
A New Vector
Homograph attacks are the latest in a long line of new attack vectors now being used by cybercriminals to trick users into disclosing personal information such as passwords or other sensitive data.
What is a Homograph?
A Homograph is an attack that uses homoglyphs, characters that use other character sets such as Greek and Cyrillic that have letters that look the same as the roman equivalents. As such, cybercriminals can register domain names that look on the surface to be identical to existing domains and can be used to capture user passwords or other sensitive information. A good example would be an attacker registering the domain “google.com” but using the unicode character u+043E or cyrillic small letter O. There are many characters this can be applied to in order to create a significant number of identical domains.
This technique is usually combined with phishing attacks to trick the user into clicking on the domain and redirecting them to an untrusted domain to deploy malware or collect other information.
How can BlackFog help?
BlackFog Privacy provides automatic protection from homographs and homoglyphs by monitoring network packets in real time. When it detects domains containing multiple character sets it automatically prevents access to that domain.
Share This Story, Choose Your Platform!
Related Posts
The Importance Of Effective Cloud Security Architecture: What To Know For 2026
What must firms consider when building cloud security architecture that's fit for the modern era of computing?
Why Attack Surface Management Matters Now More Than Ever
What key challenges do companies face as networks expand and their attack surface grows, increasing the need for effective attack surface management?
5 Key Enterprise Network Security Challenges Firms Must Address In 2026
Is your firm still dealing with these five enterprise network security challenges? Here's what to do to improve your position.
Making Security Proactive With Continuous Threat Exposure Management
Find out everything you need to know about continuous threat exposure management, what's involved and the benefits it could bring to organizations.
How Defense In Depth Stops Cyberthreats Before They Do Damage
Learn what's involved in an effective defense in depth approach to cybersecurity and why this matters more than ever in a fast-evolving environment.
Enterprise Cybersecurity In 2026: Strategies, Trends And Threats Shaping The Future
What will enterprise cybersecurity hold for business in 2026 and what will cybersecurity leaders need to do to protect their firms from new threats?






