Take a normal company domain:
acmecorporation.comNow swap just one character with a visually identical Unicode version:
acmecorporatіon.com ← Cyrillic "і"To the human eye, both are the same. To the internet, they are completely different domains.
How attackers leverage this
- Register the homoglyph domain Many registrars allow Internationalized Domain Names (IDN), so domains with Cyrillic characters can be purchased just like normal ones.
- Set up email infrastructure Configure MX records and create addresses like:
support@acmecorporatіon.com admin@acmecorporatіon.com3. Mimic legitimate communication Send emails that visually appear to come from:
support@acmecorporation.combut actually originate from the spoofed domain.
4. Exploit trust Since most users (and even some tools) don't notice the subtle character difference: → Phishing emails look legitimate → Internal impersonation becomes possible → Targets are more likely to click links or share credentials
Why this is effective
- Most fonts render these characters identically
- Users don't inspect domains carefully
- Some systems don't flag IDN domains clearly
- Email clients often don't highlight Unicode risks
Other commonly abused homoglyphs
a → Cyrillic а
e → Cyrillic е
o → Cyrillic о
p → Cyrillic р
c → Cyrillic с
x → Cyrillic х
y → Cyrillic уEven a single character swap is enough to create a convincing fake domain.
Core insight
This isn't about hacking servers or exploiting code.
It's about exploiting a simple gap:
Humans trust what they see, systems trust what is encoded.
Homoglyph domains sit right in between — making them a powerful tool for realistic phishing campaigns.
#CyberSecurity #Phishing #AppSec #SecurityAwareness #Infosec