Threat actor registers a domain name that is very similar to a real one, hoping that users will not notice the difference. Referred to as cousin, lookalike, or doppelganger domains. Could also register a hijacked subdomain using the primary domain of a trusted cloud provider. Ex: using onmicrosoft.com to create comptia.onmicrosoft.com which is not real. Also passive.