![Homograph Attacks using Homoglyphs Homograph Attacks using Homoglyphs](https://privacy.blackfog.com/wp-content/uploads/2020/07/Homograph-Attacks-Homoglyphs.png)
Homograph attacks are the latest in a long line of new attack vectors now being used by cybercriminals to trick users into disclosing personal information such as passwords or other sensitive data.
What is a Homograph?
A Homograph is an attack that uses homoglyphs, characters that use other character sets such as Greek and Cyrillic that have letters that look the same as the roman equivalents. As such, cybercriminals can register domain names that look on the surface to be identical to existing domains and can be used to capture user passwords or other sensitive information. A good example would be an attacker registering the domain “google.com” but using the unicode character u+043E or cyrillic small letter O. There are many characters this can be applied to in order to create a significant number of identical domains.
This technique is usually combined with phishing attacks to trick the user into clicking on the domain and redirecting them to an untrusted domain to deploy malware or collect other information.
How can BlackFog help?
BlackFog Privacy provides automatic protection from homographs and homoglyphs by monitoring network packets in real time. When it detects domains containing multiple character sets it automatically prevents access to that domain.
Related Posts
Healthcare Under Siege: Ransomware Attacks Soared in 2024
Healthcare ransomware attacks surged in 2024, putting patient data and critical services at risk. Discover key stats, major incidents, and how healthcare organizations can defend against evolving cyber threats.
The State of Ransomware 2025
BlackFog's state of ransomware report 2025 measures publicly disclosed and non-disclosed attacks globally.
Types of Data Breaches and Prevention Steps
Ensure you're aware of these common types of data breaches to stand the best chance of protecting your valuable information.
Malvertising: What is it and How Can it Lead to a Ransomware Attack?
What are the key things businesses need to know about ransomware removal and recovery?
AWS Data Breach: Lesson From 4 High Profile Breaches
Take a look at 4 high-profile AWS data breaches, their root causes, and the vulnerabilities that made them possible. Learn about strategies to secure your cloud infrastructure and protect against similar risks.
The 5 Biggest Ransomware Attacks of 2024
Cybersecurity was still very much dominated by ransomware attacks in 2024. In this article we look back at five of the most notable incidents of the year.