Why is the .US domain -- the country code top-level domain (ccTLD) for the United States -- consistently among the most prevalent in phishing domains?

And why is this okay, when other ccTLDs that also restrict registration to residents/citizens don't seem to have this problem? And when a fair number of .US domains are used to attack US government agencies? Today's story explores these questions:

Domain names ending in “.US” — the top-level domain for the United States — are among the most prevalent in phishing scams, new research shows. This is noteworthy because .US is overseen by the U.S. government, which is frequently the target of phishing domains ending in .US. Also, .US domains are only supposed to be available to U.S. citizens and to those who can demonstrate that they have a physical presence in the United States.

https://krebsonsecurity.com/2023/09/why-is-us-being-used-to-phish-so-many-of-us/

Why is .US Being Used to Phish So Many of Us? – Krebs on Security

@briankrebs "Dozens of countries have their own ccTLDs" huh?
Every country has one, there are 255 ccTLDs, plus more with non-Latin characters. All two-letter TLDs are ccTLDs.
@nicolas17 thanks. so you're certain every country on earth has a tld?
@briankrebs I think there's a few that don't (or formally have one but don't use it), but for some it quickly gets into complex "what is even recognized as a country?" definitions...