Why is the .US domain -- the country code top-level domain (ccTLD) for the United States -- consistently among the most prevalent in phishing domains?

And why is this okay, when other ccTLDs that also restrict registration to residents/citizens don't seem to have this problem? And when a fair number of .US domains are used to attack US government agencies? Today's story explores these questions:

Domain names ending in “.US” — the top-level domain for the United States — are among the most prevalent in phishing scams, new research shows. This is noteworthy because .US is overseen by the U.S. government, which is frequently the target of phishing domains ending in .US. Also, .US domains are only supposed to be available to U.S. citizens and to those who can demonstrate that they have a physical presence in the United States.

https://krebsonsecurity.com/2023/09/why-is-us-being-used-to-phish-so-many-of-us/

Why is .US Being Used to Phish So Many of Us? – Krebs on Security

@briankrebs I want to be able to get a state level TLD from the DMV

@feistel @briankrebs Like .nv.us, .wa.us or .tx.us?

Should not be the biggest problem at all. *EvilGrin*

@hackbyte @briankrebs we're probably already at the point where users are mostly unaware or uncertain of domain registration policies except for .gov -- the problem can't really get worse.

@feistel I fear that most don't even know what a TLD is at all..... mhh ;)

They're just used to the fact, that there are certain letter combinations at the end of a "url" - meh. ;)