Homoglyph Phishing Campaign – “rn” Typo Trick

Attackers are running a sophisticated typosquatting campaign that impersonates Microsoft and Marriott International by exploiting a visual trick: replacing the letter “m” with “rn” (r + n). In many fonts, “rn” looks nearly identical to “m,” making these domains appear legitimate at a glance.

How the Attack Works

  • Typosquatting / Homoglyph attack:
    • Example: rnarriottinternational.com looks like marriottinternational.com.
    • Example: rnicrosoft.com looks like microsoft.com.
  • Psychological trick: Human eyes often autocorrect the typo, especially on mobile screens where differences are harder to spot.
  • Delivery method:
    • Fake websites steal loyalty credentials or Microsoft account logins.
    • Phishing emails mimic official branding, logos, and tone.

Recent Campaigns

  • Marriott International:
    • Malicious domains: rnarriottinternational.com, rnarriotthotels.com.
    • Goal: Steal loyalty program credentials and guest data.
  • Microsoft:
    • Malicious domain: rnicrosoft.com.
    • Used in phishing emails with fake security alerts and invoices.
    • Particularly dangerous on mobile devices.

Indicators of Compromise (IOCs)

Phishing DomainImpersonated ServiceTechniqueDetection Difficulty
rnarriottinternational.comMarriott Intl“m” → “rn”Critical
rnarriotthotels.comMarriott Hotels“m” → “rn”Critical
rnicrosoft.comMicrosoft 365/Login“m” → “rn”High (Mobile)
micros0ft.comMicrosoft“o” → “0”Medium
microsoft-support.comMicrosoft SupportHyphenation / suffixLow

Defensive Recommendations

  • Expand sender address: On mobile, tap the sender name to reveal the full email.
  • Hover before clicking: On desktop, hover over links to see the actual destination.
  • Manual entry: Type marriott.com or microsoft.com directly into your browser.
  • Password managers: They won’t auto-fill credentials on fake domains.
  • Block IOCs: Security teams should blacklist the flagged domains immediately.

Takeaway

This campaign shows how attackers exploit tiny visual differences in domain names to bypass human attention and trick users. With homoglyph attacks, vigilance is key: always verify URLs carefully

Be the first to comment

Leave a Reply

Your email address will not be published.


*


This site uses Akismet to reduce spam. Learn how your comment data is processed.