Skip to main content
From cyberdefense history to innovation – discover it at Black Hat 2025!
Learn More
Request a Demo

Native Domain Abuse Alerting – Informing Threat Ops: ThreatConnect’s DomainThrasher

Typosquatting is a sneaky tactic where bad actors register misspelled versions of popular domain names—think amazn.com instead of amazon.com—to hijack traffic, mislead users, or even steal personal information. Every mistyped domain or accidental click that lands on a fake site instead of yours is a potential risk. In today’s threat landscape, protecting your brand means guarding not just your main domain—but every letter around it.

Cybercriminals often use typosquatted sites to mimic real ones and:

  • Harvest user data
  • Spread malware
  • Phish for login credentials

At ThreatConnect, we understand that typosquatting and combo-squatting aren’t just technical nuisances—they’re real threats to your brand reputation, customer trust, and digital marketing investments. That’s why we developed the DomainThrasher capability for all ThreatConnect customers, a purpose-built capability designed to help our customers proactively detect and investigate spoofed domains before they become a problem.

How It Works

DomainThrasher is powered by two integrated playbooks:

DomainThrasher – DNSTwist, which automatically generates and enumerates potential squatting domain variants using the intelligence of DNSTwist. Customers can add many domains to the DomainThrasher playbook.

  • DomainThrasher – Domain Associations, which processes and enriches those findings, giving teams actionable context to assess threats and respond confidently.

Lead Contributor(s) – Emmet Wray (Director, Customer Success Engineering, Mike Summers (Sales Eng.) & Layne Peterson (System Eng.)

With DomainThrasher, ThreatConnect customers gain automated, scalable insight into domain-based threats, helping them stay one step ahead of brand impersonators and malicious actors—because protecting your brand starts with seeing what others might miss.

How does your Company Access DomainThresher?

To gain access to the DomainThrasher Playbook and capabilities, please reach out to your Customer Success team or email us at customersuccess@threatconnect.com.

This KnowledgeBase article can be used to guide the setup.

The End Result

On a frequency of your choosing, you can receive notifications of potentially malicious domain registrations based on the domains you have identified for priority monitoring. 

The email communications can be directed to any individual or team, including those in the CTI function, those with brand monitoring mandates, fraud teams, or those who can initiate takedown services.

These communications will create out-of-band awareness for those who work outside of the ThreatConnect TI-Ops platform. However, the in-platform dashboards are also a great way to review and action the identified domains.

About the Author

Joseph Rivela

Joseph Rivela is renowned for his strategic leadership in cyber security across various industries, with a strong background in incident response and offensive security programs. Joseph Rivela is the SVP of Customer Sucess and co-founder of Polarity.io. He is responsible for the strategic directions of capabilities and services globally. He is also responsible for all customer success operations. Based in the Northeast, he has directed countless enterprise-wide incident response and hunt operations, implemented offensive security programs and effectuated overarching cyber security frameworks across industry verticals. Joseph earned his B.S. in Economic Crime Investigation with a concentration in Computer Security from Utica College of Syracuse University. He is a member of the NY Metro ISSA Board of Directors and while working for the New York State Office of the Attorney General, earned his forensics certification from Marshall University. Joseph enjoys boating, winter skiing with his family and recently he's taken a liking to Brazilian Jiu-Jitsu.