• SecurePath for Auto Dealers
  • Services
    • SOC Reporting Services
      • SOC 2® Readiness Assessment
      • SOC 2® Reports
      • SOC 3® Reports
      • SOC for Cybersecurity® Reports
    • IT Advisory Services
      • IT Vulnerability Assessment
      • Network Penetration Testing
      • Privileged Access Management
      • Social Engineering Testing
      • Virtual CISO (vCISO)
      • Written Information Security Program (“WISP”)
      • IT General Controls Audit & Compliance
    • IT Government Compliance
      • CMMC Cybersecurity Services & Compliance
      • DFARS Compliance
      • FTC Safeguards Compliance
  • Industries
    • Financial Services
    • Government
    • Auto Dealerships
    • Enterprise
  • Blog
  • About Us
    • Meet The Team
    • Jobs
  • Contact Us

Call us today! 844-OCD-TECH

Find our Location
OCD TechOCD Tech
  • SecurePath for Auto Dealers
  • Services
    • SOC Reporting Services
      • SOC 2® Readiness Assessment
      • SOC 2® Reports
      • SOC 3® Reports
      • SOC for Cybersecurity® Reports
    • IT Advisory Services
      • IT Vulnerability Assessment
      • Network Penetration Testing
      • Privileged Access Management
      • Social Engineering Testing
      • Virtual CISO (vCISO)
      • Written Information Security Program (“WISP”)
      • IT General Controls Audit & Compliance
    • IT Government Compliance
      • CMMC Cybersecurity Services & Compliance
      • DFARS Compliance
      • FTC Safeguards Compliance
  • Industries
    • Financial Services
    • Government
    • Auto Dealerships
    • Enterprise
  • Blog
  • About Us
    • Meet The Team
    • Jobs
  • Contact Us
OCD TECH. A homoglyph attack (also sometimes called a homograph attack), the threat actor uses homoglyphs to spoof a URL or obfuscate code.

What is a Homoglyph Attack?

March 3, 2023 Posted by OCD Tech Cybersecurity, phishing

In a homoglyph attack (also sometimes called a homograph attack), the threat actor uses homoglyphs to spoof a URL or obfuscate code.

Homoglyphs are characters that resemble each other, such as the letter O and zero (‘0’), the Latin letter “H” and the Cyrillic letter “H,” or the uppercase “I” (“I”) and the lowercase letter “l” (L), which look identical in a sans serif font (like Calibri). In advanced phishing attacks today, phishing emails may contain homoglyph characters.

For example, the attacker might create a fake URL that spoofs a legitimate URL by using a homoglyph, like “InternationalBank.com,” switching out the letter sans serif letter “I” (“I”) for the lowercase sans serif letter “l” (L). Or the threat actor might use homoglyphs in the malware code to hide nefarious intent by inserting them into code strings that to the naked eye look normal but instead instruct the malware to do something different, like change the code’s perceived intent, such as making an ‘if’ statement always true or redirecting the user to a malicious domain.

How is this different from typosquatting?

Although typosquatting also uses visual tricks to deceive users, it relies heavily on users mistyping a URL in the address bar, hence, the “typo” in its name.

Are all homograph attacks just phishing attacks?

Not necessarily. Although homograph attacks usually involve phishing, threat actors could create fake yet believable websites for other fraudulent purposes or to introduce malware onto user system.

Reports about IDN homograph attacks, have noted that several homographed domains found were either part of a malvertising network, hosting exploit kits and malicious mobile apps, or generated by botnets.

Protection Against Homograph Attacks

Users are suggested to be vigilant when browsing online and maintain cybersecurity hygiene, including:

  • Regularly updating your browser (They may be your first line of defense against homograph attacks).
  • Confirming that the legitimate site you are on has an EVC (Extended Validation Certificate).
  • Avoid clicking links from emails, chat messages, and other publicly available content, most especially social media sites, without ensuring that the visible link is indeed the true destination.

OCD Tech specializes in making sure employees understand the mechanisms of spam, phishing, spear-phishing, malware, and social engineering. 

Source: https://www.feroot.com/education-center/what-is-a-homoglyph-attack/

Share
1
Avatar photo

About OCD Tech

We provide independent and objective assurance of your IT controls. Using industry recognized frameworks and best practices, we assess your company’s technology risks and evaluate existing controls for risk mitigation. Your business processes are constantly evolving. We ask you, are your IT controls keeping up?

You also might be interested in

OCDTECH.FRAUDLOSSES2023

Fraud Losses Top $10 Billion in 2023 

Feb 20, 2024

Newly released Federal Trade Commission data show that consumers reported[...]

Cybersecurity Audit

How to Prepare for a Cybersecurity Audit

Sep 23, 2024

In an era where cybersecurity threats are constantly evolving, maintaining[...]

Congratulations Robbie on passing the ISACA CSX CyberSecurity Exam

Apr 9, 2017

Our Robbie Harriman recently sat for and passed the ISACA[...]

Find us on

Contact Us

We're not around right now. But you can send us an email and we'll get back to you, asap.

Send Message
OCD Tech logo Audit. Security. Assurance.

IT Audit | Cybersecurity | IT Assurance | IT Security Consultants – OCD Tech is a technology consulting firm serving the IT security and consulting needs of businesses in Boston (MA), Braintree (MA) and across New England. We primarily serve Fortune 500 companies including auto dealers, financial institutions, higher education, government contractors, and not-for-profit organizations with SOC 2 reporting, CMMC readiness, IT Security Audits, Penetration Testing and Vulnerability Assessments. We also provide dark web monitoring, DFARS compliance, and IT general controls review.

Contact Info

  • OCD Tech
  • 25 BHOP, Suite 407, Braintree MA, 02184
  • 844-623-8324
  • https://ocd-tech.com

Follow Us

Videos

Check Out the Latest Videos From OCD Tech!

Services

SOC Reporting Services
– SOC 2 ® Readiness Assessment
– SOC 2 ®
– SOC 3 ®
– SOC for Cybersecurity ®

IT Advisory Services
– IT Vulnerability Assessment
– Penetration Testing
– Privileged Access Management
– Social Engineering
– WISP
– General IT Controls Review

IT Government Compliance Services
– CMMC
– DFARS Compliance
– FTC Safeguards vCISO

Industries

  • Financial Services
  • Government
  • Enterprise
  • Auto Dealerships

© 2025 — OCD Tech: IT Audit - Cybersecurity - IT Assurance

  • OCD Tech
  • About Us
  • Contact Us
Prev Next