A homoglyph attack involves a deception technique used by threat-actors to register domain names that closely resemble legitimate domains, often using characters that look nearly identical.
This approach exploits users causing them to mistakenly visit the fraudulent site, thinking it's the real one. This attack is particularly successful when browsing on a mobile device. On mobile, domains are sometimes difficult to view because of fonts and screen sizes.
For example, a threat-actor could register "G00GLE.com" instead of "GOOGLE.com," using zeroes instead of "o"s, but it's not always obvious changes like O's and 0's. It can also include the use of similar characters from other languages.
Could you spot these differences?
1. gοοgle.com (Uses Greek "ο" instead of Latin "o")
2. microsοft.com (Similar trick with Greek "ο")
3. paypaI.com (Uses capital "I" instead of lowercase "l")
4. facebοok.com (Uses Cyrillic "о" instead of Latin "o")
5. amazοn.com (Swaps Latin "o" with Cyrillic "о")
***LinkedIn warned me it could not load the above links.***
So how can we thwart homoglyph attacks?
1. Double check URLs carefully – Review the domain name closely before clicking on links, especially in emails or messages. Pay attention to any unusual characters. If you received an email from someone, instead of using the link in any message, use a known good link. This can be from a trusted app, browser bookmark or from a password manager.
2. Use Multi-Factor Authentication (MFA) – Even if credentials are stolen through a phishing site, MFA adds an extra layer of security by requiring additional verification. Please be aware, threat-actors are not using automation to man-in-the-middle MFA to gain access to accounts and make account changes in near real time.
3. Employ domain monitoring tools – Organizations can use services that detect fraudulent domains impersonating their brand and take action against them. Many endpoint detection and response platforms conduct domain checks for suspicious activity.
4. Check for HTTPS & Security Certificates – Ensure that a website is encrypted and secure. However, note that attackers can still obtain HTTPS certificates for fake sites, so this alone isn’t enough. Most modern web browsers automatically prevent accessing unencrypted domains, do not click through on screen warnings.
Vigilance, security tools and a keen eye are all needed to reduce these types of attacks from being successful.
#CyberSecurity #Cyber #homoglyphs #HomoglyphAttacks #ThreatActors