Homograph Attacks: Beware of Fake Senders

Homograph Attacks: Beware of Fake Senders

• 1 min

Homograph attacks consist of imitating a trusted email address by changing a single letter or character in the domain.
These tiny modifications easily fool the human eye and can mislead even the most attentive users.

Common examples:

  • contact@solution-it.nccontact@soIution-it.nc (the “l” replaced by a capital “I”)
  • support@entreprise.comsupport@entrepr1se.com (the “i” replaced by a “1”)
  • contact@solution-it.nccontact@solutіon-it.nc (the Latin “i” replaced by a Cyrillic “і”, visually identical)

Example of homographic characters
#

Character (Latin)Original alphabetHomographHomograph alphabet
aLatinаCyrillic
iLatinіCyrillic
oLatinοGreek
pLatinрCyrillic

Why is this dangerous?
#

  • You believe you are communicating with a legitimate partner.
  • You may end up clicking on a malicious link, sharing sensitive credentials, or opening an infected attachment.
  • Consequences range from data leaks to financial theft.

Best practices to protect yourself
#

  1. Check the sender carefully: a single character difference may reveal an attack.
  2. Hover over links before clicking to see the real URL.
  3. Enable multi-factor authentication (MFA) to reduce risks.
  4. Report any suspicious address to your IT support or provider.
  5. Train your teams regularly to spot this type of fraud.

In summary
#

These attacks exploit our visual habits and trust.
With vigilance and good practices, you can greatly reduce the risks.