Skip to main content

Homograph Phishing: Spoofing URLs with Similar Characters

N2K NetworksDecember 8, 20256 min12 views
23 connections·31 entities in this video

Understanding Homograph Phishing

  • 💡 Homograph phishing is a social engineering technique that tricks users by using similar-looking characters in a phishing URL to spoof a legitimate site.
  • 🎯 The term "homograph" refers to words spelled the same but with different meanings, while "phishing" is the act of tricking users into believing they are interacting with a trusted entity.

The Role of Unicode in Homograph Attacks

  • 💻 Unicode is an encoding standard that supports over 144,000 characters, enabling text in many languages, unlike the limited ASI standard.
  • ⚠️ Homograph or homoglyphing attacks exploit Unicode by inserting characters from different languages into URLs that appear identical to the human eye.
  • 🔍 A common example is replacing the Latin letter 'O' with the Cyrillic letter 'O', which look the same but lead to different sites.

Typo Squatting vs. Sophisticated Attacks

  • 👾 Typo squatting involves simple character replacements, like using a zero for the letter 'O', which are easier to spot.
  • 🚀 More sophisticated homographic attacks use International Domain Names (IDNs) to insert characters from different languages.
  • ⚠️ While these IDN homograph attacks require more effort and custom domain registration, they are a viable option for highly motivated threat actors.
  • 🛡️ Most modern browsers are moving away from displaying Unicode characters directly in favor of their ASCII equivalents, making these attacks less common but still possible.

Nerd Reference: Mission Impossible Masks

  • 🎭 The Mission Impossible franchise is used as a metaphor, where the rubber face masks created by the IMF team are akin to homographs.
  • 🤝 These masks allow IMF members to impersonate others, enabling them to "fish" for information from targets who are unguarded around seemingly familiar individuals.
Knowledge graph31 entities · 23 connections

How they connect

An interactive map of every person, idea, and reference from this conversation. Hover to trace connections, click to explore.

Hover · drag to explore
31 entities
Chapters2 moments

Key Moments

Transcript23 segments

Full Transcript

Topics10 themes

What’s Discussed

Homograph PhishingPhishingSocial EngineeringURL SpoofingUnicodeInternational Domain Names (IDNs)Typo SquattingCybersecurityCyber AttackMission Impossible
Smart Objects31 · 23 links
Products· 4
Medias· 4
People· 7
Concepts· 10
Companies· 4
Events· 2