A Shock, Then a Surge

On February 28, 2026, U.S.–Israeli strikes on Iran triggered the closure of the Strait of Hormuz — cutting approximately 20% of global oil supply and producing the largest supply disruption in the history of the global oil market. Within days, governments worldwide began deploying emergency fuel subsidies, energy relief programs, strategic petroleum reserve releases, and rationing measures.

Within weeks, threat actors had turned every one of those programs into a lure.

Using continuous domain intelligence collection — daily ICANN CZDS zone file ingestion across 1,151+ gTLDs and real-time Certificate Transparency log monitoring — we identified 1,435 crisis-themed domains registered in the weeks following the outbreak of hostilities. These domains span energy crisis lures, government program impersonation, oil investment fraud, and Strait of Hormuz domain squatting. Infrastructure analysis reveals 143 shared IP addresses hosting multiple crisis-themed domains, 33 coordinated clusters of 3 or more co-hosted domains, and a clear temporal correlation between registration surges and specific crisis escalation events.

The pattern is predictable, detectable, and — with the right instrumentation — catchable within days of a triggering event, well before victims encounter the fraudulent sites.

The Crisis Timeline

To contextualize the domain registration data, the key milestones of the oil shock unfolded as follows:

DateEventImpact
Feb 28U.S.–Israeli strikes on Iran beginWar outbreak
Mar 1–5Iran closes Strait of Hormuz~20% of global oil supply disrupted
Mar 12IEA announces 400M barrel strategic reserve release; NZ petroleum releaseGovernment relief actions begin
Mar 23Trump postponement statement; FT reports major short positionsFinancial market volatility
Mar 24Philippines declares energy emergencyRegional crisis escalation
Mar 27New Zealand fuel alert system announcedConsumer-facing crisis infrastructure
Late MarEuropean travel advisories, airline shutdownsBroader economic disruption

What makes this timeline significant to fraud analysis is what happens between the lines — the activation lag between government announcements and the domain registration spikes that follow them.

The Signal in the Noise

We queried a graph database of 74M+ domain nodes using index-backed prefix searches across 12 keyword categories covering oil, energy, fuel, Hormuz, subsidies, commodities, and related crisis terms. Each discovered domain was then enriched through DNS resolution, RDAP registration data, ASN/hosting attribution, and HTTP content fingerprinting.

CategoryKeywordsDomains
Oil crisis / investmentoil-*300
Energy crisisenergy-*300
Fuel crisisfuel-*292
Strait of Hormuz*hormuz*189
Strategic reservesstrategic-*100
SPR referencesspr-*100
Subsidy exploitation*-subsidy*49
Commodity scamscommodity-*44
Crude tradingcrude-*30
Petrol crisispetrol-*29
Gas relief / creditgas-relief/subsid/credit/rebate4
Total (deduplicated)1,435

Registration Surges Track Crisis Events

Domain registrations show a clear acceleration pattern correlated with the crisis timeline. The data tells a story about when fraud actors activate — and what triggers them.

Domain Registration Timeline
%%{init: {'theme': 'dark', 'themeVariables': {'xyChart': {'backgroundColor': '#111114', 'titleColor': '#e4e4e7', 'xAxisLabelColor': '#a1a1aa', 'yAxisLabelColor': '#a1a1aa', 'plotColorPalette': '#c0272d'}}}}%%
xychart-beta
    title "Crisis-Themed Domain Registrations by Week"
    x-axis ["W12 (Mar 16-22)", "W13 (Mar 23-29)", "W14 (Mar 30-Apr 5)", "W15 (Apr 6-9)"]
    y-axis "Domains Registered" 0 --> 900
    bar [93, 302, 846, 194]
          

March 29 was the single largest day with 300 domain registrations — immediately following the NZ fuel alert system announcement (Mar 27) and the Philippines energy emergency declaration (Mar 24). This 48–72 hour lag between government announcement and domain registration surge is consistent with threat actor operational tempo observed in previous crisis events.

Key Finding

Zero crisis-themed domains were registered in the first days after the Feb 28 war start, the Mar 1–5 Hormuz closure, or the Mar 12 IEA reserve release. Fraud actors were not responsive to military or geopolitical events — they activated once governments began announcing consumer-facing relief programs. The trigger is the subsidy, not the bomb.

33 Clusters: Coordinated Campaign Infrastructure

Of the 845 domains with DNS resolution data, infrastructure analysis revealed significant coordination. 143 IP addresses hosted 2 or more crisis-themed domains, and 33 distinct clusters of 3 or more co-hosted domains emerged from the data.

ClusterDomainsIPsNotable Domains
1252energy-abundance.us, fuel-bar.com, hormuzsentinel.com
2232fuel-adverting.in, hormuzfoods.com, strategic-momentum.com
3222hormuzbypass.com, hormuzglobal.com, straitofhormuz.ai
4144commodity-ledger.com, hormuzaccess.com, strategic-thought.com
5141hormuz.it (14 subdomains on 91.195.240.135)
6133energy-revolution.tv, fuel-efficient-cars.co.uk

The largest clusters (25 and 23 domains) resolve to paired IPs — a pattern consistent with DNS load balancing on dedicated hosting, suggesting centralized operators managing domain portfolios rather than independent opportunists.

Infrastructure Cluster Map
flowchart TB
    subgraph C1["Cluster 1 — 25 domains"]
        C1D1["energy-abundance.us"]
        C1D2["fuel-bar.com"]
        C1D3["hormuzsentinel.com"]
        C1D4["+ 22 more"]
    end
    subgraph C2["Cluster 2 — 23 domains"]
        C2D1["fuel-adverting.in"]
        C2D2["hormuzfoods.com"]
        C2D3["strategic-momentum.com"]
        C2D4["+ 20 more"]
    end
    subgraph C3["Cluster 3 — 22 domains"]
        C3D1["hormuzbypass.com"]
        C3D2["straitofhormuz.ai"]
        C3D3["hormuzglobal.com"]
        C3D4["+ 19 more"]
    end
    subgraph HOSTING["Shared Hosting Infrastructure"]
        IP1["AWS Global Accelerator
3.33.x.x / 13.248.x.x"]
        IP2["Squarespace
198.185.159.x"]
        IP3["Wix
185.230.63.x"]
        IP4["Suspicious
185.53.179.128"]
    end
    C1 --> IP1
    C2 --> IP1
    C3 --> IP2
    IP4 -->|"also hosts"| SMISHING["Smishing Triad
Infrastructure"]
    style C1 fill:#dc3545,color:#fff
    style C2 fill:#dc3545,color:#fff
    style C3 fill:#dc3545,color:#fff
    style HOSTING fill:#18181b,color:#e4e4e7
    style SMISHING fill:#fd7e14,color:#000,stroke:#fd7e14
          

Five Flavors of Fraud

The 1,435 domains fall into five distinct campaign typologies, each exploiting a different facet of the crisis.

Government Program Impersonation

The most immediately dangerous category — domains designed to intercept citizens seeking legitimate government relief:

The geographic spread of government impersonation — Pakistan, UK, France, US, Brazil — indicates that these are not regional campaigns but globally coordinated operations tracking crisis response announcements across multiple government channels simultaneously.

Investment Fraud & Commodity Scams

Domains exploiting oil price volatility to lure retail investors into fake trading platforms:

Crisis News & Domain Squatting

Opportunistic registration of crisis-related domain names for SEO exploitation, ad fraud, or future resale:

Critical Infrastructure Targeting

Domains positioned to intercept energy sector communications through broker and strategic reserve impersonation:

Sanctions Evasion Indicators

The most geopolitically charged category — domains potentially facilitating gray-market oil transactions to circumvent the Hormuz blockade:

Where They Live

Hosting infrastructure patterns reveal both the expected and the surprising.

TLDCount%Assessment
.com38845.9%Mainstream, higher registration cost
.dev627.3%Cloudflare Pages (pages.dev subdomains)
.net566.6%Standard
.ru344.0%Russian-registered
.de293.4%German
.uk222.6%UK-related crisis targeting
.org212.5%Trust-signal exploitation

Several hosting patterns stand out:

Platform Abuse

Cloudflare Pages (pages.dev) accounts for 7.3% of all crisis domains — the second-largest TLD category. Free hosting, instant deployment, and a trusted domain suffix make it ideal for crisis-exploitation campaigns that need to be operational within hours of a triggering event.

Crossover: Smishing Triad Infrastructure

One finding warrants particular attention. IP 185.53.179.128 appears in both the oil shock dataset (hosting Hormuz-themed and energy-casino domains) and in previous Smishing Triad research — shared between Darcula and Lighthouse phishing kits. This suggests that crisis-exploitation actors may share hosting infrastructure with established PhaaS (Phishing-as-a-Service) operations.

Whether this is a shared bulletproof hosting provider, direct operational overlap, or coincidence remains an open question. But the infrastructure fingerprint is there — and it connects this crisis-exploitation dataset to our earlier research on the Lighthouse smishing syndicate.

FLAME Taxonomy Mapping

The discovered campaigns map to multiple existing threat paths in the FLAME (Fraud Lifecycle Analysis and Mitigation Exchange) taxonomy:

FLAME Threat PathApplicable Campaigns
TP-0067: AiTM Phishing Kit InfrastructureGovernment impersonation phishing sites
TP-0084: Government Impersonation App FraudSubsidy app impersonation (petrol-subsidyapp.pk)
TP-0083: Investment Club ScamOil/commodity investment fraud
TP-0076: Affiliate Network FraudSEO/clickbait crisis news sites

A new crisis-exploitation threat path could be proposed for FLAME to specifically model the pattern of crisis-triggered domain registration → government program impersonation → credential/payment harvesting.

Detection Recommendations

For Domain Registrars

For Enterprise Security Teams

For Threat Intelligence Teams

Indicators of Compromise

High-Confidence Fraud Domains (confirmed or phishing-listed)
UK Gov Impersonationgov.dwp-subsidy.shop
Pakistan Subsidypetrol-subsidyapp.pk
US Subsidyusa-subsidy.org
French Energy Scamenergy-assistance-fr-en-4152298.world
Oil Crisis Phishingoil-crisis.beta-mail.com
US LIHEAPhome-energy-assistance-2025.shop
UK Fuel Clickbaitpetrol-shortage-uk-today-latest-news.pages.dev
Subsidy Checkeryouth-subsidy-checker.pages.dev
Brazil Subsidybrazil-subsidy.trafinium-connect.com
Crisis Anxietyfuel-shortage.com
Suspicious Investment / Commodity Domains
Investment Fraudoil-invest.work
Trading Scamcommodity-trading-app.pages.dev
Numbered Scamoil-investing-32905.click
Trading Platformnxt-energy-trading-platform.pages.dev
Trading Assistantenergy-trade-assistant.com
Hormuz Domain Squatting (selected)
Geographic Squatstraitofhormuz.ai
Blockade Themehormuzblock.com
News Portalhormuz24.com
News Portalhormuzsentinel.com
Sanctions Evasionhormuzbypass.com

What This Means

The 2026 Iran War oil shock provides a clean case study of crisis-exploitation fraud infrastructure. The patterns are clear and repeatable:

  1. 48–72 hour activation lag — fraud actors respond not to the crisis itself, but to government relief announcements. The trigger is the subsidy program, not the geopolitical event.

  2. Automated generation at scale — numbered domain suffixes and keyword combinations indicate tooling, not manual registration.

  3. Infrastructure reuse — crisis domains share hosting with established fraud operations, including Smishing Triad PhaaS infrastructure.

  4. Geographic targeting — country-specific subsidy impersonation campaigns (Pakistan, UK, Brazil, France, US) activated within days of local government announcements.

  5. Platform abuse — Cloudflare Pages (pages.dev) used for rapid, free hosting of scam content, accounting for 7.3% of all crisis domains.

Continuous domain intelligence monitoring identified these campaigns within days of the triggering events — demonstrating that the window between "crisis announced" and "fraud domains live" is narrow but not zero. Organizations monitoring NRDs against crisis-relevant keywords would have been able to block these domains before they reached end users.

The FLAME fraud taxonomy used in this research is available open-source on GitHub.

References

  1. ICANN Centralized Zone Data Service (CZDS) — zone file data across 1,151+ gTLDs.
  2. Certificate Transparency Logs — real-time monitoring via CertStream.
  3. OpenPhish, PhishingDB, URLhaus — public phishing feed cross-reference validation.
  4. FLAME (Fraud Lifecycle Analysis and Mitigation Exchange) — fraud taxonomy framework. GitHub: crimsonvector/flame.
  5. IEA Strategic Reserve Release Announcement — March 12, 2026.
  6. Philippines Energy Emergency Declaration — March 24, 2026.
  7. New Zealand Fuel Alert System — March 27, 2026.
  8. CrimsonVector, "From Lighthouse to Landfall" — Smishing Triad infrastructure cross-reference.
Domain IntelligenceCrisis ResponseFraud InfrastructurePhishingGovernment ImpersonationInvestment FraudDomain SquattingSIGILFLAMESmishing TriadOil ShockStrait of Hormuz

CrimsonVector is the investigative research practice of Diego Parra.