The hackers would make a lookalike domain from the a person they aim so as to seem to be legit. These lookalike domains are a component in their covert act for making the receiver think that they are legit. Only because the email protocols do not have helpful mechanisms https://www.email-3000.com/