Rogue URLs

Tags cyberaware

Spotting malicious URLs is a bit of an art. The examples represented here are some of the common tricks used by hackers and phishers to fool users into visiting malicious websites. The methods shown here could be used by legitimate services, but if you see one of these “tricks” you need to make sure you’re dealing with the organization you think you are.

Look-a-like Domains

Domain names which seem to belong to respected, trusted brands.

Slight Misspellings

Microsoftnline <v5pz@onmicrosoft.com>

Brand name in URL, but not real brand domain

ee.microsoft.co.login-update-dec20.info

www.paypal.com.bank/logon?user=johnsmith@gmail.com

ww17.googlechromeupdates.com/

Brand name is in URL but not part of the domain name

devopsnw.com/login.microsoftonline.com?userid=johnsmith

URL Domain Name Encoding

https://%77%77%77.%6B%6E%6F%77%62%654.%63%6F%6D

Shortened URLs

When clicking on a shortened URL, watch out for malicious redirection.

https://bit.ly/2SnA7Fnm

Domain Mismatches

Human Services .gov

<Despina.Orrantia6731610@gmx.com>

https://www.le-blog-qui-assure.com/

Strange Originating Domains

Maersk

<info@onlinealxex.com.pl>

Overly Long URLs

URLs with 100 or more characters in order to obscure the true domain.

http://innocentwebsite.com/irs.gov/logon/fasdjkg-sajdkjndfjnbkasldjfbkajsdbfkjbasdf/adsnfjksdngkfdfgfgjhfgd/ght.php

File Attachment is an Image/Link

It looks like a file attachment, but is really an image file with a malicious URL.

Open Redirectors

URLs which have hidden links to completely different web sites at the end.

t-info.mail.adobe.com/r/?id=hc347a&p1=evilwebsite.com

Details

Article ID: 117869
Created
Wed 10/7/20 4:47 PM
Modified
Tue 10/13/20 2:48 PM