国产精品美女一区二区三区-国产精品美女自在线观看免费-国产精品秘麻豆果-国产精品秘麻豆免费版-国产精品秘麻豆免费版下载-国产精品秘入口

Set as Homepage - Add to Favorites

【turksh sexs videos】Major domain name bug allowed hackers to register malicious domains

Source:Global Hot Topic Analysis Editor:relaxation Time:2025-07-02 09:29:20

Thanks to a bug at some of the internet’s largest domain registrars,turksh sexs videos bad actors were able to register malicious domains until just late last month.

If I told you to click this on this URL, amɑzon.com, and login for a great limited time deal over at Amazon, would you notice it wasn’t reallyAmazon’s domain name?

Hover over it, give it a click. You’ll find that it actually directs you to xn--amzon-1jc.com. Why? Look closely and you’ll notice that the second “a” and the “o” aren’t actually the letters “a” and “o” from the Latin alphabet, which is what’s used in the English language.

It’s not supposed to be possible to register these domain names due to the malicious attacks they could be used for. Many web browsers change the characters in the URL from Unicode to Punycode, as seen in the earlier example, for that very reason.

The zero-day, or previously unknown, bug was discoveredby Matt Hamilton, a security researcher at Soluble, in partnership with the security firm Bishop Fox.

According to Hamilton’s research, he was able to register dozens of names using Latin homoglyphs, basically a character that looks like another character. Verisign, Google, Amazon, DigitalOcean, and Wasabi were among the affected companies allowing the registration of these names.

“Between 2017 and today, more than a dozen homograph domains have had active HTTPS certificates,” writes Hamilton. “This included prominent financial, internet shopping, technology, and other Fortune 100 sites. There is no legitimate or non-fraudulent justification for this activity.”

Hamilton held his report for publication until Verisign, the company that runs the domain registries for prominent general top level domain (gTLD) extensions like .com and .net, fixed the issue. The research was only conducted on gTLDs run by Verisign. He states that among all the vendors he contacted, Amazon and Verisign in particular took the issue very seriously.

Mashable Light Speed Want more out-of-this world tech, space and science stories? Sign up for Mashable's weekly Light Speed newsletter. By clicking Sign Me Up, you confirm you are 16+ and agree to our Terms of Use and Privacy Policy. Thanks for signing up!

In the Cyrillic alphabet specifically, there are a number of letters that look nearly identical to letters in the Latin alphabet. For example, here’s the character for “a” in Latin. Here’s the character for “ɑ” in Cyrillic.

Combining these homoglyph characters with the Latin alphabet in a domain name could create a URL that looks very much like one that’s already registered by another company, such as fake Amazon domain mentioned earlier.

Hackers could use these domain names to create phishing websites that look like legitimate sites for services like Gmail or PayPal. The attack could steal a users website password or credit card information using this information.

Hamilton was able to register the following domain names thanks to this bug:

amɑzon.com

chɑse.com

sɑlesforce.com

ɡmɑil.com

ɑppɩe.com

ebɑy.com

ɡstatic.com

steɑmpowered.com

theɡuardian.com

theverɡe.com

washinɡtonpost.com

pɑypɑɩ.com

wɑlmɑrt.com

wɑsɑbisys.com

yɑhoo.com

cɩoudfɩare.com

deɩɩ.com

gmɑiɩ.com

gooɡleapis.com

huffinɡtonpost.com

instaɡram.com

microsoftonɩine.com

ɑmɑzonɑws.com

ɑndroid.com

netfɩix.com

nvidiɑ.com

ɡoogɩe.com

In total, he spent $400 to register the domain names that could be used to scam people out of much, much more.

Internationalized domain names, or IDNs, have become popular in recent years. These domains allow users around the world to register names using their native language, such as Greek or Japanese, where you may find non-Latin characters.

However, malicious actors quickly discovered ways to use IDNs for attacks.

SEE ALSO: Rudy Giuliani's typo-filled tweets are catnip for hackers spreading malware

As Bleeping Computerpoints out, the Internet Corporation for Assigned Names and Numbers (ICANN), the organization that manages the web's domain name system, has IDN guidelines state that domain registrars should not allow domains be registered using a combination of different alphabets for this very reason.

It's not a new practice, though. The Registernotes how homograph attacks have been an issue for the web for 15 years.

As for amɑzon.com, or should I say xn--amzon-1jc.com, Hamilton has since transferred the domain to Amazon, the company that can be found at the real amazon.com.

Related Video: Beware of cybercriminals who are taking advantage of coronavirus fears with fake websites and phishing schemes

Topics Cybersecurity

0.1581s , 14253.2578125 kb

Copyright © 2025 Powered by 【turksh sexs videos】Major domain name bug allowed hackers to register malicious domains,Global Hot Topic Analysis  

Sitemap

Top 主站蜘蛛池模板: 91在线无码精品秘入口九 | 91精品国产综合久久久蜜臀 | 1024国产精品免费观看 | 午夜免费福利 | 午夜热搜电影天堂完整版免费观看 | 高清精品一级毛片 | 国产3p露脸普| a片永久av网站在线观看 | 午夜福利精品视频在线观看 | 97久久超碰国 | 91精品国产高清久久久久久伦理片电影免费在线 | 国产av天堂亚洲国产av | 97国产精品人妻无码久久久 | 囯产精品一区二区三区中文字幕 | www视频被xxx色偷偷亚洲第一成人综合网址 | 91口爆吞精国产对白 | av无码国产永久播放蜜芽 | 丰满少妇销魂视频在线观看 | 国产1区2区3区4区 | 国产av电影区二区三区曰曰 | 91精品伊人久久久大香线蕉91 | 99精品国产自在现线10页 | 97福利视频精品第一导航 | WWW国产| 97日日碰人人模人人澡 | 91精品国产综合久久四虎久久无码一级 | 日韩av高清电影免费在线观看 | 97免费人妻在线观看 | av男人的天堂在线观 | 91麻豆国产福利在线观看 | 91国语精品福利自产拍 | av线上免费观看 | av―极品 | av永久天堂一区二 | 二区在线观看视频 | 国产91福利在线精 | 韩国性电影在线观看 | 99久久精品免费国产一区二区三区 | 91在线精品国产电影 | 91欧美激情一区二区三区 | 福利姬一区二 |