds gmai[.]com, a lookalike to Gmail and a common typo. This domain is configured with MX records. Email that is accidentally sent to the domain will be delivered to mail.h-email[.]net, which was registered in May 2023 and has <a href=\"https:\/\/blog.apnic.net\/2023\/04\/05\/who-reads-your-email\/\" target=\"_blank\"><strong>no known associations<\/strong><\/a> to legitimate mail services. There are numerous reports of users <a href=\"https:\/\/www.reddit.com\/r\/GMail\/comments\/rvd1id\/accidentally_sent_confidential_email_to\/\" target=\"_blank\"><strong>accidentally<\/strong><\/a> <a href=\"https:\/\/www.reddit.com\/r\/personalfinance\/comments\/7fyf6z\/tax_information_emailed_to_gmaicom\/\" target=\"_blank\"><strong>sending<\/strong><\/a> <a href=\"https:\/\/www.reddit.com\/r\/PersonalFinanceCanada\/comments\/fekr52\/t4_sent_to_gmaicom\/\" target=\"_blank\"><strong>personal<\/strong><\/a> information to a gmai[.]com account.<\/p>\n<p>We also found a significant amount of suspicious and malicious spam in our collections that used the domain. Our investigation into this domain determined that gmai[.]com is not just used for passive email collection but has been actively leveraged in multiple business email compromise campaigns. One campaign we identified was actively operating as of November 2025, using a lure indicating a failed payment with trojan malware attached.<\/p>\n<p>Details of an example email:<\/p>\n<table>\n<tr>\n<td>Send Date<\/td>\n<td>2025\/11\/25<\/td>\n<\/tr>\n<tr>\n<td>Sender Email<\/td>\n<td>sales@gmai[.]com<\/td>\n<\/tr>\n<tr>\n<td>Email Subject<\/td>\n<td>FWD: OUTSTANDING INVOICE PAYMENT.<\/td>\n<\/tr>\n<tr>\n<td>Attachment Name<\/td>\n<td>Bank Swiftcopy.rar<\/td>\n<\/tr>\n<tr>\n<td>Attachment SHA256<\/td>\n<td><a href=\"https:\/\/www.virustotal.com\/gui\/file\/c3f1f456419f39f19c9e0d5aae2b50f701abe517a3cc2952869e516b260dbf88\" target=\"_blank\"><strong>c3f1f456419f39f19c9e0d5aae2b50f701abe517a3cc2952869e516b260dbf88<\/strong><\/a><\/td>\n<\/tr>\n<\/table>\n<p>The hundreds of thousands of spam emails collected and high volume of DNS resolutions we\u2019ve identified related to gmai[.]com indicates a significant operation at play here, with the domain\u2019s parked appearance being only the tip of the iceberg. <\/p>\n<h3>Double Fast Flux in Action<\/h3>\n<p>Another domain portfolio actor is rapidly changing both the authoritative name servers and IP addresses for domains in their parking inventory; a mechanism similar to \u201cdouble\u201d fast flux. Fast flux is the use of dynamic DNS capabilities to update records quickly, making them more difficult to track. This technique dates back two decades but gained renewed attention with a <a href=\"https:\/\/www.cisa.gov\/news-events\/cybersecurity-advisories\/aa25-093a\" target=\"_blank\"><strong>CISA advisory<\/strong><\/a> in 2025. The use of name server fluxing is, in our experience, rare and it is what distinguishes \u201cdouble\u201d fast flux from the more common practice which changes only A records.  It is a mystery why the actor is using such a sophisticated and unusual technique, but they have around 80,000 domains in their portfolio, including some very clever lookalikes.<\/p>\n<p>One domain in this actor\u2019s portfolio is ic3[.]org, which has resolved to over 400 IP addresses since 2018. <a href=\"https:\/\/imgur.com\/a\/2gJnura\" target=\"_blank\"><strong>Queries for the name servers<\/strong><\/a> will rotate through a variety of different responses. See Figure 7 for various responses seen through different public resolvers using digwebinterface[.]com: the actor likes animals, it seems!<\/p>\n<p><img decoding=\"async\" src=\"\/wp-content\/uploads\/domain_parking_figure_7.jpg\" alt=\"Figure 7\" \/><\/p>\n<p class=\"image-caption\">Figure 7: Image of name server results for ic3[.]org using digwebinterface[.]com on November 26, 2025. Name servers for ic3[.]org will have different results depending on which resolver is queried.<\/p>\n<p>This operation seems to be designed for DNS lovers. The authoritative name server for ic3[.]gov was configured to brainydns[.]com in the .org zone file; however, when queried, brainydns[.]com often delegated to one of the above DNS servers. These name server records have a 600 second TTL, meaning different DNS resolvers will cache different name server responses, creating significant resilience against some blocking strategies.<\/p>\n<p>The name servers we have seen used by this portfolio actor are:<\/p>\n<ul class=\"list-spacing\">\n<li>koaladns[.]com<\/li>\n<li>weaponizedcow[.]com<\/li>\n<li>numbatdns[.]com<\/li>\n<li>quokkadns[.]com<\/li>\n<li>emu-dns[.]com<\/li>\n<li>echidns[.]com<\/li>\n<li>magpiedns[.]com<\/li>\n<li>kirklanddc[.]com<\/li>\n<li>hastydns[.]com<\/li>\n<li>milesmx[.]com<\/li>\n<\/ul>\n<p>In addition to name server tricks, this portfolio actor also funnels visitor traffic themselves before sending it to parking platforms. We found these domains to be resistant to security scanners. When the actor detects a VPN or bot, it will redirect them to a plain parking page at Skenzo. But when it perceives a real user, it sells the traffic to one of a handful of advertisers who perform further user profiling. The actor occasionally redirects to a major platform like Zeropark, but more often directs to a variety of less common advertising TDS domains including:<\/p>\n<ul class=\"list-spacing\">\n<li><a href=\"https:\/\/any.run\/report\/1df09848a5bac95376a0ceb01aeeaa2fc53300516403631f8c08859a0c1a5589\/7fc5ac4e-66cb-4570-a59f-0ed5148198fc\" target=\"_blank\"><strong>click-v4.junclikrmedi[.]com<\/strong><\/a><\/li>\n<li><a href=\"https:\/\/any.run\/report\/99b2b7c4e90864de5916f099eafe9cf464938e37ddc85e5518db29861d8d3096\/3143b8b9-d7da-465e-b577-cae23ce37143\" target=\"_blank\"><strong>quotes[.]com<\/strong><\/a><\/li>\n<li><a href=\"https:\/\/malwaretips.com\/blogs\/toroexoclk-com\/\" target=\"_blank\"><strong>www[.]toroexoclk[.]com<\/strong><\/a><\/li>\n<\/ul>\n<p>This fast flux actor also owns a large collection of typosquat domains. While the torresdns actor primarily targets well-known brands, this domainer holds many domain names that mimic adult content, gaming sites, and illegal activity, possibly targeting a younger audience. The most popular targets were Netflix, Youtube, Google, Pornhub, and Newtoki, which is a platform for unauthorized distribution of manga and comics. See Figure 8 for brands targeted by this actor.<\/p>\n<p><img decoding=\"async\" src=\"\/wp-content\/uploads\/domain_parking_figure_8.png\" alt=\"Figure 8\" \/><\/p>\n<p class=\"image-caption\">Figure 8: A visualization of popular targets of domains that use koaladns[.]com as a name server.<\/p>\n<p>The use of double fast flux, combined with the use of cloaking infrastructure to direct traffic from clever parked lookalike domains, indicates a professionally operated evasion system and a resilience not seen with typical typosquatting operations.<\/p>\n<h3>Usurping GoDaddy Name Servers<\/h3>\n<p>A third domainer not only leverages a large portfolio of domains but benefits from innocent parties who make a typo in their DNS name server records. The actor owns domaincntrol[.]com, which differs by a single letter from the GoDaddy name server domain, domaincontrol[.]com. The base typosquat domain, domaincntrol[.]com, displays a non-descript page containing only the phrase \u201cWe are a domain parking company&#8230;\u201d They are a lot more than a parking company&#8230; and as of a few months ago, they began specifically targeting Cloudflare DNS (1.1.1.1) users.<\/p>\n<p>Multiple methods drive traffic to their TDS. They appear to purchase expired domains, which may have lingering references on the internet from cached search results and outdated hyperlinks. Expired domains dropped through mergers and acquisitions, or rebranding, are particularly vulnerable. When a user visits one of the old links, they are sent into the actor\u2019s TDS. In one example, the University Accounting Service (UAS) payment system migrated from <a href=\"https:\/\/web.archive.org\/web\/20220915000000*\/uasecho.com\" target=\"_blank\"><strong>uasecho[.]com<\/strong><\/a> to usaconnect[.]com in 2022, but when UAS let the original domain lapse, the domaincntrol actor <a href=\"https:\/\/web.archive.org\/web\/20250701000000*\/uasecho.com\" target=\"_blank\">took it over<\/a>. As a result, users visiting the old payment portal were redirected to malicious content.<\/p>\n<p>Another risk related to lingering URLs is Generative AI, which consumes them in the form of training data. The Japanese firm Kinto Technologies documented a specific case where an AI chat response led to a <a href=\"https:\/\/blog.kinto-technologies.com\/posts\/2025-05-30-Gen-AI-Lead-to-a-Support-Scam-Site-en%20\/\" target=\"_blank\"><strong>tech support scam<\/strong><\/a> through domaincntrol[.]com. In addition to the parked domain, Kinto found that over 20,000 websites contained code that redirected to domaincntrol[.]com in May 2025; we found nearly 30,000 sites in November. <\/p>\n<p>The actor also gains traffic from typos in DNS name server records. GoDaddy is the single largest registrar in the world and one of the largest hosting providers. It is not uncommon for innocent domain holders to make a typo when configuring their DNS records, enabling the parking actor to receive traffic intended for their site. Our research found that over 19k domains were configured to use domaincntrol[.]com as a name server, many owned by the domain actor, but others clearly misconfigured.  <\/p>\n<p>We found examples where only one name server record contained the single-letter typo.  For example, in late November, the domain referenced in Figure 9 was configured this way. As a result, about 50% of their DNS traffic could go to GoDaddy and the rest to the typosquat-version TDS. Imagine what you can do with 50% of the traffic from random websites around the world. <\/p>\n<p><img decoding=\"async\" src=\"\/wp-content\/uploads\/domain_parking_figure_9.jpg\" alt=\"Figure 9\" \/><\/p>\n<p class=\"image-caption\">Figure 9: Domain\u2019s namevservers for gambel[.]law configured to both domaincontrol[.]com and domaincntrol[.]com in November 2025. A recursive resolver will pick from these two options.<\/p>\n<p>When a user visits one of more than 30k domains that utilize the name server, they are first sent to 64.225.91[.]73 (Digital Ocean). A script there will attempt three times to run a javascript-based profiler at domaincntrol[.]com and otherwise do a force redirect to nojs[.]domaincntrol[.]com. The initial device fingerprinting is sent in HTTP headers as shown in Figure 10. From there, the user is either sent to parking at a major service, e.g., Sedo, Team Internet, or Skenzo, or their traffic is sold to a third-party advertiser.<\/p>\n<div style=\"border:1px solid #000;padding:10px\">{&#8220;destination&#8221;:&#8221;sedo&#8221;,&#8221;orighost&#8221;:&#8221;mavilibeyazajans.com&#8221;,&#8221;type&#8221;:&#8221;org&#8221;,&#8221;finalurl&#8221;:&#8221;http:\/\/ww2.mavilibeyazajans.com&#8221;,&#8221;browser&#8221;:&#8221;chrome&#8221;,&#8221;os&#8221;:&#8221;linux&#8221;,&#8221;country&#8221;:&#8221;CA&#8221;,&#8221;device&#8221;:&#8221;desktop&#8221;,&#8221;isbot&#8221;:false,&#8221;botscore&#8221;:7}\n<\/div>\n<p class=\"image-caption\">Figure 10. An example of HTTP headers sent to domaincntrol[.]com for use in device fingerprinting.<\/p>\n<p>The actor made a surprising change to their name server behavior in late July or early August 2025. Only queries from the <a href=\"https:\/\/www.cloudflare.com\/learning\/dns\/what-is-1.1.1.1\/\" target=\"_blank\"><strong>Cloudflare 1.1.1.1 resolvers<\/strong><\/a> are answered; all other resolvers will receive an error or no response. See Figure 11. As a result, only users of Cloudflare\u2019s secure DNS service are targeted. While this may seem limiting, 1.1.1.1 serves approximately 2 trillion DNS queries every day and is the default DNS resolver for Firefox users.<\/p>\n<p><img decoding=\"async\" src=\"\/wp-content\/uploads\/domain_parking_figure_11.jpg\" alt=\"Figure 11\" \/><\/p>\n<p class=\"image-caption\">Figure 11. The name server domaincntrol[.]com selectively answers queries and directly answers Cloudflare 1.1.1.1 according to digwebinterface[.]com on November 25, 2025. Cloudflare users are sent to the IP address 64[.]225[.]91[.]73, which redirects to the actor\u2019s TDS.<\/p>\n<p>Using Cloudflare DNS, we visited lemaymotors[.]com and were immediately driven to a ClickFix attack delivering malware at sportswear[.]homes. See Figure 12. The page attempts to trick users into running a malicious script that downloads and executes a file (SHA256: 4a3497d66a64c22342d855d2da370c9a4351e6403bbd224093c4b348bd611df4) hosted at hxxp:\/\/85[.]209[.]129[.]9:5509\/xa.vbs. Many security vendors\u2019 products detected this as Babar malware.<\/p>\n<p><img decoding=\"async\" src=\"\/wp-content\/uploads\/domain_parking_figure_12.jpg\" alt=\"Figure 12\" \/><\/p>\n<p class=\"image-caption\">Figure 12: ClickFix attack hosted on sportswear[.]homes.<\/p>\n<p>It is unclear why the actor changed their system to target Cloudflare users recently, but selective resolution combined with the size of their domain portfolio and their ability to take advantage of mistakes in innocent domain holders\u2019 DNS configurations makes them a formidable threat.<\/p>\n<h3>Conclusion<\/h3>\n<p>Parked domains may seem innocuous, but they are a bigger threat than most people think. Our research found that while unscrupulous advertisers were responsible for delivering malicious content, there are also large domain investment portfolio owners who are actively profiling devices and selectively driving internet users into dangerous territory. Their role in the parking threat landscape is underreported. At the same time, there is no clear path to effectively report abuse in the parking ecosystem. Reputable parking platforms gather KYC information on their direct customers, but the threat to internet users and enterprises is generally out of their purview. Moreover, the anti-fraud mechanisms these companies use inadvertently protect the bad advertisers from detection as well. Finally, an unintended consequence of Google\u2019s advertising policy changes may be to exacerbate the threat by causing domain holders to increasingly adopt direct search. The number of malicious advertisers may not be high, but the risk that the average user reaches them through a simple typo sure is.<\/p>\n<h3>Indicators<\/h3>\n<p>Those indicators can also be found in our <a href=\"https:\/\/github.com\/infobloxopen\/threat-intelligence\" target=\"_blank\"><strong>open GitHub repository<\/strong><\/a>.<\/p>\n<table>\n<thead>\n<tr>\n<th>Indicator<\/th>\n<th>Type<\/th>\n<th>Description<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td>86586f6954da38e5a5df7e56334ef98e74838dee68de0355ae4fe03d36c82502<br \/>\n4a3497d66a64c22342d855d2da370c9a4351e6403bbd224093c4b348bd611df4<br \/>\nc3f1f456419f39f19c9e0d5aae2b50f701abe517a3cc2952869e516b260dbf88 <\/td>\n<td>sha256<\/td>\n<td>Malware file<\/td>\n<\/tr>\n<tr>\n<td>chatterjamtagbirdfile[.]monster<br \/>\ncolaureat[.]icu<br \/>\ndigesttech[.]com<br \/>\nsafezonefirewall[.]com<br \/>\nsportswear[.]homes <\/td>\n<td>Domain<\/td>\n<td>Landing page<\/td>\n<\/tr>\n<tr>\n<td>velixnero[.]co[.]in<br \/>\ndrizzledrape[.]co<br \/>\ninstallupdate[.]online<\/td>\n<td>Domain<\/td>\n<td>Redirect domain<\/td>\n<\/tr>\n<tr>\n<td>domaincntrol[.]com<br \/>\ntorresdns[.]com<br \/>\nbrainydns[.]com<br \/>\nkoaladns[.]com<br \/>\nweaponizedcow[.]com<br \/>\nnumbatdns[.]com<br \/>\nquokkadns[.]com<br \/>\nemu-dns[.]com<br \/>\nechidns[.]com<br \/>\nmagpiedns[.]com<br \/>\nkirklanddc[.]com<br \/>\nhastydns[.]com<br \/>\nmilesmx[.]com <\/td>\n<td>Domain<\/td>\n<td>Nameserver domain <\/td>\n<\/tr>\n<tr>\n<td>78.41.204.30<\/td>\n<td>IP Address <\/td>\n<td>Dedicated Domain IP<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<style>\n.savy-seahorse-table {font-size:14px;word-break: keep-all;}.savy-seahorse-table td:last-child, .savy-seahorse-table th:last-child {padding-right:10px;}.\/*code-format {\tfont-family: 'Courier New';}*\/.image-caption {    font-size: 12px;margin-top:auto;}.list-spacing li{margin-bottom:20px}.img-container, .img-container-3-col {display: flex;}.img-container img {    width: 67%;    margin-bottom: 10px;    height: max-content !important;}.img-container-3-col img {width: 30%;margin-bottom: 10px;}@media (max-width: 767px) {.img-container, .img-container-3-col {display: block;}.img-container img, .img-container-3-col img {width: 100%;}.grid-container {    grid-template-columns: 1fr!important;  }}@media (min-width: 767px) {.img-50{width:50%;}}.grid-container {  display: grid;  grid-template-columns: repeat(2, 1fr);  gap: 40px;  max-width: 800px;  margin: 0 auto;  align-items: stretch;}.grid-item {   display: flex;  flex-direction: column;  justify-content: flex-start;}.grid-item img {  width: 100%;  height: auto;}.image-caption {font-size: 12px;}.iti-blog-table,\n.iti-blog-table * {\n    font-size: 15px !important;\n}<\/style>\n<p><script>\njQuery('.single h1').html('<span class=\"gradient\">Parked Domains Become Weapons<\/span> with Direct Search Advertising');\n<\/script><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Executive Summary Just how dangerous is a parked domain? A lot more than you might think. Defenders often associate parked domains with bland pages filled with search advertisements, leading many to conclude they are harmless. But the landscape has changed. Increasingly, the user is led directly to an \u201cadvertisement.\u201d We use quotes here because an [&hellip;]<\/p>\n","protected":false},"author":397,"featured_media":12680,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[254],"tags":[30,1496,774,1082,902,32,828,1497,40,1330,1498],"class_list":{"0":"post-12679","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threat-intelligence","8":"tag-dns","9":"tag-domain-parking","10":"tag-malvertising","11":"tag-traffic-distribution-system","12":"tag-tds","13":"tag-malware","14":"tag-scam","15":"tag-parked-domain","16":"tag-threat-intelligence","17":"tag-threat-research","18":"tag-direct-search-abuse","19":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Parked Domains Become Weapons with Direct Search Advertising<\/title>\n<meta name=\"description\" content=\"Parked domains fuel a complex threat ecosystem. Infoblox uncovers direct search abuse, malicious advertisers, and DNS fast flux tactics behind the scenes.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/parked-domains-become-weapons-with-direct-search-advertising\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Parked Domains Become Weapons with Direct Search Advertising\" \/>\n<meta property=\"og:description\" content=\"Parked domains fuel a complex threat ecosystem. Infoblox uncovers direct search abuse, malicious advertisers, and DNS fast flux tactics behind the scenes.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/parked-domains-become-weapons-with-direct-search-advertising\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2025-12-16T13:55:43+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-19T12:24:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/blog-domain-parking-threats-thumbnail.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"612\" \/>\n\t<meta property=\"og:image:height\" content=\"408\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Infoblox Threat Intel\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Parked Domains Become Weapons with Direct Search Advertising\" \/>\n<meta name=\"twitter:description\" content=\"Parked domains fuel a complex threat ecosystem. Infoblox uncovers direct search abuse, malicious advertisers, and DNS fast flux tactics behind the scenes.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/blog-domain-parking-threats-thumbnail.jpeg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Infoblox Threat Intel\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"24 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/parked-domains-become-weapons-with-direct-search-advertising\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/parked-domains-become-weapons-with-direct-search-advertising\\\/\"},\"author\":{\"name\":\"Infoblox Threat Intel\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/b6aed8965e3298a0817c16d32c0a67ae\"},\"headline\":\"Parked Domains Become Weapons with Direct Search Advertising\",\"datePublished\":\"2025-12-16T13:55:43+00:00\",\"dateModified\":\"2025-12-19T12:24:56+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/parked-domains-become-weapons-with-direct-search-advertising\\\/\"},\"wordCount\":4890,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/parked-domains-become-weapons-with-direct-search-advertising\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/blog-domain-parking-threats-thumbnail.jpeg\",\"keywords\":[\"DNS\",\"domain parking\",\"malvertising\",\"Traffic Distribution System\",\"TDS\",\"Malware\",\"scam\",\"parked domain\",\"Threat Intelligence\",\"threat research\",\"direct search abuse\"],\"articleSection\":[\"Infoblox Threat Intel\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/parked-domains-become-weapons-with-direct-search-advertising\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/parked-domains-become-weapons-with-direct-search-advertising\\\/\",\"name\":\"Parked Domains Become Weapons with Direct Search Advertising\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/parked-domains-become-weapons-with-direct-search-advertising\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/parked-domains-become-weapons-with-direct-search-advertising\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/blog-domain-parking-threats-thumbnail.jpeg\",\"datePublished\":\"2025-12-16T13:55:43+00:00\",\"dateModified\":\"2025-12-19T12:24:56+00:00\",\"description\":\"Parked domains fuel a complex threat ecosystem. Infoblox uncovers direct search abuse, malicious advertisers, and DNS fast flux tactics behind the scenes.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/parked-domains-become-weapons-with-direct-search-advertising\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/parked-domains-become-weapons-with-direct-search-advertising\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/parked-domains-become-weapons-with-direct-search-advertising\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/blog-domain-parking-threats-thumbnail.jpeg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/blog-domain-parking-threats-thumbnail.jpeg\",\"width\":612,\"height\":408},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/parked-domains-become-weapons-with-direct-search-advertising\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Infoblox Threat Intel\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/threat-intelligence\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Parked Domains Become Weapons with Direct Search Advertising\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/b6aed8965e3298a0817c16d32c0a67ae\",\"name\":\"Infoblox Threat Intel\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_397_1714162589-96x96.png\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_397_1714162589-96x96.png\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_397_1714162589-96x96.png\",\"caption\":\"Infoblox Threat Intel\"},\"description\":\"Infoblox Threat Intel is the leading creator of original DNS threat intelligence, distinguishing itself in a sea of aggregators. What sets us apart? Two things: mad DNS skills and unparalleled visibility. DNS is notoriously tricky to interpret and hunt from, but our deep understanding and unique access to the internet's inner workings allow us to track down threat actors that others can't see. We're proactive, not just defensive, using our insights to disrupt cybercrime where it begins. We also believe in sharing knowledge to support the broader security community by publishing detailed research and releasing indicators on GitHub. In addition, our intel is seamlessly integrated into our Infoblox Protective DNS solutions, so customers automatically get its benefits, along with ridiculously low false positive rates.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/infoblox-threat-intel\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Parked Domains Become Weapons with Direct Search Advertising","description":"Parked domains fuel a complex threat ecosystem. Infoblox uncovers direct search abuse, malicious advertisers, and DNS fast flux tactics behind the scenes.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/parked-domains-become-weapons-with-direct-search-advertising\/","og_locale":"en_US","og_type":"article","og_title":"Parked Domains Become Weapons with Direct Search Advertising","og_description":"Parked domains fuel a complex threat ecosystem. Infoblox uncovers direct search abuse, malicious advertisers, and DNS fast flux tactics behind the scenes.","og_url":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/parked-domains-become-weapons-with-direct-search-advertising\/","og_site_name":"Infoblox Blog","article_published_time":"2025-12-16T13:55:43+00:00","article_modified_time":"2025-12-19T12:24:56+00:00","og_image":[{"width":612,"height":408,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/blog-domain-parking-threats-thumbnail.jpeg","type":"image\/jpeg"}],"author":"Infoblox Threat Intel","twitter_card":"summary_large_image","twitter_title":"Parked Domains Become Weapons with Direct Search Advertising","twitter_description":"Parked domains fuel a complex threat ecosystem. Infoblox uncovers direct search abuse, malicious advertisers, and DNS fast flux tactics behind the scenes.","twitter_image":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/blog-domain-parking-threats-thumbnail.jpeg","twitter_misc":{"Written by":"Infoblox Threat Intel","Est. reading time":"24 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/parked-domains-become-weapons-with-direct-search-advertising\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/parked-domains-become-weapons-with-direct-search-advertising\/"},"author":{"name":"Infoblox Threat Intel","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/b6aed8965e3298a0817c16d32c0a67ae"},"headline":"Parked Domains Become Weapons with Direct Search Advertising","datePublished":"2025-12-16T13:55:43+00:00","dateModified":"2025-12-19T12:24:56+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/parked-domains-become-weapons-with-direct-search-advertising\/"},"wordCount":4890,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/parked-domains-become-weapons-with-direct-search-advertising\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/blog-domain-parking-threats-thumbnail.jpeg","keywords":["DNS","domain parking","malvertising","Traffic Distribution System","TDS","Malware","scam","parked domain","Threat Intelligence","threat research","direct search abuse"],"articleSection":["Infoblox Threat Intel"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/parked-domains-become-weapons-with-direct-search-advertising\/","url":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/parked-domains-become-weapons-with-direct-search-advertising\/","name":"Parked Domains Become Weapons with Direct Search Advertising","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/parked-domains-become-weapons-with-direct-search-advertising\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/parked-domains-become-weapons-with-direct-search-advertising\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/blog-domain-parking-threats-thumbnail.jpeg","datePublished":"2025-12-16T13:55:43+00:00","dateModified":"2025-12-19T12:24:56+00:00","description":"Parked domains fuel a complex threat ecosystem. Infoblox uncovers direct search abuse, malicious advertisers, and DNS fast flux tactics behind the scenes.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/parked-domains-become-weapons-with-direct-search-advertising\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/threat-intelligence\/parked-domains-become-weapons-with-direct-search-advertising\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/parked-domains-become-weapons-with-direct-search-advertising\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/blog-domain-parking-threats-thumbnail.jpeg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/blog-domain-parking-threats-thumbnail.jpeg","width":612,"height":408},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/parked-domains-become-weapons-with-direct-search-advertising\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Infoblox Threat Intel","item":"https:\/\/www.infoblox.com\/blog\/category\/threat-intelligence\/"},{"@type":"ListItem","position":3,"name":"Parked Domains Become Weapons with Direct Search Advertising"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/b6aed8965e3298a0817c16d32c0a67ae","name":"Infoblox Threat Intel","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_397_1714162589-96x96.png","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_397_1714162589-96x96.png","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_397_1714162589-96x96.png","caption":"Infoblox Threat Intel"},"description":"Infoblox Threat Intel is the leading creator of original DNS threat intelligence, distinguishing itself in a sea of aggregators. What sets us apart? Two things: mad DNS skills and unparalleled visibility. DNS is notoriously tricky to interpret and hunt from, but our deep understanding and unique access to the internet's inner workings allow us to track down threat actors that others can't see. We're proactive, not just defensive, using our insights to disrupt cybercrime where it begins. We also believe in sharing knowledge to support the broader security community by publishing detailed research and releasing indicators on GitHub. In addition, our intel is seamlessly integrated into our Infoblox Protective DNS solutions, so customers automatically get its benefits, along with ridiculously low false positive rates.","url":"https:\/\/www.infoblox.com\/blog\/author\/infoblox-threat-intel\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/12679","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/397"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=12679"}],"version-history":[{"count":21,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/12679\/revisions"}],"predecessor-version":[{"id":12726,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/12679\/revisions\/12726"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/12680"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=12679"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=12679"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=12679"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}