SlideShare a Scribd company logo
1
2
1. Introduction
“The weakest ring of the chain in cyber security is human.”
Internationalized Domain Name (IDN) allows people around the world to use domain names
in local languages using local letters in the alphabet. IDNs consist of different languages
components such as Arabic, Chinese, or Cyrillic, briefly, it is a spoofing method for a domain
name. IDNs are encoded by the Unicode standard and are additionally used as allowed by
the corresponding IDN protocols.
2. IDN Homograph Attack
In some cases, using simple fraud methods, and considering the victim perception for social
engineering, the attacker prefers to use similar letters or numbers in alphabets in domain
addresses. For instance:
Figure 1
As it can be seen from Figure 1, the attacker has preferred to use "0" number instead of "o"
letter.
A more realistic example is that in an IDN homograph attack, for social engineering methods,
an attacker can form one or more fake domain addresses using at least one similar character
from a different dildo. Hypothetically, Omicron (U + 03BF), a lowercase letter in Greek, and
"o" (U + 006F), a Latin lowercase letter, are very similar and difficult to discern.
Figure 2
As it can be seen from Figure 2, obviously, both characters are similar.
3
Figure 3
Figure 3 demonstrates the difference between two URLs.
Figure 4
Figure 3 demonstrates the fake IDN homograph attack via WhatsApp and unfortunately, the
demonstration of the domain name is cleartext, not Punycode, still many apps supports IDN
characters and it is a good way for social engineering especially using mobile devices.
For instance, let's think about we have a bank and the main domain of the bank is
www.aslanbank.com. Utilizing IDN Characters (https://www.unicode.org/reports/tr36/idn-
chars.html), it is possible to form similar domain addresses. I prefer to use the first letter of
the Greek, Alpha, α instead of a and then form the new domain of www.αslanbank.com.
Figure 5
4
In normally, due to the Alpha, the domain is converted into www.xn--slanbank-d9f.com and
Figure 4 demonstrates it. It is the perfect method for phishing and the other social
engineering methods.
An interesting point is that considering popular social media platforms, apps, the biggest
banks, it is possible to buy many IDN's when I check their domain names utilizing IDN
characters. The domain prices are really cheap and for attackers, it, undoubtedly, is a better
way for phishing to achieve high phishing rates.
3. Real Case Instances
Figure 6
As it can be seen in Figure 6, the "l" is converted into "ı" for apple.com.
Figure 7
Figure 7 shows the websites of the big companies' IDN conversion.
5
4. Conclusion
Browsers such as Google Chrome tries to protect individuals from IDN homograph attack
using some policies. Therefore, it is an important element to use the updated browsers or to
set options.
In the below URLs, there is more detail info about the Chrome and Mozilla IDN Display
Algorithm and policies.
https://wiki.mozilla.org/IDN_Display_Algorithm
https://www.chromium.org/developers/design-documents/idn-in-google-chrome#TOC-
Google-Chrome-s-IDN-policy
However, for big commercial companies, it is not a solution, it is a solution for just end users.
Figure 8
Therefore, taking into consideration of each letters IDN characters combinations, the big
companies should buy possible IDNs before the attackers or if the company is small-size or
medium-size, can generate each IDN for their main domain addresses, and add them their
blacklist.
6
For instance, for aslanbank.com example, there are more than 100 IDN possibilities, to
protect the customers, it is more logical to buy these possible IDNs, and for the other
possible IDNs such as subdomains, it is a solution to add them to the blacklist and report
them as a spam. Therefore, for big commercial companies' customers, the generation of the
possible IDNs is the key element for the homograph attack.
7
5. Some IDN Generators:
https://www.irongeek.com/homoglyph-attack-generator.php
https://github.com/UndeadSec/EvilURL
https://github.com/phishai/idn_generator
6. References:
https://www.unicode.org/reports/tr36/idn-chars.html
https://www.punycoder.com/
Figure 3: https://www.casaba.com/products/UCAPI/
Figure 5: https://www.pcworld.com/article/3191539/security/phishing-attacks-using-
internationalized-domains-are-hard-to-block.html
Figure 7: https://www.forensicmag.com/news/2018/02/virtual-case-notes-homograph-
phishing-attacks-make-near-perfect-copies-popular-domain-names

More Related Content

What's hot

STRUCTURE OF SQL QUERIES
STRUCTURE OF SQL QUERIESSTRUCTURE OF SQL QUERIES
STRUCTURE OF SQL QUERIES
VENNILAV6
 
Cascading Style Sheet (CSS)
Cascading Style Sheet (CSS)Cascading Style Sheet (CSS)
Cascading Style Sheet (CSS)
AakankshaR
 
HTTP Request and Response Structure
HTTP Request and Response StructureHTTP Request and Response Structure
HTTP Request and Response Structure
BhagyashreeGajera1
 
Json
JsonJson
Chapter 1 - INTRODUCTION TO PYTHON -MAULIK BORSANIYA
Chapter 1 - INTRODUCTION TO PYTHON -MAULIK BORSANIYAChapter 1 - INTRODUCTION TO PYTHON -MAULIK BORSANIYA
Chapter 1 - INTRODUCTION TO PYTHON -MAULIK BORSANIYA
Maulik Borsaniya
 
Authentication techniques
Authentication techniquesAuthentication techniques
Authentication techniques
IGZ Software house
 
Kali Linux
Kali LinuxKali Linux
Kali Linux
Chanchal Dabriya
 
Domain Name System (DNS)
Domain Name System (DNS)Domain Name System (DNS)
Domain Name System (DNS)
Venkatesh Jambulingam
 
Php mysql ppt
Php mysql pptPhp mysql ppt
C#.NET
C#.NETC#.NET
C#.NET
gurchet
 
Css Ppt
Css PptCss Ppt
Css Ppt
Hema Prasanth
 
android sqlite
android sqliteandroid sqlite
android sqlite
Deepa Rani
 
Javascript
JavascriptJavascript
Javascript
Manav Prasad
 
Visual Basic IDE Introduction
Visual Basic IDE IntroductionVisual Basic IDE Introduction
Visual Basic IDE Introduction
Ahllen Javier
 
Windows form application - C# Training
Windows form application - C# Training Windows form application - C# Training
Windows form application - C# Training
Moutasm Tamimi
 
Linux operating system
Linux operating systemLinux operating system
Linux operating system
ITz_1
 
Lecture 1 introduction to vb.net
Lecture 1   introduction to vb.netLecture 1   introduction to vb.net
Lecture 1 introduction to vb.net
MUKALU STEVEN
 
Dns ppt
Dns pptDns ppt
Dns ppt
Mauood Hamidi
 
Arrays in python
Arrays in pythonArrays in python
Arrays in python
moazamali28
 
Php.ppt
Php.pptPhp.ppt
Php.ppt
Nidhi mishra
 

What's hot (20)

STRUCTURE OF SQL QUERIES
STRUCTURE OF SQL QUERIESSTRUCTURE OF SQL QUERIES
STRUCTURE OF SQL QUERIES
 
Cascading Style Sheet (CSS)
Cascading Style Sheet (CSS)Cascading Style Sheet (CSS)
Cascading Style Sheet (CSS)
 
HTTP Request and Response Structure
HTTP Request and Response StructureHTTP Request and Response Structure
HTTP Request and Response Structure
 
Json
JsonJson
Json
 
Chapter 1 - INTRODUCTION TO PYTHON -MAULIK BORSANIYA
Chapter 1 - INTRODUCTION TO PYTHON -MAULIK BORSANIYAChapter 1 - INTRODUCTION TO PYTHON -MAULIK BORSANIYA
Chapter 1 - INTRODUCTION TO PYTHON -MAULIK BORSANIYA
 
Authentication techniques
Authentication techniquesAuthentication techniques
Authentication techniques
 
Kali Linux
Kali LinuxKali Linux
Kali Linux
 
Domain Name System (DNS)
Domain Name System (DNS)Domain Name System (DNS)
Domain Name System (DNS)
 
Php mysql ppt
Php mysql pptPhp mysql ppt
Php mysql ppt
 
C#.NET
C#.NETC#.NET
C#.NET
 
Css Ppt
Css PptCss Ppt
Css Ppt
 
android sqlite
android sqliteandroid sqlite
android sqlite
 
Javascript
JavascriptJavascript
Javascript
 
Visual Basic IDE Introduction
Visual Basic IDE IntroductionVisual Basic IDE Introduction
Visual Basic IDE Introduction
 
Windows form application - C# Training
Windows form application - C# Training Windows form application - C# Training
Windows form application - C# Training
 
Linux operating system
Linux operating systemLinux operating system
Linux operating system
 
Lecture 1 introduction to vb.net
Lecture 1   introduction to vb.netLecture 1   introduction to vb.net
Lecture 1 introduction to vb.net
 
Dns ppt
Dns pptDns ppt
Dns ppt
 
Arrays in python
Arrays in pythonArrays in python
Arrays in python
 
Php.ppt
Php.pptPhp.ppt
Php.ppt
 

Similar to IDN Homograph Attack and Phishing

Component Technologies of E-Commerce
Component Technologies of E-CommerceComponent Technologies of E-Commerce
Component Technologies of E-Commerce
Samuel Saunders
 
Phishing
PhishingPhishing
Phishing
Programmer
 
Discussion Task #1 Research· Scan and analyze the infogra.docx
Discussion Task        #1 Research· Scan and analyze the infogra.docxDiscussion Task        #1 Research· Scan and analyze the infogra.docx
Discussion Task #1 Research· Scan and analyze the infogra.docx
pauline234567
 
Internationalised Domain Names & Internet Investigations
Internationalised Domain Names & Internet InvestigationsInternationalised Domain Names & Internet Investigations
Internationalised Domain Names & Internet Investigations
Vere Software
 
Chapter 12 A Manager’s Guide to the Internetand Telecommuni
Chapter 12 A Manager’s Guide to the Internetand TelecommuniChapter 12 A Manager’s Guide to the Internetand Telecommuni
Chapter 12 A Manager’s Guide to the Internetand Telecommuni
EstelaJeffery653
 
Low Cost Page Quality Factors To Detect Web Spam
Low Cost Page Quality Factors To Detect Web SpamLow Cost Page Quality Factors To Detect Web Spam
Low Cost Page Quality Factors To Detect Web Spam
ieijjournal
 
Low Cost Page Quality Factors To Detect Web Spam
Low Cost Page Quality Factors To Detect Web SpamLow Cost Page Quality Factors To Detect Web Spam
Low Cost Page Quality Factors To Detect Web Spam
ieijjournal
 
Low Cost Page Quality Factors To Detect Web Spam
Low Cost Page Quality Factors To Detect Web Spam Low Cost Page Quality Factors To Detect Web Spam
Low Cost Page Quality Factors To Detect Web Spam
ieijjournal
 
iOS vs android .pptx
iOS  vs android .pptxiOS  vs android .pptx
iOS vs android .pptx
abid masood
 
Normshield 2018 Airlines Phishing Report
Normshield 2018 Airlines Phishing ReportNormshield 2018 Airlines Phishing Report
Normshield 2018 Airlines Phishing Report
NormShield
 
Internet service provider(ISP)An organization or firm th.docx
Internet service provider(ISP)An organization or firm th.docxInternet service provider(ISP)An organization or firm th.docx
Internet service provider(ISP)An organization or firm th.docx
normanibarber20063
 
RansomCloud O365: Pay por your Office 365 e-mail
RansomCloud O365: Pay por your Office 365 e-mailRansomCloud O365: Pay por your Office 365 e-mail
RansomCloud O365: Pay por your Office 365 e-mail
Telefónica
 
Xamarin the good, the bad and the ugly
Xamarin  the good, the bad and the uglyXamarin  the good, the bad and the ugly
Xamarin the good, the bad and the ugly
Azilen Technologies Pvt. Ltd.
 
Web Hosting Terminology
Web Hosting TerminologyWeb Hosting Terminology
Web Hosting Terminology
HTS Hosting
 
A REPORT On DETECTION OF PHISHING WEBSITE USING MACHINE LEARNING
A REPORT On DETECTION OF PHISHING WEBSITE USING MACHINE LEARNINGA REPORT On DETECTION OF PHISHING WEBSITE USING MACHINE LEARNING
A REPORT On DETECTION OF PHISHING WEBSITE USING MACHINE LEARNING
Emma Burke
 
School updated
School updatedSchool updated
School updated
skumartarget
 
Unit8 a1 student_template
Unit8 a1 student_templateUnit8 a1 student_template
Unit8 a1 student_template
rl336
 
Domain name
Domain nameDomain name
Domain name
Vishwajeet Patil
 
A novel way of integrating voice recognition and one time passwords to preven...
A novel way of integrating voice recognition and one time passwords to preven...A novel way of integrating voice recognition and one time passwords to preven...
A novel way of integrating voice recognition and one time passwords to preven...
ijdpsjournal
 
Amazon & E Bay
Amazon & E BayAmazon & E Bay
Amazon & E Bay
Sabyasachi Dasgupta
 

Similar to IDN Homograph Attack and Phishing (20)

Component Technologies of E-Commerce
Component Technologies of E-CommerceComponent Technologies of E-Commerce
Component Technologies of E-Commerce
 
Phishing
PhishingPhishing
Phishing
 
Discussion Task #1 Research· Scan and analyze the infogra.docx
Discussion Task        #1 Research· Scan and analyze the infogra.docxDiscussion Task        #1 Research· Scan and analyze the infogra.docx
Discussion Task #1 Research· Scan and analyze the infogra.docx
 
Internationalised Domain Names & Internet Investigations
Internationalised Domain Names & Internet InvestigationsInternationalised Domain Names & Internet Investigations
Internationalised Domain Names & Internet Investigations
 
Chapter 12 A Manager’s Guide to the Internetand Telecommuni
Chapter 12 A Manager’s Guide to the Internetand TelecommuniChapter 12 A Manager’s Guide to the Internetand Telecommuni
Chapter 12 A Manager’s Guide to the Internetand Telecommuni
 
Low Cost Page Quality Factors To Detect Web Spam
Low Cost Page Quality Factors To Detect Web SpamLow Cost Page Quality Factors To Detect Web Spam
Low Cost Page Quality Factors To Detect Web Spam
 
Low Cost Page Quality Factors To Detect Web Spam
Low Cost Page Quality Factors To Detect Web SpamLow Cost Page Quality Factors To Detect Web Spam
Low Cost Page Quality Factors To Detect Web Spam
 
Low Cost Page Quality Factors To Detect Web Spam
Low Cost Page Quality Factors To Detect Web Spam Low Cost Page Quality Factors To Detect Web Spam
Low Cost Page Quality Factors To Detect Web Spam
 
iOS vs android .pptx
iOS  vs android .pptxiOS  vs android .pptx
iOS vs android .pptx
 
Normshield 2018 Airlines Phishing Report
Normshield 2018 Airlines Phishing ReportNormshield 2018 Airlines Phishing Report
Normshield 2018 Airlines Phishing Report
 
Internet service provider(ISP)An organization or firm th.docx
Internet service provider(ISP)An organization or firm th.docxInternet service provider(ISP)An organization or firm th.docx
Internet service provider(ISP)An organization or firm th.docx
 
RansomCloud O365: Pay por your Office 365 e-mail
RansomCloud O365: Pay por your Office 365 e-mailRansomCloud O365: Pay por your Office 365 e-mail
RansomCloud O365: Pay por your Office 365 e-mail
 
Xamarin the good, the bad and the ugly
Xamarin  the good, the bad and the uglyXamarin  the good, the bad and the ugly
Xamarin the good, the bad and the ugly
 
Web Hosting Terminology
Web Hosting TerminologyWeb Hosting Terminology
Web Hosting Terminology
 
A REPORT On DETECTION OF PHISHING WEBSITE USING MACHINE LEARNING
A REPORT On DETECTION OF PHISHING WEBSITE USING MACHINE LEARNINGA REPORT On DETECTION OF PHISHING WEBSITE USING MACHINE LEARNING
A REPORT On DETECTION OF PHISHING WEBSITE USING MACHINE LEARNING
 
School updated
School updatedSchool updated
School updated
 
Unit8 a1 student_template
Unit8 a1 student_templateUnit8 a1 student_template
Unit8 a1 student_template
 
Domain name
Domain nameDomain name
Domain name
 
A novel way of integrating voice recognition and one time passwords to preven...
A novel way of integrating voice recognition and one time passwords to preven...A novel way of integrating voice recognition and one time passwords to preven...
A novel way of integrating voice recognition and one time passwords to preven...
 
Amazon & E Bay
Amazon & E BayAmazon & E Bay
Amazon & E Bay
 

Recently uploaded

GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 

Recently uploaded (20)

GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 

IDN Homograph Attack and Phishing

  • 1. 1
  • 2. 2 1. Introduction “The weakest ring of the chain in cyber security is human.” Internationalized Domain Name (IDN) allows people around the world to use domain names in local languages using local letters in the alphabet. IDNs consist of different languages components such as Arabic, Chinese, or Cyrillic, briefly, it is a spoofing method for a domain name. IDNs are encoded by the Unicode standard and are additionally used as allowed by the corresponding IDN protocols. 2. IDN Homograph Attack In some cases, using simple fraud methods, and considering the victim perception for social engineering, the attacker prefers to use similar letters or numbers in alphabets in domain addresses. For instance: Figure 1 As it can be seen from Figure 1, the attacker has preferred to use "0" number instead of "o" letter. A more realistic example is that in an IDN homograph attack, for social engineering methods, an attacker can form one or more fake domain addresses using at least one similar character from a different dildo. Hypothetically, Omicron (U + 03BF), a lowercase letter in Greek, and "o" (U + 006F), a Latin lowercase letter, are very similar and difficult to discern. Figure 2 As it can be seen from Figure 2, obviously, both characters are similar.
  • 3. 3 Figure 3 Figure 3 demonstrates the difference between two URLs. Figure 4 Figure 3 demonstrates the fake IDN homograph attack via WhatsApp and unfortunately, the demonstration of the domain name is cleartext, not Punycode, still many apps supports IDN characters and it is a good way for social engineering especially using mobile devices. For instance, let's think about we have a bank and the main domain of the bank is www.aslanbank.com. Utilizing IDN Characters (https://www.unicode.org/reports/tr36/idn- chars.html), it is possible to form similar domain addresses. I prefer to use the first letter of the Greek, Alpha, α instead of a and then form the new domain of www.αslanbank.com. Figure 5
  • 4. 4 In normally, due to the Alpha, the domain is converted into www.xn--slanbank-d9f.com and Figure 4 demonstrates it. It is the perfect method for phishing and the other social engineering methods. An interesting point is that considering popular social media platforms, apps, the biggest banks, it is possible to buy many IDN's when I check their domain names utilizing IDN characters. The domain prices are really cheap and for attackers, it, undoubtedly, is a better way for phishing to achieve high phishing rates. 3. Real Case Instances Figure 6 As it can be seen in Figure 6, the "l" is converted into "ı" for apple.com. Figure 7 Figure 7 shows the websites of the big companies' IDN conversion.
  • 5. 5 4. Conclusion Browsers such as Google Chrome tries to protect individuals from IDN homograph attack using some policies. Therefore, it is an important element to use the updated browsers or to set options. In the below URLs, there is more detail info about the Chrome and Mozilla IDN Display Algorithm and policies. https://wiki.mozilla.org/IDN_Display_Algorithm https://www.chromium.org/developers/design-documents/idn-in-google-chrome#TOC- Google-Chrome-s-IDN-policy However, for big commercial companies, it is not a solution, it is a solution for just end users. Figure 8 Therefore, taking into consideration of each letters IDN characters combinations, the big companies should buy possible IDNs before the attackers or if the company is small-size or medium-size, can generate each IDN for their main domain addresses, and add them their blacklist.
  • 6. 6 For instance, for aslanbank.com example, there are more than 100 IDN possibilities, to protect the customers, it is more logical to buy these possible IDNs, and for the other possible IDNs such as subdomains, it is a solution to add them to the blacklist and report them as a spam. Therefore, for big commercial companies' customers, the generation of the possible IDNs is the key element for the homograph attack.
  • 7. 7 5. Some IDN Generators: https://www.irongeek.com/homoglyph-attack-generator.php https://github.com/UndeadSec/EvilURL https://github.com/phishai/idn_generator 6. References: https://www.unicode.org/reports/tr36/idn-chars.html https://www.punycoder.com/ Figure 3: https://www.casaba.com/products/UCAPI/ Figure 5: https://www.pcworld.com/article/3191539/security/phishing-attacks-using- internationalized-domains-are-hard-to-block.html Figure 7: https://www.forensicmag.com/news/2018/02/virtual-case-notes-homograph- phishing-attacks-make-near-perfect-copies-popular-domain-names