Phishing is one of the most common and most successful attack vectors and it probably will remain so for some time. However, cybercriminals often abuse various legitimate technologies to make their operations more effective.
A perfect example is wildcard certificates, public key certificates used by all the subdomains within a larger domain.
On one hand, wildcard certificates are useful for system administrators because they dont have to worry about managing d…