
A New Vector
Homograph attacks are the latest in a long line of new attack vectors now being used by cybercriminals to trick users into disclosing personal information such as passwords or other sensitive data.
What is a Homograph?
A Homograph is an attack that uses homoglyphs, characters that use other character sets such as Greek and Cyrillic that have letters that look the same as the roman equivalents. As such, cybercriminals can register domain names that look on the surface to be identical to existing domains and can be used to capture user passwords or other sensitive information. A good example would be an attacker registering the domain “google.com” but using the unicode character u+043E or cyrillic small letter O. There are many characters this can be applied to in order to create a significant number of identical domains.
This technique is usually combined with phishing attacks to trick the user into clicking on the domain and redirecting them to an untrusted domain to deploy malware or collect other information.
How can BlackFog help?
BlackFog Privacy provides automatic protection from homographs and homoglyphs by monitoring network packets in real time. When it detects domains containing multiple character sets it automatically prevents access to that domain.
Share This Story, Choose Your Platform!
Related Posts
Shadow AI and Governance: Why Traditional Control Is Failing CISOs
Shadow AI and Governance: Why traditional controls are failing CISOs as AI adoption accelerates, increasing risk and reducing visibility.
Oracle Breach: What Happened and Why It Matters
The 2025 Oracle breach exposed millions of records across three separate incidents. Learn how attackers got in, which industries were hit, and how to protect your organization.
What Is An Integrity Data Breach?
Find out what an integrity data breach involves, how it differs from data loss and why it's vital for businesses to be aware of the potential risks.
How Quickly Should A Suspected Data Breach Be Reported?
Data breach reporting deadlines can be tight. Learn when firms must report a suspected data breach, who must be informed and the risks of delay.
What Are The 5 Most Common Sources Of Data Leaks On The Internet?
Understanding how these five common sources of data leaks occur and how they can be prevented is an essential part of a data security strategy.
What Are The Latest Major Data Breaches And What Was Leaked?
These ten major data breaches from 2025 highlight the worldwide scale of cybersecurity incidents in the past year.






