top | item 14130241

Phishing with Unicode Domains

129 points| 01walid | 9 years ago |xudongz.com

25 comments

order

wimagguc|9 years ago

HN Discussion about the same topic from 2 days ago (126 comments to date): https://news.ycombinator.com/item?id=14119713

paulddraper|9 years ago

High level recap:

Chrome - fixed in 59 (current stable is 57)

Firefox - no plans to change; you can adjust network.IDN_show_punycode in about:config

IE - immune

Safari - immune

dmckeon|9 years ago

Can a browser could track how many language/character sets are typically used by a browser profile, and warn the user when they are about to use a new, previously unused set, rather than waving the duty off as the "responsibility of domain owners"?

With now over 1000 top-level domains, and however many homographic matches among character sets, expecting people to register dozens of matching domains seems unrealistic.

Klathmon|9 years ago

Won't it be even easier to just check if the domain contains something outside the currently used character set (perhaps always allowing ascii)?

I think that, plus a "you have never visited this site before" kind of warning could go a long way towards combating these kinds of attacks.

I think the real devil is going to be in the UI. You don't want to make it overly scary (otherwise you penalize domains which use some unicode characters correctly), but it can't be so unnoticable that you won't be able to tell when it matters.

shif|9 years ago

I wonder how the domain displays on email clients like gmail and outlook, this is the scariest part, most people will just look at the domain and think it's a valid mail and follow the instructions of that mail, it could be catastrophic for companies, the ubiquity $40 million fiasco comes to mind.

mike-cardwell|9 years ago

Considering how easy email is to spoof, why bother using a unicode domain which is only similar to the target domain? Why not just use the real domain instead?

nemo1618|9 years ago

What an odd coincidence: I just published a Go package yesterday to detect such attacks in source code. Is there a homography bug going around?

https://github.com/NebulousLabs/glyphcheck

(btw, Wikipedia notes that "The term homograph is sometimes used synonymously with homoglyph, but in the usual linguistic sense, homographs are words that are spelled the same but have different meanings, a property of words, not characters.")

01walid|9 years ago

Interesting, but -from the repo description- why this is limited to Go source code files?

html5web|9 years ago

jastanton|9 years ago

Why is this the scariest one? I've never heard of app.com, any real new or fake news (in the literal sense) coming from that site wouldn't register as legitimate one way or the other.

However apple.com with a CC reset form could be a mighty easy way to scam a lot of people into giving up the personal details which could easily lead to full blown identify theft.

Thankfully FF/Chrome are patching this

khedoros1|9 years ago

Interesting. The apple.com one (https://www.xn--80ak6aa92e.com/) shows literally that text in Pale Moon (27.2), but shows "аррӏе.com" (Cyrillic text) in Chrome 57 and Firefox 51.

Someone else's example that looks like "app.com" ( http://www.xn--80a6aa.com/) translates to the Cyrillic text, even in Pale Moon. I wonder if Apple's site is on a hard-coded blacklist in the browser, or if every update includes the top-1000 list, or something?

I remember reading about issues with Unicode domains years ago, though. It surprises me that something hasn't been figured out by this point. One mitigation that I remember being discussed was coloring characters from different scripts in different colors, to make variant characters more obvious.

paulddraper|9 years ago

Even if you could train that, it doesn't help color-blind people...