The Growing Surge of Lookalike Domains in Email Attacks

May 23, 2025

New research shows that cybercriminals are rapidly ramping up their use of lookalike domains to target industries like finance, construction, legal, and insurance.

3 min read

The Gist

It only takes one typo. A single character change in an email domain cost a Connecticut school district over $6 million. The scam? Lookalike domains. A fraudster registered a domain nearly identical to a trusted vendor’s—changing just one letter—and used it to redirect payments. The result: a textbook case of modern social engineering: low effort, high payout, and invisible to traditional controls. 

New research from BlueVoyant shows a sharp increase in the number of lookalike domains being used to facilitate email-based social engineering attacks and financial fraud scams. These cybercriminals are targeting a wide variety of industries with these attacks, like finance, construction, legal services, and insurance. 

What are Lookalike Domains?

Lookalike domains are fake web addresses crafted to mimic real ones—often by changing a single character.Attackers might swap characters—like an “l” for a “1” or an “O” for a zero—or use alternate top-level domains (TLDs) like .co instead of .com to keep the domain virtually identical. These subtle tricks are enough to convince employees—and sometimes even automated systems—that a spoofed email is the real deal.

How they’re doing it.

These attacks often begin with a fraudster registering a domain that closely mimics a trusted brand and setting up email servers behind it. With help from GenAI, attackers harvest personal and organizational details from data breaches, social media, and public records to craft believable, targeted messages. The result? Emails that look legitimate, sound familiar, and slip past defenses. They coax recipients into clicking malicious links, sharing credentials, or approving fraudulent payments.

What used to take hours of careful impersonation can now be executed in under 30 minutes with GenAI. Attackers can use AI tools to instantly generate realistic email copy in a vendor’s tone, set up lookalike domains like @vend0r-payments.com, and launch a believable scam with minimal effort. Because these emails don’t contain the usual “urgent wire transfer” language or phishing giveaways, they often evade traditional keyword filters and rule-based security systems entirely.

Trustmi’s Take

The real challenge isn’t catching typos—it’s spotting behaviors and signals.

At Trustmi, we analyze behavioral patterns across users, vendors, and transactions and layer in technical signals, like domain age, registration mismatches, and subtle inconsistencies between known vendors and new senders. A one-character domain swap might look legitimate to a human—or even to a system—unless it’s flagged in the context of the broader payment behavior.

Want to learn more about email-based cyberattacks? Check out the webinar, “Why Email is Still the Easiest Way in for Attackers“.

Trusted by Finance and Security Leaders

"Trustmi provided transparency into our payment process to see where cyberattacks and errors were happening and full protection without changing our workflow."

"Like many businesses today, we've experienced cyber attacks on our payment process, but we didn't realize the extent to which we were at risk until we evaluated Trustmi. Now we're confident we'll be able to avoid future attacks with their platform."

"Trustmi's platform is an important tool for our team. Their Payment Flows module increases our payment cycle security, and our team has also managed to cut down the time for preparing payments reports from half a day to half an hour."

$200 Billion Secured

Protecting businesses globally against socially engineered fraud and errors.

Zero Compromise

Stops fraud without disrupting
legitimate payments.

$200 Billion Secured

Protecting businesses globally against socially engineered fraud and errors.

Up to 2.5% of Budget Saved

By Eliminating Fraud and Payment Errors

From Hours to Seconds

Manual Process Time Reduced

$200 Billion Secured

Protecting businesses globally against socially engineered fraud and errors.

Up to 2.5% of Budget Saved

By Eliminating Fraud and Payment Errors

From Hours to Seconds

Manual Process Time Reduced

To top