Punycode phishers - All you need to know

I’m always saying that everyone can be successfully ‘phished’ and it’s mostly the result of being a hapless user rather than user stupidity. As a result it's not just the ability to prevent and detect threats through activity and behaviour monitoring that is key - but also being able to investigate and respond to a new attack technique comes up that is critical for organizations.

Currently in the news is a technique that has existed for some time - several browsers are being vulnerable - so you should check whether your users have been affected that you are not aware of.

Punycode phishing attacks

What is Punycode?

Initially characters for the domains of websites (DNS) were limited to ASCII characters. As that limitation does not fit worldwide needs the internationalization of domain names was introduced. This lead to a situation today where we can use urls like www.bücher.de and other non-ASCII characters to access websites. The standard is defined in RFC3490.

How does Punycode work?

The non-ASCII characters are only introduced at the “presentation” or “application layer”. This means you can type www.bücher.de into your browser, but your browser will translate the URL underneath into “www.xn--bcher-kva.de”.

Why can it be a security issue?

Unicode domains can be used for homograph attacks. This means that an attacker can register a domain which translates through punycode into a valid looking domain in the presentation layer like www.google.de but by replacing the e with a Cyrillic character which looks similar - U-0435 (Cyrillic small letter IE)

Most browsers have homograph protection mechanism built into them. Xudong Zheng, discovered that this protection fails on most browsers if every character is replaced by only using Cyrillic characters for example. He explained it in a blog post with a proof-of-concept page. He registered the URL https://www.xn--80ak6aa92e.com which looks like www.apple.com with a valid HTTPS certificate on Chrome and Firefox.

Your users might get tricked into visiting such a website and even if they check the URL it will look correct with a green checkbox for a valid https certificate. Your users might think it’s a legitimate website and provide credentials or disclose information.

What can organizations do to protect themselves?

First, validate if the browser version that you’re utilizing in your organization is affected and if your vendor of choice provides a patch. Check if you can find a configuration option in your browser where you can disable that the URL display name is translated into punycode (Internet Explorer and Safari don’t do it by default) so if your users are well educated they have a chance to detect the malicious act. Check your log data (web proxy data, DNS server data and endpoint web surfing activity) if there are suspicious urls which are starting with http://xn--*. However having said that not every xn--* URL is malicious - all legit internationalized domains will be shown as well. Watch out in particular for https connections, post events and “logins”. Add context to the punycode domains like resolving the domain name, enrich the IP addresses with location information to find malicious locations and cross correlate threat intelligence lists. The Forensic Investigator App is your friend to speed things up. You can also utilize Splunk Enterprise Security to add context with whois information - that allows you to find out malicious registrars or connections to newly registered domains.

Happy Splunking,

Best

Matthias

Related Articles

Predicting Cyber Fraud Through Real-World Events: Insights from Domain Registration Trends
Security
12 Minute Read

Predicting Cyber Fraud Through Real-World Events: Insights from Domain Registration Trends

By analyzing new domain registrations around major real-world events, researchers show how fraud campaigns take shape early, helping defenders spot threats before scams surface.
When Your Fraud Detection Tool Doubles as a Wellness Check: The Unexpected Intersection of Security and HR
Security
4 Minute Read

When Your Fraud Detection Tool Doubles as a Wellness Check: The Unexpected Intersection of Security and HR

Behavioral analytics can spot fraud and burnout. With UEBA built into Splunk ES Premier, one data set helps security and HR reduce risk, retain talent, faster.
Splunk Security Content for Threat Detection & Response: November Recap
Security
1 Minute Read

Splunk Security Content for Threat Detection & Response: November Recap

Discover Splunk's November security content updates, featuring enhanced Castle RAT threat detection, UAC bypass analytics, and deeper insights for validating detections on research.splunk.com.
Security Staff Picks To Read This Month, Handpicked by Splunk Experts
Security
2 Minute Read

Security Staff Picks To Read This Month, Handpicked by Splunk Experts

Our Splunk security experts share their favorite reads of the month so you can follow the most interesting, news-worthy, and innovative stories coming from the wide world of cybersecurity.
Behind the Walls: Techniques and Tactics in Castle RAT Client Malware
Security
10 Minute Read

Behind the Walls: Techniques and Tactics in Castle RAT Client Malware

Uncover CastleRAT malware's techniques (TTPs) and learn how to build Splunk detections using MITRE ATT&CK. Protect your network from this advanced RAT.
AI for Humans: A Beginner’s Field Guide
Security
12 Minute Read

AI for Humans: A Beginner’s Field Guide

Unlock AI with the our beginner's field guide. Demystify LLMs, Generative AI, and Agentic AI, exploring their evolution and critical cybersecurity applications.
Splunk Security Content for Threat Detection & Response: November 2025 Update
Security
5 Minute Read

Splunk Security Content for Threat Detection & Response: November 2025 Update

Learn about the latest security content from Splunk.
Operation Defend the North: What High-Pressure Cyber Exercises Teach Us About Resilience and How OneCisco Elevates It
Security
3 Minute Read

Operation Defend the North: What High-Pressure Cyber Exercises Teach Us About Resilience and How OneCisco Elevates It

The OneCisco approach is not about any single platform or toolset; it's about fusing visibility, analytics, and automation into a shared source of operational truth so that teams can act decisively, even in the fog of crisis.
Data Fit for a Sovereign: How to Consider Sovereignty in Your Digital Resilience Strategy
Security
5 Minute Read

Data Fit for a Sovereign: How to Consider Sovereignty in Your Digital Resilience Strategy

Explore how digital sovereignty shapes resilient strategies for European organisations. Learn how to balance control, compliance, and agility in your data infrastructure with Cisco and Splunk’s flexible, secure solutions for the AI era.