{"id":9734,"date":"2017-10-06T08:10:04","date_gmt":"2017-10-06T16:10:04","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/10\/06\/news-3507\/"},"modified":"2017-10-06T08:10:04","modified_gmt":"2017-10-06T16:10:04","slug":"news-3507","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2017\/10\/06\/news-3507\/","title":{"rendered":"Out of character: Homograph attacks explained"},"content":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Fri, 06 Oct 2017 15:00:10 +0000<\/strong><\/p>\n<p>In April, Xudong Zheng, a security enthusiast based in New York,\u00a0<a href=\"https:\/\/www.xudongz.com\/blog\/2017\/idn-phishing\/\" target=\"_blank\" rel=\"noopener\">found<\/a> a flaw in some modern browsers in the way they handle domain names. While <a href=\"https:\/\/www.chromium.org\/developers\/design-documents\/idn-in-google-chrome\" target=\"_blank\" rel=\"noopener\">Chrome<\/a>, <a href=\"https:\/\/wiki.mozilla.org\/IDN_Display_Algorithm\" target=\"_blank\" rel=\"noopener\">Firefox<\/a>, and <a href=\"https:\/\/www.opera.com\/security\/advisory\/788\" target=\"_blank\" rel=\"noopener\">Opera<\/a> already have security measures in place to cue users that they might be visiting a destination they thought was legitimate, at that time these browsers did not flag a fake domain name that used all Latin look-alike characters taken from another foreign language.\u00a0Zheng demonstrated this when he created and registered a\u00a0<a href=\"https:\/\/blog.malwarebytes.com\/glossary\/proof-of-concept\/\" target=\"_blank\" rel=\"noopener\">proof-of-concept (PoC)<\/a> page for the domain, \u0430\u0440\u0440\u04cf\u0435.com, which was written in pure Cyrillic characters.<\/p>\n<h3>What is a homograph attack?<\/h3>\n<p>A homograph attack is a method of deception wherein a threat actor leverages on the similarities of character scripts to create and register phony domains of existing ones to fool users and lure them into visiting. This attack has some known aliases: homoglyph attack,\u00a0script spoofing, and homograph domain name spoofing<em>.\u00a0<\/em>Characters\u2014i.e., letters and numbers\u2014that look alike are called <em>homoglyphs<\/em> or\u00a0<em>homographs<\/em>, thus the name of the attack. Examples of such are the\u00a0Latin small letter O (U+006F) and the Digit zero (U+0030). Hypothetically, one might register <em>bl00mberg.com<\/em>\u00a0or <em>g00gle.com<\/em> and get away with it. But in this day and age, such simple character swaps could be easily detected.<\/p>\n<p>In an <a href=\"https:\/\/en.wikipedia.org\/wiki\/Internationalized_domain_name\" target=\"_blank\" rel=\"noopener\">internationalized domain name (IDN)<\/a> homograph attack, a threat actor creates and registers one or several fake domains using at least one look-alike character from a different language. Again, hypothetically, one might register <em>g\u03bf\u03bfgle.com<\/em>, but not before swapping the Latin small letter O (U+006F) with the Greek small letter Omicron (U+03BF).<\/p>\n<p>Zheng&#8217;s PoC is another example of an IDN homograph attack, so let&#8217;s list down each character he used to illustrate how this particular attack can be highly successful and dangerous if used in the wild. Interestingly, an operating system&#8217;s typeface of choice could make it easy or difficult for users to visually differentiate non-Latin characters from Latin ones.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-19946 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/glyph-unicode.png\" alt=\"\" width=\"933\" height=\"149\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/glyph-unicode.png 933w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/glyph-unicode-300x48.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/glyph-unicode-600x96.png 600w\" sizes=\"auto, (max-width: 933px) 100vw, 933px\" \/><\/p>\n<p style=\"text-align: center\"><em>Table 1: We used\u00a0<a href=\"https:\/\/en.wikipedia.org\/wiki\/Segoe\" target=\"_blank\" rel=\"noopener\">Segoe UI<\/a>, Microsoft&#8217;s system-wide typeface, here.<\/em><\/p>\n<p>To the human eye, these Cyrillic glyphs can easily be confused with their Latin counterparts. Computers, however, read these confusables differently, as we can see from the different hex codes assigned to them.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-19947 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/glyph-unicode-osx.png\" alt=\"\" width=\"935\" height=\"151\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/glyph-unicode-osx.png 935w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/glyph-unicode-osx-300x48.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/glyph-unicode-osx-600x97.png 600w\" sizes=\"auto, (max-width: 935px) 100vw, 935px\" \/><\/p>\n<p style=\"text-align: center\"><em>Table 2: We used <a href=\"https:\/\/en.wikipedia.org\/wiki\/San_Francisco_(sans-serif_typeface)\" target=\"_blank\" rel=\"noopener\">San Francisco<\/a>, Apple&#8217;s system-wide typeface, here. It&#8217;s worth noting that OSX distinguishes the Cyrillic small letter Palochka from the Latin small letter L; however, it cannot show the difference between the Latin small letter L with the Latin capital letter I, as per the text &#8220;Cyrillic small letter Ie&#8221;.<\/em><\/p>\n<p>According to <a href=\"https:\/\/bugs.chromium.org\/p\/chromium\/issues\/detail?id=683314\" target=\"_blank\" rel=\"noopener\">this bug report<\/a>, it seems that even the system-wide font for Linux doesn&#8217;t distinguish confusable characters either.<\/p>\n<p>The use of all-Cyrillic glyphs\u2014or any other non-Latin characters for this matter\u2014for domain names isn&#8217;t the problem. IDN has made it possible for internet users around the globe to create and access domains using their native language scripts. The problem is when these glyphs are misused to deceive internet users.<\/p>\n<h3>Is this a new form of online threat?<\/h3>\n<p>Homograph attacks have been around for years. As far as we know, Zhang&#8217;s PoC was the first of its kind to make headlines and spark a conversation among internet users.<\/p>\n<p>Below are other examples of\u00a0homographed domains and how they were used:<\/p>\n<ul>\n<li>To raise awareness, a security consultant <a href=\"https:\/\/www.grahamcluley.com\/lloydsbank-homographic-phishing-problem\/\" target=\"_blank\" rel=\"noopener\">highlighted the common misconception<\/a> that sometimes a Latin capital letter I (U+0049) looks similar to a Latin small letter L (U+006C) by registering a fake Lloyds Bank website and adding an SSL certificate to it to make it look as legitimate as the real one.<\/li>\n<li>A security researcher from NTT Security <a href=\"https:\/\/www.solutionary.com\/resource-center\/blog\/2017\/01\/idn-homograph-attacks\/\" target=\"_blank\" rel=\"noopener\">shared his experience<\/a> about a friend of his who received several Google Analytics spam containing the domain, <em>secret[DOT]\u0262oogle[DOT]com<\/em>. The &#8220;\u0262&#8221; there wasn&#8217;t the Latin capital letter G (U+0047) but a Latin letter small capital G (U+0262).<\/li>\n<li>A security researcher from NewSky Security <a href=\"https:\/\/blog.newskysecurity.com\/fake-adobe-website-delivers-betabot-4114d1775a18\" target=\"_blank\" rel=\"noopener\">found an impersonated Adobe website<\/a> serving the Betabot malware, pretending to be an Adobe Flash Player installer file. The threat actor used the Latin small letter B with Dot below (U+1E05) to replace the Latin small letter B (U+0062) in &#8220;adobe.com&#8221;.<\/li>\n<\/ul>\n<h3>How is this different from typosquatting?<\/h3>\n<p>Although typosquatting also uses visual tricks to deceive users, it relies heavily on users mistyping a URL in the address bar, hence, the &#8220;typo&#8221; in its name.<\/p>\n<h3>Are all homograph attacks just phishing attacks?<\/h3>\n<p>Not necessarily. Although homograph attacks usually involve phishing threat actors could create fake yet believable websites for other fraudulent purposes or to introduce malware onto user systems, as is the case of the bogus Adobe website we mentioned earlier.<\/p>\n<p>In this <a href=\"https:\/\/www.symantec.com\/connect\/blogs\/bad-guys-using-internationalized-domain-names-idns\" target=\"_blank\" rel=\"noopener\">in-depth report about IDN homograph attacks<\/a>, our friends at Symantec have noted that several homographed domains they found were either part of a malvertising network, hosting exploit kits and malicious mobile apps, or generated by botnets.<\/p>\n<h3>How can we protect ourselves from homograph attacks?<\/h3>\n<p>Browser tools have been created, such as Punycode Alert and the Quero Toolbar, to aid users in alerting them of potential homograph attacks. Users have the discretion of adopting them alongside the built-in security mechanisms in today&#8217;s browsers. However, no tool can replace vigilance when browsing online and a <a href=\"https:\/\/blog.malwarebytes.com\/101\/2017\/10\/national-cybersecurity-awareness-month-simple-steps-for-online-safety\/\" target=\"_blank\" rel=\"noopener\">solid cybersecurity hygiene<\/a>. This includes:<\/p>\n<ul>\n<li>Regularly updating your browser (They may be your first line of defense against homograph attacks)<\/li>\n<li>Confirming that the legitimate site you&#8217;re on has an <a href=\"https:\/\/en.wikipedia.org\/wiki\/Extended_Validation_Certificate\" target=\"_blank\" rel=\"noopener\">EVC<\/a><\/li>\n<li>Avoid clicking links from emails, chat messages, and other publicly available content, most especially <a href=\"https:\/\/hethical.io\/homograph-attack-using-internationalized-domain-name\/\" target=\"_blank\" rel=\"noopener\">social media sites<\/a>, without ensuring that the visible link is indeed the true destination.<\/li>\n<\/ul>\n<p>Remember: Eyes open.<\/p>\n<p>Stay safe!<\/p>\n<p>&nbsp;<\/p>\n<p>Additional reading(s):<\/p>\n<ul>\n<li><a href=\"https:\/\/www.icann.org\/news\/announcement-2005-02-23-en\" target=\"_blank\" rel=\"noopener\">ICANN Statement on IDN Homograph Attacks and Request for Public Comment<\/a><\/li>\n<li>Unicode Security <a href=\"https:\/\/unicode.org\/reports\/tr36\/\" target=\"_blank\" rel=\"noopener\">Considerations<\/a> and <a href=\"https:\/\/unicode.org\/reports\/tr39\/\" target=\"_blank\" rel=\"noopener\">Mechanisms<\/a><\/li>\n<li><a href=\"https:\/\/www.cs.technion.ac.il\/~gabr\/papers\/homograph_full.pdf\" target=\"_blank\" rel=\"noopener\">The Homograph Attack [PDF]<\/a> by\u00a0Evgeniy Gabrilovich and\u00a0Alex Gontmakher<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>Resource:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.punycoder.com\/\" target=\"_blank\" rel=\"noopener\">Punycoder<\/a><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><em>The Malwarebytes Labs Team<\/em><\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/101\/2017\/10\/out-of-character-homograph-attacks-explained\/\">Out of character: Homograph attacks explained<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/101\/2017\/10\/out-of-character-homograph-attacks-explained\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Fri, 06 Oct 2017 15:00:10 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/101\/2017\/10\/out-of-character-homograph-attacks-explained\/' title='Out of character: Homograph attacks explained'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/shutterstock_637468987_.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>Online and on traditional media, we hear and read about different kinds of cybersecurity attacks that sometimes we get overwhelmed with the terminologies. Most of us grasp what phishing attacks and denial of service (DoS) attacks are, but how familiar are we wit<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/101\/\" rel=\"category tag\">101<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/101\/fyi\/\" rel=\"category tag\">FYI<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/explained\/\" rel=\"tag\">Explained<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/homograph-attacks\/\" rel=\"tag\">homograph attacks<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/phishing\/\" rel=\"tag\">phishing<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/script-spoofing\/\" rel=\"tag\">script spoofing<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/social-engineering\/\" rel=\"tag\">Social Engineering<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/typosquatting\/\" rel=\"tag\">typosquatting<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/visual-spoofing\/\" rel=\"tag\">visual spoofing<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/101\/2017\/10\/out-of-character-homograph-attacks-explained\/' title='Out of character: Homograph attacks explained'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/101\/2017\/10\/out-of-character-homograph-attacks-explained\/\">Out of character: Homograph attacks explained<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[10519,10522,10520,15548,3924,15549,10510,15550,15551],"class_list":["post-9734","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-10519","tag-explained","tag-fyi","tag-homograph-attacks","tag-phishing","tag-script-spoofing","tag-social-engineering","tag-typosquatting","tag-visual-spoofing"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/9734","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=9734"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/9734\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=9734"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=9734"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=9734"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}