Description

The .arpa TLD is a special namespace in the Domain Name System (DNS) intended solely for technical infrastructure purposes—primarily reverse DNS lookups that map IP addresses back to hostnames. Standard phishing defenses and reputation-based filters are not built to flag or inspect this space because it is not supposed to host public web content. In these campaigns, threat actors obtain blocks of IPv6 address space, often through free IPv6 tunnel services, and gain control of the corresponding reverse DNS domains under ip6.arpa. Once control is established, adversaries create non-standard DNS records (e.g., A records) pointing these reverse DNS entries to servers hosting phishing pages—effectively turning infrastructure namespaces into malicious web hosts. Phishing emails are dispatched with embedded links (often hidden inside images) that resolve to these engineered .arpa domain names. Because the DNS reverse namespace lacks typical metadata like WHOIS information or domain age, and because security products seldom scrutinize it, these malicious links frequently slip past filters. Victims who click the links are redirected through traffic-distribution systems to convincing fake sites designed to harvest credentials or sensitive data.