{"id":4822,"date":"2020-03-04T14:29:44","date_gmt":"2020-03-04T22:29:44","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=4822"},"modified":"2020-12-05T17:51:06","modified_gmt":"2020-12-06T01:51:06","slug":"a-fresh-look-at-lookalike-domains","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/security\/a-fresh-look-at-lookalike-domains\/","title":{"rendered":"A Fresh Look at Lookalike Domains"},"content":{"rendered":"<p>Lookalike domains have been one of the many tools used in cyberattacks for many years.\u00a0 But lookalikes were infrequently implemented while other, easy to use alternatives remained effective at masking the true destination of a URL from their victims.\u00a0 Unfortunately for attackers, users have learned to be more suspicious of electronic communications and more adept at applying techniques to reveal the true destination of a link.\u00a0 As the effectiveness of old methods declined, cybercriminals have turned to lookalike domains to support renewed efforts to impersonate a user, organization or brand in an attack.<\/p>\n<p><strong>Wide-ranging lookalike techniques<\/strong><\/p>\n<p>Generating convincing lookalike domains using sophisticated homograph or homoglyph techniques has been refined through years of attacks impersonating popular brands like PayPal, and large government agencies like the IRS.\u00a0 However, the methods for applying these techniques range from the obvious to the obscure.<\/p>\n<p>A lookalike domain could be as simple as using myorganization[.]net to impersonate myorganization[.]com as part of an attack on customers.\u00a0 And, in a world where legitimate domain names are often long and elaborate, attackers are often successful using domain names like billing-support-login-myorganization[.]com.\u00a0 Simply expanding, rearranging, or slightly modifying a domain name can provide attackers with many alternatives.<\/p>\n<p>Character substitution, using homograph or homoglyph techniques, is another common practice in building believable lookalike domains.\u00a0 Most people today are familiar with the concept of single character-substitution, such as replacing the letter \u2018O\u2019 with the number \u20180\u2019.\u00a0 But there are a dozen other Unicode characters that would serve as credible replacements for an \u2018O\u2019.<\/p>\n<p>Unicode is a computing industry standard for the consistent encoding, representation, and handling of the text expressed in most of the world&#8217;s writing systems, including foreign languages like Cyrillic, Coptic, Mongolian and 136 others.\u00a0 In total, there are over 136,000 Unicode characters available today to create viable domain names using letters and symbols.\u00a0 To provide an example of the scale of this challenge, this provides for over 829 million substitution combination possibilities of Unicode characters for \u201cINFOBLOX\u201d.<\/p>\n<p><strong>Punycode: Seeing past a lookalike deception<\/strong><\/p>\n<p>Visibly, these Unicode substitutions usually appear legitimate in email messages, web pages, PDFs and many other text displays.\u00a0 Even putting your mouse over a link would typically display the deceptive Unicode character.\u00a0 But there is one way to reveal the true nature of a domain name would be to copy the link and past it into the address bar of your browser. But pasting the URL into the address bar of Google Chrome, Apple Safari, and recent versions of Microsoft Edge and Internet Explorer will display \u2018Punycode\u2019, a standard designed to represent Unicode characters with the limited ASCII character subset used for international hostnames.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-4824 aligncenter\" src=\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/lookalike-domain-1-300x139.png\" alt=\"\" width=\"300\" height=\"139\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/lookalike-domain-1-300x139.png 300w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/lookalike-domain-1.png 476w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>Figure 1 provides several examples to illustrate a deceptive attempt and a revealing Punycode representation.\u00a0 The first two URLs appear identical, although only #1 is the correct \u201cmyorganization\u201d domain.\u00a0 The second URL uses a Unicode alternative for the letter \u2018y\u2019 to appear legitimate.<\/p>\n<p>The third URL is what you would see if you were to cut-n-pasted URL #2 into a browser address bar, revealing the Punycode representation for the maliciously substituted \u2018y\u2019.<\/p>\n<p>It should be noted that there are legitimate reasons for using Unicode character sets in domain names.\u00a0 An internationalized domain name (IDN) is a name that contains at least one character in a language-specific script or alphabet, such as Arabic, Chinese, Cyrillic, Devanagari, Hebrew or the Latin alphabet-based characters with diacritics or ligatures, such as German.\u00a0 For example, M\u00fcnchen (the German name for Munich) would be displayed in Punycode as Mnchen-3ya.\u00a0 If a German user were to type in \u201cM\u00fcnchen\u201d in their browser address bar, they could easily see the same Punycode to help validate the legitimacy of a link.<\/p>\n<p><strong>Targeting employees with 3<sup>rd<\/sup> party lookalikes <\/strong><\/p>\n<p>The most obvious application of these techniques would be to enhance attacks using popular brands like PayPal and BankofAmerica. It is not difficult to understand how an attacker&#8217;s expertise could be easily translated int an attack on your own customers.\u00a0 The applications for targeting your employees, however, are many and much more indirect.<\/p>\n<p>Employees are accustomed to using internal portals, systems, tools and access methods when conducting confidential business for the organization.\u00a0 Their familiarity with these systems makes it difficult for attackers to create credible social engineering scenarios using a lookalike of your own public domain to compromise an employee.\u00a0 The greater risk to employees would be lookalike domains used in attacks impersonating a business partner or any organization that your business frequently interacts with or controls.\u00a0 As an example, consider the risk of success if your users received an email that appears to come from a nearby restaurant, popular among employees, with a \u2018special discount offer\u2019 if they will simply sign up for a membership, download an app, etc.<\/p>\n<p>Lookalike domains support a broad range of human targeted, socially engineered threat with intent ranging from simply infecting endpoints to gain network access to a spear-phishing or Business Email Compromise attack focused on key employees with desired information or access. \u00a0Additional components in these attacks include lookalike web sites, email templates, and other indicators of legitimacy.<\/p>\n<p><strong>Protect employees, customers, and brand reputation<\/strong><\/p>\n<p>Many modern security tools have some defense capabilities to address the risk of lookalike use for attacks impersonating popular brands.\u00a0 But they lack viable options for defending against an attack impersonating an organization outside the Fortune 1000 or large governments.\u00a0 And users, despite gains in security education and the availability of tools like Punycode, are an inconsistent and unreliable line of defense.<\/p>\n<p>Infoblox provides lookalike domain defenses for a broad range of threat scenarios. Specifically designed for this latest evolution in the threat landscape, a <a href=\"https:\/\/www.infoblox.com\/resources\/solution-notes\/protect-your-network-and-customers-with-lookalike-monitoring\" target=\"_blank\" rel=\"noopener noreferrer\">Custom Lookalike Domain Monitoring<\/a> service is available for <a href=\"https:\/\/www.infoblox.com\/resources\/datasheets\/bloxone-threat-defense-advanced\" target=\"_blank\" rel=\"noopener noreferrer\">BloxOne Threat Defense<\/a> Advanced customers, allowing them to submit their organization\u2019s own domain, or domains frequently visited by or controlled by the organization for lookalike protection. The Infoblox <a href=\"https:\/\/www.infoblox.com\/cyber-intelligence-unit\/\" target=\"_blank\" rel=\"noopener noreferrer\">Cyber Intelligence Unit (CIU)<\/a> turns the supplied domains into lists of high-risk lookalike domains for initial assessment and monitoring. Suspicious activity related to these lookalike domains is reported to provide customers with activity visibility and as an advanced warning to help the organization avert a potential network breach or customer threats.<\/p>\n<p>Lookalike techniques provide for more convincing social engineering capabilities in support of increasingly advanced threats.\u00a0 With innovative lookalike defense features and unmatched threat intelligence sharing capabilities, Infoblox can help you better prevent, detect, investigate and respond by taking your entire security stack to the next level.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Lookalike domains have been one of the many tools used in cyberattacks for many years.\u00a0 But lookalikes were infrequently implemented while other, easy to use alternatives remained effective at masking the true destination of a URL from their victims.\u00a0 Unfortunately for attackers, users have learned to be more suspicious of electronic communications and more adept [&hellip;]<\/p>\n","protected":false},"author":334,"featured_media":3148,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[2],"tags":[30,15,367,368],"class_list":{"0":"post-4822","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security","8":"tag-dns","9":"tag-security","10":"tag-government","11":"tag-federal","12":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>A Fresh Look at Lookalike Domains<\/title>\n<meta name=\"description\" content=\"Lookalike domains have been one of the many tools used in cyberattacks for many years. But lookalikes were infrequently implemented while other, easy to use alternatives remained effective at masking the true destination of a URL from their victims.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/security\/a-fresh-look-at-lookalike-domains\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"A Fresh Look at Lookalike Domains\" \/>\n<meta property=\"og:description\" content=\"Lookalike domains have been one of the many tools used in cyberattacks for many years. But lookalikes were infrequently implemented while other, easy to use alternatives remained effective at masking the true destination of a URL from their victims.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/security\/a-fresh-look-at-lookalike-domains\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2020-03-04T22:29:44+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-12-06T01:51:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/DNS-threat-index.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Bob Hansmann\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Bob Hansmann\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/a-fresh-look-at-lookalike-domains\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/a-fresh-look-at-lookalike-domains\\\/\"},\"author\":{\"name\":\"Bob Hansmann\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/28fb1d8fd532fc28e3af32405568afd8\"},\"headline\":\"A Fresh Look at Lookalike Domains\",\"datePublished\":\"2020-03-04T22:29:44+00:00\",\"dateModified\":\"2020-12-06T01:51:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/a-fresh-look-at-lookalike-domains\\\/\"},\"wordCount\":1072,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/a-fresh-look-at-lookalike-domains\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/DNS-threat-index.jpg\",\"keywords\":[\"DNS\",\"Security\",\"Government\",\"Federal\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/a-fresh-look-at-lookalike-domains\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/a-fresh-look-at-lookalike-domains\\\/\",\"name\":\"A Fresh Look at Lookalike Domains\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/a-fresh-look-at-lookalike-domains\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/a-fresh-look-at-lookalike-domains\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/DNS-threat-index.jpg\",\"datePublished\":\"2020-03-04T22:29:44+00:00\",\"dateModified\":\"2020-12-06T01:51:06+00:00\",\"description\":\"Lookalike domains have been one of the many tools used in cyberattacks for many years. But lookalikes were infrequently implemented while other, easy to use alternatives remained effective at masking the true destination of a URL from their victims.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/a-fresh-look-at-lookalike-domains\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/a-fresh-look-at-lookalike-domains\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/a-fresh-look-at-lookalike-domains\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/DNS-threat-index.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/DNS-threat-index.jpg\",\"width\":660,\"height\":454},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/a-fresh-look-at-lookalike-domains\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"A Fresh Look at Lookalike Domains\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/28fb1d8fd532fc28e3af32405568afd8\",\"name\":\"Bob Hansmann\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/infoblox-author-bob-hansmann-96x96.png\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/infoblox-author-bob-hansmann-96x96.png\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/infoblox-author-bob-hansmann-96x96.png\",\"caption\":\"Bob Hansmann\"},\"description\":\"Bob Hansmann has spent over three decades helping global enterprises and government agencies to uplift their threat prevention, detection, investigation, and response capabilities. Working in areas ranging from threat research and engineering to product management and marketing across his career, Mr. Hansmann has helped pioneer many of today\u2019s security industry standards. This breadth of experience has given him a unique perspective on finding the optimal balance between an organization\u2019s security needs with its success criteria.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/bob-hansmann\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"A Fresh Look at Lookalike Domains","description":"Lookalike domains have been one of the many tools used in cyberattacks for many years. But lookalikes were infrequently implemented while other, easy to use alternatives remained effective at masking the true destination of a URL from their victims.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/security\/a-fresh-look-at-lookalike-domains\/","og_locale":"en_US","og_type":"article","og_title":"A Fresh Look at Lookalike Domains","og_description":"Lookalike domains have been one of the many tools used in cyberattacks for many years. But lookalikes were infrequently implemented while other, easy to use alternatives remained effective at masking the true destination of a URL from their victims.","og_url":"https:\/\/www.infoblox.com\/blog\/security\/a-fresh-look-at-lookalike-domains\/","og_site_name":"Infoblox Blog","article_published_time":"2020-03-04T22:29:44+00:00","article_modified_time":"2020-12-06T01:51:06+00:00","og_image":[{"width":660,"height":454,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/DNS-threat-index.jpg","type":"image\/jpeg"}],"author":"Bob Hansmann","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Bob Hansmann","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/security\/a-fresh-look-at-lookalike-domains\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/a-fresh-look-at-lookalike-domains\/"},"author":{"name":"Bob Hansmann","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/28fb1d8fd532fc28e3af32405568afd8"},"headline":"A Fresh Look at Lookalike Domains","datePublished":"2020-03-04T22:29:44+00:00","dateModified":"2020-12-06T01:51:06+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/a-fresh-look-at-lookalike-domains\/"},"wordCount":1072,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/a-fresh-look-at-lookalike-domains\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/DNS-threat-index.jpg","keywords":["DNS","Security","Government","Federal"],"articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/security\/a-fresh-look-at-lookalike-domains\/","url":"https:\/\/www.infoblox.com\/blog\/security\/a-fresh-look-at-lookalike-domains\/","name":"A Fresh Look at Lookalike Domains","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/a-fresh-look-at-lookalike-domains\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/a-fresh-look-at-lookalike-domains\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/DNS-threat-index.jpg","datePublished":"2020-03-04T22:29:44+00:00","dateModified":"2020-12-06T01:51:06+00:00","description":"Lookalike domains have been one of the many tools used in cyberattacks for many years. But lookalikes were infrequently implemented while other, easy to use alternatives remained effective at masking the true destination of a URL from their victims.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/a-fresh-look-at-lookalike-domains\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/security\/a-fresh-look-at-lookalike-domains\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/security\/a-fresh-look-at-lookalike-domains\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/DNS-threat-index.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/DNS-threat-index.jpg","width":660,"height":454},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/security\/a-fresh-look-at-lookalike-domains\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.infoblox.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"A Fresh Look at Lookalike Domains"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/28fb1d8fd532fc28e3af32405568afd8","name":"Bob Hansmann","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/infoblox-author-bob-hansmann-96x96.png","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/infoblox-author-bob-hansmann-96x96.png","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/infoblox-author-bob-hansmann-96x96.png","caption":"Bob Hansmann"},"description":"Bob Hansmann has spent over three decades helping global enterprises and government agencies to uplift their threat prevention, detection, investigation, and response capabilities. Working in areas ranging from threat research and engineering to product management and marketing across his career, Mr. Hansmann has helped pioneer many of today\u2019s security industry standards. This breadth of experience has given him a unique perspective on finding the optimal balance between an organization\u2019s security needs with its success criteria.","url":"https:\/\/www.infoblox.com\/blog\/author\/bob-hansmann\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/4822","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/334"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=4822"}],"version-history":[{"count":3,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/4822\/revisions"}],"predecessor-version":[{"id":4833,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/4822\/revisions\/4833"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/3148"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=4822"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=4822"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=4822"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}