Take a normal company domain:

acmecorporation.com

Now swap just one character with a visually identical Unicode version:

acmecorporatіon.com   ← Cyrillic "і"

To the human eye, both are the same. To the internet, they are completely different domains.

How attackers leverage this

  1. Register the homoglyph domain Many registrars allow Internationalized Domain Names (IDN), so domains with Cyrillic characters can be purchased just like normal ones.
  2. Set up email infrastructure Configure MX records and create addresses like:
support@acmecorporatіon.com admin@acmecorporatіon.com

3. Mimic legitimate communication Send emails that visually appear to come from:

support@acmecorporation.com

but actually originate from the spoofed domain.

4. Exploit trust Since most users (and even some tools) don't notice the subtle character difference: → Phishing emails look legitimate → Internal impersonation becomes possible → Targets are more likely to click links or share credentials

Why this is effective

  • Most fonts render these characters identically
  • Users don't inspect domains carefully
  • Some systems don't flag IDN domains clearly
  • Email clients often don't highlight Unicode risks

Other commonly abused homoglyphs

a → Cyrillic а
e → Cyrillic е
o → Cyrillic о
p → Cyrillic р
c → Cyrillic с
x → Cyrillic х
y → Cyrillic у

Even a single character swap is enough to create a convincing fake domain.

Core insight

This isn't about hacking servers or exploiting code.

It's about exploiting a simple gap:

Humans trust what they see, systems trust what is encoded.

Homoglyph domains sit right in between — making them a powerful tool for realistic phishing campaigns.

#CyberSecurity #Phishing #AppSec #SecurityAwareness #Infosec