Back to Learn

Look-alike domains and typosquatting: how brand impersonation tricks still work

Learn how look-alike domains (typosquatting) impersonate real brands, what patterns to look for, and how to verify a site before logging in or paying.

Jan 18, 20265 min read
impersonationdomains
Look-alike domains and typosquatting: how brand impersonation tricks still work

Look-alike domains are one of the simplest tricks on the internet — and one of the most effective. The scam doesn’t need malware or hacking. It just needs you to trust the wrong domain for a few seconds.

This guide explains how domain impersonation works and how to spot it quickly.

TL;DR (what to remember)
  • Logos can be copied. The domain is harder to fake.
  • Extra words don’t add legitimacy (“secure”, “support”, “verify”).
  • Read the domain right-to-left (what’s right before the final TLD matters most).
  • If you’re unsure, open the brand via bookmark or typed URL — not the link.

If you want the broader baseline first, read phishing basics. If you’re worried about payment scams, see fake checkouts and payment traps.

What is a look-alike domain?

A look-alike domain is a web address made to resemble a real brand’s domain. Attackers use it to:

  • steal passwords on fake login pages
  • collect card details on fake checkout pages
  • impersonate customer support (refunds, disputes, chargebacks)
  • trick employees into entering credentials (work tools, SSO pages)

You’ll also hear terms like typosquatting, domain spoofing, or brand impersonation. The idea is always the same: make the domain feel familiar.

The patterns that fool people

1) A single character swap

  • micros0ft.com (0 instead of o)
  • paypaI.com (I instead of l)

2) Extra words that sound official

  • secure-login-brand.com
  • brand-support-center.com

Extra words do not add legitimacy. Brands rarely need them.

3) “Correct brand name” inside a longer domain

  • brand.com.account-security.example
  • login.brand.com.example

The real domain is the part right before the final TLD (e.g. .com, .net). Everything before that can be misleading.

4) Different domain ending (TLD)

  • .co instead of .com
  • country endings you didn’t expect
  • unusual endings .top, .xyz, .icu

Not all unusual TLDs are malicious, but they’re common in scams because they’re cheap and easy to rotate.

Illustration: URL examples

A simple way to read domains correctly

If you’re not sure which part is the “real domain”, use this rule:

The main domain is usually the last two parts: example.com

Examples:

  • accounts.google.com → domain: google.com (subdomain accounts)
  • google.com.security-check.example → domain: example (not Google)
  • support.apple.com → domain: apple.com (subdomain support)
Fast verification trick

If a link looks suspicious, don’t keep inspecting the same page. Open the official brand site from a bookmark or typed URL and navigate from there.

Real-world situations where this appears

“Your account needs verification”

A message claims a security issue and pushes you to “verify now”. The domain is close enough that you don’t notice.

“Refund / dispute / delivery”

These topics trigger emotion — people click quickly, especially on mobile.

“Support chat” pages

Fake support pages can ask for “verification” information that leads to identity theft.

What to check in under 30 seconds

  • Read the domain slowly
    Not the page title. Not the logo. The domain.
  • Look for extra words and hyphens
    “secure”, “verify”, “support”, “help”, “refund” are common bait words.
  • Check the ending (TLD)
    If you expected .com and see .co or something unusual, slow down.
  • Prefer safe paths for sensitive actions
    Use bookmarks, typed URLs, or the official app — especially for login and payment.

If you already entered a password on a suspicious page

If you typed a password on a page you don’t fully trust, do this immediately:

  1. Change the password on the real site (via a safe path).
  2. Enable 2FA if available.
  3. Check recent sessions/devices and sign out unknown ones.
  4. If you reused that password anywhere else, change it there too.

What organizations can do (quick wins)

If you’re managing a team, domain impersonation becomes a business risk. Practical steps:

Standardize “safe entry points”
Use company bookmarks, password managers, or internal docs that link to verified domains.
Teach one rule, not ten
“Verify the domain before login or payment” is easier to remember than a long security checklist.
Add browser protection as a final layer
Email filtering helps, but users still make the final decision in the browser. A warning at the decision point reduces mistakes.

FAQ

What is typosquatting?

Typosquatting is registering domains that look like a real brand with small changes (letters swapped, extra words, different TLD) to trick users into trusting the wrong site.

Are subdomains safe (like accounts.google.com)?

Subdomains can be legitimate. What matters is the main domain (e.g. google.com). Attackers often hide a real brand name inside a longer domain like google.com.security-check.example.

Is HTTPS a guarantee?

No. Scammers can use HTTPS too. A lock icon means the connection is encrypted — not that the website is trustworthy.

What’s the safest way to open a login page?

Use bookmarks, typed URLs, or a password manager’s saved domain — not a link from a message.

Summary

  • Look-alike domains are a common phishing technique.
  • Attackers rely on small changes (letters, extra words, different endings).
  • A consistent habit beats perfect security knowledge: verify the domain before login or payment.
Tagstyposquattingbrand-impersonationbrowser-safetylogin-security
Try GhostGuard in your browser

Get a clear warning with AI-assisted risk context when a page looks suspicious — before you sign in or pay.