logo svg
logo

What Is a Homoglyph Attack? 2025 Guide to Unicode Spoofing & Phishing Defense

Homoglyph attacks exploit look-alike Unicode characters to spoof domains, trick users, and bypass filters. Learn how they work, see real examples, and discover proven defenses.

Mohammed Khalil

Mohammed Khalil

Featured Image
Infographic showing “amazon.com” appearing normal on one side and revealing Cyrillic characters and Punycode translation on the other, symbolizing homoglyph-based phishing deception.

A homoglyph attack is a form of visual spoofing where attackers replace letters in a name or URL with nearly identical characters from another alphabet. In practice, a user may click a link that looks like “amazon.com” but contains a Greek ο or Cyrillic а in place of a Latin letter. The browser or email client shows a familiar string, but the link points to a different domain. This exploits how Unicode works: many alphabets have characters (glyphs) that are confusable. For example, Unicode small Cyrillic о (U+043E) is indistinguishable from Latin o (U+006F) on most screens. When IDN (Internationalized Domain Name) support is used, these spoof domains become valid in DNS, meaning “аррӏе.com” all Cyrillic letters can resolve independently from “apple.com”.

Penetration testing often includes social engineering and domain reconnaissance. As part of a phishing or red-team test, attackers may register lookalike domains to see if users or systems are fooled. For background on pentesting, see What is Penetration Testing? for how these assessments work. In a homoglyph test, a pen tester might spoof a login URL or sender address with visually deceptive characters. This exploits the fact that humans and simple filters misinterpret the characters. In short: homograph (homoglyph) attacks hide malicious domains in plain sight.

How Homoglyph Attacks Work

Infographic illustrating the five-step homoglyph attack process: creating a lookalike Unicode domain, registering it via IDN, launching phishing, tricking users into login, and stealing credentials — highlighting how visual deception becomes exploitation.

Homoglyph attacks rely on Unicode’s vast character set. Attackers mix scripts (Latin, Cyrillic, Greek, etc.) or use lookalike symbols so the text appears unchanged. For instance, Google’s documentation notes “Latin ‘a’ looks a lot like Cyrillic ‘а’”, so an attacker could register xn--80ak6aa92e.com (which renders as “ebаy.com” with Cyrillic а), a perfect knock-off of “ebay.com”. The browser may display it as “ebay.com” or at least not raise alarm, but it leads elsewhere.

Common Attack Scenarios:

Attackers exploit visual confusion: to a human, “citibank.com” with a Cyrillic с looks identical, so victims may hand over credentials, not realizing they’re on an imposter site. Automated systems can also be fooled: filters that scan for “paypal.com” won’t catch “paypal.com” (Latin vs Greek alpha). This makes homoglyphs a powerful tool to evade defenses and impersonate trusted brands.

Homoglyph vs Typosquatting: Key Differences

Attack TypeMethodExample
Homoglyph (Homograph)Swap characters with visually similar Unicode glyphs. Relies on deception, not user error.goоgle.com (Cyrillic о for Latin o); “Airplаnes R Us” (with Cyrillic а).
TyposquattingRegister common misspellings or typos of a known domain. Relies on user mistake.gooogle.com (extra o), gogle.com (missing o).

A typosquatting victim simply mistypes a URL, whereas a homoglyph attack actively tricks the user with what appears correct. In fact, typosquatting depends on user input errors, while homograph attacks work even when links are clicked. As the DarkOwl CSA blog explains, homoglyph fakes are created using lookalike symbols (e.g. using “0” for “O”), whereas typosquatting is a straightforward spelling error.

Why Homoglyph Attacks Matter in 2025

Infographic showing how AI automation, Unicode domain growth, and human error combine to make homoglyph attacks a major phishing threat in 2025, with global domain visuals and breach statistics.

In today’s threat landscape, homoglyph attacks amplify phishing and social engineering risks. Phishing remains the top attack vector DeepStrike’s 2025 report highlights average breach costs of $4.88M for phishing-based incidents and $10.22M in the U.S. on average. Homoglyph spoofing is a favored tactic for threat actors, from nation-states to cybercriminal rings, because it can slip past email filters and trick even security-conscious users. With AI-driven phishing on the rise up 1,265% year-over-year, these deceptive domains are more dangerous than ever.

Moreover, as internationalized domain name IDNs proliferate globally, the attack surface grows. Non-ASCII character support means millions more possible lookalikes exist. Browsers like Chrome and Firefox have had to tighten their IDN policies; for example, Chrome now shows punycode for mixed-script domains to warn users. Still, in email clients or social networks, homoglyphs often render as normal text. This tactic has led to high-profile scams: from Google Drive phishing to business email compromise BEC schemes. For organizations, any account takeover or data theft facilitated by a homoglyph site can trigger expensive breaches and regulatory fines. In short, proactive testing and defense against homograph attacks is critical to protect brand and data integrity.

Real-World Homoglyph Attack Examples

Infographic showing four homoglyph attack examples using lookalike domains for PayPal, Adobe, Spotify, and Apple, with red highlights marking deceptive Unicode characters.

These incidents highlight that even savvy users and automated defenses can be fooled by homoglyphs. They also show a common pattern: the top-level domain (TLD) remained the same e.g. “.com”, but the letters themselves came from another alphabet, blending seamlessly into the interface.

How to Test for Homoglyph Attacks (Penetration Testing Steps)

Infographic illustrating the homoglyph penetration testing workflow: identifying domains, generating lookalikes, simulating phishing, analyzing detection gaps, and training users.

To ensure your organization isn’t vulnerable, include homoglyph scenarios in your security assessments. Here’s a step-by-step approach for testers:

  1. Identify Key Domains/Names. List the critical domain names, URLs, and email sender addresses e.g. corporate domain, partner brands. These are the targets for spoofing.
  2. Generate Homograph Variants. Use tools or scripts to find all possible look-alikes. For example, use dnstwist-style generators or the Unicode confusable tables (UTS #39) to swap letters. This yields domains like “example.com” (Cyrillic а) or “microsfot.com”.
  3. Register or Simulate Domains. Optionally register the spoof domains in a safe testing environment, or at least create test records. This lets you see how browsers and systems display them often in punycode. If actual registration isn’t feasible, simulate by editing your hosts file or DNS in a lab.
  4. Conduct Phishing and Access Tests. Send controlled phishing emails using the spoof addresses, or have testers visit the fake sites. Verify whether email filters catch them and whether users notice the anomalies. Check if authentication systems properly flag mismatched domains for example, password managers usually won’t autofill on the wrong domain.
  5. Analyze and Report Findings. Document which homoglyphs were most convincing and which defenses failed. Provide clear remediation: this might include blocking those domains, updating spam filters, or adding monitoring rules. Recommend 2FA or password alerts for potentially compromised accounts.

This approach can be integrated into a standard external or red-team test. By simulating real attacker steps, you can validate whether your organization’s email filters, browser settings, and user awareness are effective against homoglyph deception.

Defense & Prevention Strategies

Infographic of a layered security shield showing defense strategies against homoglyph attacks — including DMARC, punycode policies, monitoring, training, and MFA — centered on DeepStrike’s continuous testing core.

Why this matters: Preventing homoglyph attacks requires both technical and human-focused controls. Below are key best practices:

By combining user vigilance with technical checks e.g. forcing punycode, using spam filters that decode Unicode, and verifying SPF/DKIM, you can greatly reduce homoglyph risks. Remember that even best practices are only effective if regularly reviewed. As attackers invent new tricks, mixed fonts, unconventional scripts, keep your defenses updated. Periodic retesting including re-running homograph generators ensures you stay one step ahead.

Stay Vigilant, Test Often

Homoglyph (homograph) attacks are a subtle but potent phishing technique. In this article we explained what they are, how they work, real examples of scams, and concrete ways to test and defend against them. The key takeaway is that visibility matters: both users and security systems need to notice when a name isn’t truly what it seems. By including homoglyph scenarios in penetration tests and by implementing controls punycode display, domain monitoring, email auth, MFA, etc., organizations can greatly reduce their risk.

Ready to strengthen your defenses? The evolving threat landscape demands proactive action. If you need to validate your security posture, uncover hidden risks, or improve your resilience, DeepStrike can help.

Digital illustration showing a cybersecurity expert activating a glowing holographic defense sphere labeled with “Phishing Simulation,” “Homoglyph Detection,” and “Continuous Testing,” symbolizing DeepStrike’s readiness-driven penetration testing approach.

Our expert team delivers clear, actionable guidance to protect your business from sophisticated attacks. Explore our penetration testing services to see how we can uncover vulnerabilities including homoglyph vectors before attackers do. Drop us a line, we’re always ready to dive in.

About the AuthorMohammed Khalil is a Cybersecurity Architect at DeepStrike, specializing in advanced penetration testing and offensive security operations. With certifications including CISSP, OSCP, and OSWE, he has led numerous red team engagements for Fortune 500 companies, focusing on cloud security, application vulnerabilities, and adversary emulation. His work involves dissecting complex attack chains and developing resilient defense strategies for clients in the finance, healthcare, and technology sectors.

FAQs

It’s a spoofing attack where a domain, email, or filename is made to look identical to a legitimate one by swapping characters with visually similar glyphs often from another alphabet. For example, using Cyrillic а in place of a Latin a in “example.com” results in a lookalike URL. The user thinks they see the correct name, but in reality it points to a fake resource.

Typosquatting relies on common typing errors like “gooogle.com”, whereas a homoglyph attack actively deceives by using identical-looking characters. Typosquatting only succeeds if the user spells wrong; a homoglyph attack can fool users even if they copy-paste or click a link, because the text appears correct.

Modern browsers Chrome, Firefox, Edge use IDN policies: if a domain has mixed scripts or looks confusable, they often display the punycode form instead of the Unicode string. For example, “аррӏе.com” would appear as “xn--80ak6aa92e.com.” This alerts savvy users. Email systems with advanced filters may also catch known bad domains, but many standard filters do not flag Unicode confusables. Therefore, technical measures help, but user awareness and strict email authentication DMARC/SPF/DKIM are also crucial defenses.

Large brands and financial sites are prime targets. Attackers have mimicked PayPal, banks, cloud services, and popular apps. For instance, phishing campaigns have spoofed Google Drive and DocuSign notifications by inserting Cyrillic letters into names. Streaming and SaaS platforms are also attacked e.g. fake “Spotify” emails. Essentially, any site where users enter credentials can be targeted with a homoglyph-laced fake.

Pen testers can simulate these attacks as part of phishing or red-team assessments. Using tools like dnstwist or custom scripts, testers generate homograph variants of target domains and use them in phishing templates. They then check if employees or security controls notice. Including homoglyph tests in a pentest ensures that any gaps in email filtering or user training are identified and remediated.

Homoglyphs can bypass simple filters because the malicious URL/email looks legitimate at a glance. A filter for “paypal.com” won’t match “pаypal.com” with different characters. Also, if an email is already in a user’s inbox (say, it’s from a trusted provider but with a deceptive address, even SPF/DKIM checks can pass if the domain itself is spoofed. That’s why multi-layered defense authentication, display warnings, MFA and user skepticism are needed alongside technical controls.

background
Let's hack you before real hackers do

Stay secure with DeepStrike penetration testing services. Reach out for a quote or customized technical proposal today

Contact Us