expel-blog / customer-context-beware-the-homoglyph.json
intertwine-expel's picture
Upload blog post json files
bb62fc3
raw
history blame
5.81 kB
{
"title": "Customer context: beware the homoglyph",
"url": "https://expel.com/blog/customer-context-beware-the-homoglyph/",
"date": "1 day ago",
"contents": "Subscribe \u00d7 EXPEL BLOG Customer context: beware the homoglyph Security operations \u00b7 3 MIN READ \u00b7 PAUL LAWRENCE AND ROGER STUDNER \u00b7 MAY 16, 2023 \u00b7 TAGS: MDR This type of phishing attack can be ridiculously sneaky We love when our customers run red team engagements. Aside from testing and validating current security controls, detections, and response capabilities, we see it as a great opportunity to partner with our customers on areas of improvement. Here\u2019s the story of how a red team helped Expel improve our phishing service and how we used our platform capabilities to detect some sneaky activity. So, what happened? Our client\u2014let\u2019s call them Acme Corp\u2014had an enterprising red teamer with a clever idea. For one of their exercises, the red team purchased a domain: \u1ea1cmehome[.]com. Notice anything odd? Let\u2019s look closer: \u1ea1cmehome[.]com vs acmehome[.]com If you missed it, don\u2019t feel bad. That\u2019s the point. A bit of background The problem is that the \u201ca\u201d isn\u2019t an \u201ca\u201d at all, but an \u201c\u1ea1.\u201d It\u2019s a homoglyph \u2014\u201done of two or more graphemes, characters, or glyphs with shapes that appear identical or very similar but may have differing meaning.\u201d This one specifically is a Vietnamese particle used \u201cat the end of the sentence to express respect.\u201d Fast Company called homoglyph attacks (aka homography or Punycode attacks) one of the four most intriguing cyberattacks of 2022 . [They\u2019re] a type of phishing scam where adversaries create fake domain names that look like legitimate names by abusing International Domain Names that contain one or more non-ASCII characters. In other words, hackers discovered at some point that a lot of alphabets, like the Cyrillic and Russian alphabets, have characters that look like English or what we call Latin English. So, a Cyrillic \u201ca\u201d will be different from a Latin English \u201ca,\u201d but when these characters are used in domain names, they are indistinguishable to the naked eye. This allows phishers to spoof brand names and create look-alike domains which can be displayed in browser address bars if IDN display is enabled. There are lots of homoglyphs and the potential for mischief is off the hook (which is why top-level domain registries and browser designers are exploring ways to minimize the risks of h\u00f5m\u00f2gI\u00ffph\u00ec\u010d ch\u00e4\u00f4s). There\u2019s even a homoglyph \u201cattack ge\u00f1erator.\u201d This app is meant to make it easier to generate homographs based on homoglyphs than having to search for a look-a-like character in Unicode, then copying and pasting. Please use only for legitimate pen-test purposes and user awareness training. [emphasis added] Back to Acme. The red team\u2019s fake domain used the Vietnamese homoglyph to trick users into thinking it\u2019s the actual domain\u2014in this case, acmehome[.]com\u2014when that itty-bitty dot under the \u201ca\u201d makes a huge difference. The tactic also relies on a security operations center (SOC) analyst who\u2019s been staring at mind-numbing alerts slipping up and not noticing the difference in domain names. In truth, for most SOCs and attackers, this isn\u2019t a bad strategy. What we did After meeting with the red teamers, we uncovered a need to better scrutinize unique domains within emails that could intentionally trick the naked eye. Technology to the rescue. Since we have a content-driven platform capability\u2014customer context (CCTX)\u2014Expel was easily able to change the platform behavior to recognize the attack for that homoglyph site in Acme\u2019s Workbench\u2122. Having a platform that\u2019s content-driven means Expel users can change how the platform operates without having to engage with engineering teams to release new features. NOTE: When you have a platform that allows users to drive content and configuration, it means that once you understand how a feature works, you can bring your own creativity to solving problems. It\u2019s really fun when you\u2019re able to adapt a feature (especially if it allows for \u200crapid response to new or emerging techniques) to accomplish something unanticipated during the design of the feature\u2014which is what happened in this case. The result? Acme Corp\u2019s red team conducted a similar attack again, and this time the SOC caught it with CCTX. What does it all mean? Multiple things, possibly. First, homoglyphs represent a technique that SOCs need to account for. Second, there are branding reasons (as well as security ones) to sort homoglyph usage. While most businesses with accents and other homoglyphs in their names (Soci\u00e9t\u00e9 G\u00e9n\u00e9rale, A.P. M\u00f8ller-M\u00e6rsk, and Nestl\u00e9 come to mind), they typically use unaccented letters in their URLs. Would an analyst notice if a phishing attack used the homoglyph? Or, if the accented URL works (for example, lor\u00e9al.com), what if hackers put a different accent into play (\u00e8 vs \u00e9)? Third, this potentially matters even more for companies in nations whose languages employ \u200cextended iconography (this includes most non-English-speaking countries). Which means it matters more for cybersecurity firms serving them. Like us. Short version: homoglyph attacks are prevalent and sneaky. They pose particular challenges for human analysts, but as our Acme Corp case demonstrates, the combination of well-placed automation and humans leads to great results. If you have questions, or \u200cthink your organization might be at risk, drop us a line ."
}