Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Critical 0-Click Vulnerability Enables Attackers to Takeover Email Access Using Punycode

Posted on September 5, 2025September 5, 2025 By CWS

A vital, zero-click vulnerability that enables attackers to hijack on-line accounts by exploiting how net functions deal with worldwide electronic mail addresses.

The flaw, rooted in a technical discrepancy often called a “canonicalization mismatch,” impacts password reset and “magic hyperlink” login techniques, that are foundational to trendy net safety.

Based on NullSecurityX, the assault requires no interplay from the sufferer, making it exceptionally harmful. An attacker can acquire full management of an account just by requesting a password reset utilizing a specifically crafted electronic mail tackle that seems an identical to the sufferer’s.

This technique bypasses the necessity for phishing or tricking the consumer into clicking a malicious hyperlink.

The vulnerability stems from the interaction between Unicode, which permits for characters from numerous languages in domains (Internationalized Area Names or IDN), and Punycode, the system that converts these characters into the usual ASCII format utilized by web infrastructure.

0-Click on Vulnerability Utilizing Punycode

Attackers can register a website utilizing Unicode characters which can be visually indistinguishable from normal letters, akin to a Cyrillic ‘o’ as an alternative of a Latin ‘o’.

Based on a technical evaluation of the vulnerability, the assault unfolds when an internet utility’s backend processes a password reset request.

For instance, an attacker may request a password reset for “[email protected]” however submit the tackle utilizing a “full-width” ‘m’ (gmail.com).

The appliance’s front-end or validation logic might fail to differentiate between the respectable tackle and the visually confusable one, approving the request.

Nonetheless, when the e-mail system sends the reset hyperlink, it appropriately routes it to the attacker-controlled Punycode model of the area (e.g., xn--…). The attacker then receives the privileged hyperlink and takes over the account, whereas the respectable consumer stays fully unaware.

This “0-click” nature is what makes the risk so extreme. The compromise isn’t a results of consumer error however a basic flaw in how completely different layers of an utility, from the consumer interface and validation guidelines to the database and mail servers, deal with electronic mail addresses.

Every element might interpret the Unicode and Punycode variations otherwise, creating a spot that attackers can exploit, NullSecurityX stated.

“The result’s that two addresses that look the identical to people may be dealt with as completely different strings by the mail transport,” the analysis paper states.

Since electronic mail typically serves as the last word “belief anchor” for recovering entry to numerous different on-line companies, a compromise can have a cascading impact.

Consultants are urging builders to right away evaluate and fortify their authentication techniques. Mitigation requires implementing constant normalization of electronic mail addresses throughout all system elements, utilizing strong validation libraries that perceive Unicode confusables, and guaranteeing that database lookups are usually not inclined to those visible tips.

This silent however potent risk highlights the necessity for a deeper, code-level understanding of how seemingly easy knowledge like an electronic mail tackle is processed and trusted.

Discover this Story Attention-grabbing! Comply with us on Google Information, LinkedIn, and X to Get Extra Prompt Updates.

Cyber Security News Tags:0click, Access, Attackers, Critical, Email, Enables, Punycode, Takeover, Vulnerability

Post navigation

Previous Post: Hackers Leverages Google Calendar APIs With Serverless MeetC2 Communication Framework
Next Post: North Korean Hackers Targeted Hundreds in Fake Job Interview Attacks

Related Posts

Bluetooth Vulnerabilities Let Hackers Spy on Your Headphones and Earbuds Cyber Security News
Real-Time Threat Intelligence for Proactive Cyber Defense in 2025 Cyber Security News
New Web3 Phishing Attack Leverages Fake AI Platforms to Steal Usernames and Passwords Cyber Security News
CoinDCX Hacked – $44.2 million Wiped off From the Platform Cyber Security News
RingReaper Malware Attacking Linux Servers Evading EDR Solutions Cyber Security News
1inch rolls out expanded bug bounties with rewards up to $500K Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Noisy Bear Targets Kazakhstan Energy Sector With BarrelFire Phishing Campaign
  • “GPUGate” Malware Abuses Uses Google Ads and GitHub to Deliver Advanced Malware Payload
  • Malicious npm Packages Impersonate Flashbots, Steal Ethereum Wallet Keys
  • Kali Linux vs Parrot OS
  • How to Use Disposable Email Addresses

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Noisy Bear Targets Kazakhstan Energy Sector With BarrelFire Phishing Campaign
  • “GPUGate” Malware Abuses Uses Google Ads and GitHub to Deliver Advanced Malware Payload
  • Malicious npm Packages Impersonate Flashbots, Steal Ethereum Wallet Keys
  • Kali Linux vs Parrot OS
  • How to Use Disposable Email Addresses

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News