Select Page

Cybersecurity researchers today highlighted an evasive phishing technique that attackers are exploiting in the wild to target visitors of several sites with a quirk in domain names, and leverage modified favicons to inject e-skimmers and steal payment card information covertly.

“The idea is simple and consists of using characters that look the same in order to dupe users,” Malwarebytes researchers said in a Thursday analysis. “Sometimes the characters are from a different language set or simply capitalising the letter ‘i’ to make it appear like a lowercase ‘l’.”

Called an internationalised domain name (IDN) homograph attack, the technique has been used by a Magecart group on multiple domains to load the popular Inter skimming kit hidden inside a favicon file.

The visual trickery typically involves leveraging the similarities of character scripts to create and register fraudulent domains of existing ones to deceive unsuspecting users into visiting them and introduce malware onto target systems.​

images from Hacker News