
Homograph attacks are the latest in a long line of new attack vectors now being used by cybercriminals to trick users into disclosing personal information such as passwords or other sensitive data.
What is a Homograph?
A Homograph is an attack that uses homoglyphs, characters that use other character sets such as Greek and Cyrillic that have letters that look the same as the roman equivalents. As such, cybercriminals can register domain names that look on the surface to be identical to existing domains and can be used to capture user passwords or other sensitive information. A good example would be an attacker registering the domain “google.com” but using the unicode character u+043E or cyrillic small letter O. There are many characters this can be applied to in order to create a significant number of identical domains.
This technique is usually combined with phishing attacks to trick the user into clicking on the domain and redirecting them to an untrusted domain to deploy malware or collect other information.
How can BlackFog help?
BlackFog Privacy provides automatic protection from homographs and homoglyphs by monitoring network packets in real time. When it detects domains containing multiple character sets it automatically prevents access to that domain.
Related Posts
Data Splicing vs. Traditional DLP: The New Threat for Enterprises
Explore how data splicing attacks bypass traditional DLP solutions and why ADX, with its real-time endpoint monitoring and AI based threat analysis, offers a powerful defense against advanced data exfiltration techniques.
Data Backup and Data Recovery: What Every Business Needs to Know
Understand these critical data backup and data recovery steps to reduce the risk of lengthy downtime following data loss.
DNS Exfiltration: How Hackers Use Your Network to Steal Data Without Detection
Learn how DNS exfiltration works and why this method of data theft often goes undetected.
How Do You Protect Yourself From Hackers? Proactive Strategies for Business Data Security
Follow these advanced data protection strategies to help protect your firm from hackers in an increasingly challenging environment.
5 Steps to a Disaster Recovery Plan That Protects Your Business
Follow these key steps to develop a data backup and recovery plan fit for the digital-first world.
Data Protection Management: Building a Resilient Data Security Framework
Keep these six key principles in mind to ensure your data protection management solutions are as effective as possible.