<s>
A	O
doppelganger	B-Protocol
domain	I-Protocol
is	O
a	O
domain	O
spelled	O
identical	O
to	O
a	O
legitimate	O
fully	B-Protocol
qualified	I-Protocol
domain	I-Protocol
name	I-Protocol
(	O
FQDN	B-Protocol
)	O
but	O
missing	O
the	O
dot	O
between	O
host/subdomain	O
and	O
domain	O
,	O
to	O
be	O
used	O
for	O
malicious	O
purposes	O
.	O
</s>
<s>
Typosquatting	B-Protocol
's	O
traditional	O
attack	O
vector	O
is	O
through	O
the	O
web	O
to	O
distribute	O
malware	O
or	O
harvest	O
credentials	O
.	O
</s>
<s>
Other	O
vectors	O
such	O
as	O
email	O
and	O
remote	B-Device
access	I-Device
services	I-Device
such	O
as	O
SSH	B-Protocol
,	O
RDP	B-Protocol
,	O
and	O
VPN	B-Application
also	O
can	O
be	O
leveraged	O
.	O
</s>
<s>
In	O
a	O
whitepaper	O
by	O
Godai	O
Group	O
on	O
doppelganger	B-Protocol
domains	I-Protocol
,	O
they	O
demonstrated	O
that	O
numerous	O
emails	O
can	O
be	O
harvested	O
without	O
anyone	O
noticing	O
.	O
</s>
<s>
If	O
someone	O
's	O
email	O
address	O
is	O
,	O
say	O
,	O
"	O
ktrout@finance.corpudyne.com	O
"	O
,	O
the	O
doppelganger	B-Protocol
domain	I-Protocol
would	O
be	O
"	O
financecorpudyne.com	O
 "	O
.	O
</s>
<s>
Hence	O
,	O
if	O
someone	O
is	O
trying	O
to	O
send	O
an	O
email	O
to	O
that	O
user	O
and	O
they	O
forget	O
the	O
dot	O
after	O
"	O
finance	O
"	O
(	O
ktrout@financecorpudyne.com	O
)	O
,	O
it	O
would	O
go	O
to	O
the	O
doppelganger	B-Protocol
domain	I-Protocol
instead	O
of	O
the	O
legitimate	O
user	O
.	O
</s>
