Experts flag a huge amount of cyberattacks coming from this unexpected domain


- Experts observe a 19x quarter-over-quarter rise in .es usage for malicious campaigns
- 99% were credential phishing attacks, with 1% relating to remote access trojans
- Microsoft was by far the most commonly impersonated brand
Cybersecurity experts from Cofense have revealed a 19x increase in malicious campaigns using .es domains between Q4 2024 and Q5 2025, making it the third-most abused top-level domain (TLD) after .com and .ru.
Typically reserved for businesses and organizations in Spain, or Spanish-speaking audiences, researchers found nearly 1,400 malicious subdomains across nearly 450 .es base domains between January and May.
An overwhelming majority (99%) of the campaigns involved credential phishing, with most of the remaining 1% delivering remote access trojans (RATs) like ConnectWise RAT, Dark Crystal and XWorm.
.es domains are proving popular for phishing attacks
Although the rise of .es domains in cyberattacks is noteworthy, attack vectors remain unchanged. Malware was seen to be delivered by C2 nodes or spoofed emails, with most (95%) impersonating Microsoft (an attacker’s favorite). Adobe, Google, Docusign and the Social Security Administration made up the top-five most commonly impersonated websites. Email lures often mimicked HR and document-related requests.
Interestingly, the malicious .es subdomains were randomly generated, not crafted manually, making them easier to identify as being fake. Examples include ag7sr[.]fjlabpkgcuo[.]es and gymi8[.]fwpzza[.]es.
Despite researchers suggesting that no similarities can be used to link attacks to a single group, 99% of the malicious .es domains were hosted on Cloudflare.
“If one threat actor or threat actor group were taking advantage of .es TLD domains then it is likely that the brands spoofed in .es TLD campaigns would indicate certain preferences by the threat actors,” the researchers wrote.
Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!
Cofense explained that “significant restrictions” on the usage of .es TLDs were in place until 2005, adding that the recent rise in .es-related attacks could be a cause for concern, marking a new trend exploiting the authority that country-related TLDs unofficially carry.
You might also like
Experts observe a 19x quarter-over-quarter rise in .es usage for malicious campaigns 99% were credential phishing attacks, with 1% relating to remote access trojans Microsoft was by far the most commonly impersonated brand Cybersecurity experts from Cofense have revealed a 19x increase in malicious campaigns using .es domains between Q4…
Recent Posts
- Jack Dorsey made an encrypted Bluetooth messaging app
- Rivian unveils a new quad-motor R1 variant
- Lenovo set to introduce white ThinkPad laptops with ambitious design – but I will miss the red trackpoint
- Windows 11 desktop PCs could soon get Copilot+ AI powers, as Intel might radically switch tactics with next-gen CPUs
- Waymo introduces teen accounts for the first time in Phoenix
Archives
- July 2025
- June 2025
- May 2025
- April 2025
- March 2025
- February 2025
- January 2025
- December 2024
- November 2024
- October 2024
- September 2024
- August 2024
- July 2024
- June 2024
- May 2024
- April 2024
- March 2024
- February 2024
- January 2024
- December 2023
- November 2023
- October 2023
- September 2023
- August 2023
- July 2023
- June 2023
- May 2023
- April 2023
- March 2023
- February 2023
- January 2023
- December 2022
- November 2022
- October 2022
- September 2022
- August 2022
- July 2022