Abstract: Cybercriminals have become more adept at leveraging subtle differences in URLs to deceive people and, with that, phishing attacks have become one of the most subtle types of cyber threats, if not the most subtle. A particularly insidious variant is so-called homograph attacks which exploit the visual similarity of the characters from different scripts (for example, Latin, Cyrillic, and Greek) to craft a convincing domain name. However, these modifications, which use diacritic characters, almost negate the possibility of users being able to discriminate between legitimate and fraudulent URLs and result in credential theft, financial fraud, and malware distribution......
Keywords —Phishing attacks, homograph attacks, cybersecurity, URL modifications, Punycode conversion, browser security, social engineering, credential theft, cyber threats, AI-driven phishing detection
[1] Jang-Jaccard, J., & Nepal, S. (2014). A Survey Of Emerging Threats In Cybersecurity. Journal Of Computer And System Sciences, 80(5), 973-993.
[2] Sahoo, D., Liu, C., & Hoi, S. C. (2017). Malicious URL Detection Using Machine Learning: A Survey. Arxiv Preprint Arxiv:1701.07179.
[3] Nikiforakis, N., Maggi, F., Stringhini, G., Rafique, M. Z., Joosen, W., Kruegel, C., ... & Zanero, S. (2014, April). Stranger Danger: Exploring The Ecosystem Of Ad-Based Url Shortening Services. In Proceedings Of The 23rd International Conference On World Wide Web (Pp. 51-62).
[4] Alawida, M., Omolara, A. E., Abiodun, O. I., & Al-Rajab, M. (2022). A Deeper Look Into Cybersecurity Issues In The Wake Of Covid-19: A Survey. Journal Of King Saud University-Computer And Information Sciences, 34(10), 8176-8206.
[5] Aslan, Ö., Aktuğ, S. S., Ozkan-Okay, M., Yilmaz, A. A., & Akin, E. (2023). A Comprehensive Review Of Cyber Security Vulnerabilities, Threats, Attacks, And Solutions. Electronics, 12(6), 1333