CAPEC 632 Homograph Attack via Homoglyphs

Draft Detailed Low Risk
Severity Medium

Description

An adversary registers a domain name containing a homoglyph, leading the registered domain to appear the same as a trusted domain. A homograph attack leverages the fact that different characters among various character sets look the same to the user. Homograph attacks must generally be combined with other attacks, such as phishing attacks, in order to direct Internet traffic to the adversary-controlled destinations.

Attack Execution Flow

3

Mitigations

2

Consequences

Relationships