What is typosquatting?
Typosquatting occurs when attackers register domain names that are visually or phonetically close to a legitimate brand's domain — differing by one character, a transposition, a substitution, or an alternative extension. The goal is to intercept users who mistype the intended address.
Common manipulation patterns:
| Pattern | Legitimate domain | Typosquatted variant |
|---|---|---|
| Missing character | example.com |
exampl.com |
| Character substitution | example.com |
examp1e.com |
| Transposition | example.com |
examlpe.com |
| Homoglyph | example.com |
exаmple.com (Cyrillic "а") |
| Alternative TLD | example.com |
example.net / example.co |
| Added character | example.com |
examples.com |
Once on the fake site, users may be prompted to enter login credentials, payment card details, or personal data, all harvested directly by the attacker. Some typosquatted domains also silently deliver malware, compromising the device without any user interaction beyond the page load.
How does typosquatting enable phishing and social engineering?
Typosquatting is most effective as a phishing delivery layer. Attackers do not need to send a malicious email — they simply wait for organic traffic from users who mistype a URL, or actively drive traffic to the fake domain through:
- Phishing emails containing the typosquatted link rather than the real one; visually identical to the legitimate address
- Smishing campaigns with shortened URLs that mask the misspelled domain
- Ad networks bidding on brand keywords to surface the fake domain above the legitimate one in search results
- QR codes embedded in printed materials pointing to the fraudulent domain
Because the fake site replicates the real one's design, users who land on it rarely notice the discrepancy. The social engineering element is passive; the site does the manipulation, not a human attacker.
What are the risks of typosquatting for organisations?
Typosquatting creates exposure on two fronts simultaneously.
For employees and customers:
- Credential theft via fake login pages (feeding directly into account takeover)
- Payment card fraud on counterfeit e-commerce replicas
- Malware delivery without any active social engineering interaction
For the targeted brand:
- Reputational damage when customers associate the phishing experience with the legitimate company
- Customer trust erosion, particularly in financial services where confidence is a product
- Legal exposure if customer data is compromised via a domain impersonating the brand
Financial institutions, payment providers, and SaaS platforms are disproportionately targeted because their domains carry the highest value for attackers seeking credentials and payment data.
How should organisations protect against typosquatting?
Protection operates on two levels: reducing the available attack surface, and detecting what you cannot pre-emptively block.
Reduce attack surface:
- Register common misspellings, transpositions, and alternative TLDs for your primary domain preemptively. Redirect all variants to the canonical domain.
- Include homoglyph variants (domains using visually similar Unicode characters) in registration scope.
- Secure international domain variants (IDNs) that could be weaponised in homoglyph attacks.
Detect and respond:
- Use continuous domain monitoring tools (such as Arsen's Threat Monitoring) to surface newly registered lookalike domains before attackers activate them.
- Monitor certificate transparency logs — attackers often request TLS certificates for typosquatted domains days before launching campaigns.
- Establish a takedown process with your legal and security teams so suspicious domains are acted on quickly.
Train employees:
- Employees who recognise phishing URLs (including subtle domain variations) are the last line of defence when a user follows a link rather than typing an address. Regular simulation training that includes lookalike domain scenarios builds this recognition reflex.
Key takeaways
- Typosquatting registers domains differing from legitimate brands by one or a few characters; transpositions, substitutions, missing letters, or alternative TLDs.
- Attackers use fake domains passively (waiting for organic mistyping) or actively via phishing, smishing, and paid search ads.
- Credential theft, malware delivery, and payment fraud are the primary outcomes for victims.
- Reputational and legal exposure for the targeted brand can be significant, especially in financial services.
- Defence combines preemptive domain registration, continuous lookalike domain monitoring, and employee URL-recognition training.
What is Arsen Threat Monitoring?
Arsen's Threat Monitoring module scans the clear and dark web in real time for newly registered lookalike domains, data leaks, and exposed employee information that attackers could weaponise in social engineering attacks. It gives security teams early warning before a typosquatting or phishing campaign is launched — not after the first victim clicks.