Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Hackers Exploit RTL/LTR Scripts and Browser Gaps to Hide Malicious URLs

Posted on September 17, 2025September 18, 2025 By CWS

A decade-old Unicode vulnerability generally known as BiDi Swap permits attackers to spoof URLs for classy phishing assaults.

By exploiting how browsers render combined Proper-to-Left (RTL) and Left-to-Proper (LTR) language scripts, menace actors can craft URLs that seem professional however secretly redirect customers to malicious websites.

The BiDi Swap assault builds on prior Unicode manipulation strategies which have lengthy been a priority for net safety.

Previously, attackers used Punycode Homograph Assaults to register domains with non-Latin characters that look practically similar to Latin letters, creating convincing spoofs of widespread web sites.

One other frequent method was the RTL Override exploit, the place particular Unicode characters have been embedded in a file identify or URL to reverse the textual content path.

This might make a malicious executable file seem as a innocent doc, tricking customers into operating it.

These earlier assaults demonstrated how delicate flaws in textual content rendering may very well be exploited for malicious functions, paving the best way for extra superior strategies like BiDi Swap that abuse the basic logic of how browsers show net addresses.

How the BiDi Swap Assault Works

Internet browsers depend on the Unicode Bidirectional (BiDi) Algorithm to accurately show textual content containing each LTR scripts, equivalent to English, and RTL scripts, like Arabic or Hebrew.

Nevertheless, analysis from Varonis Risk Labs exhibits this algorithm has a essential weak spot when dealing with URLs that blend scripts throughout subdomains and parameters.

An attacker can exploit this by crafting a URL with a legitimate-looking LTR subdomain (e.g., paypal.com) adopted by an obscure RTL area.

As a result of browser’s flawed rendering, the professional subdomain is displayed as the first area within the handle bar, visually masking the true, malicious vacation spot.

This confuses the consumer, who believes they’re on a trusted website whereas their browser is definitely navigating to an attacker-controlled server, making them weak to phishing and knowledge theft.

The response from browser builders to this long-standing concern has been inconsistent. Google Chrome presents a “lookalike URL” suggestion function, but it surely solely flags a restricted variety of well-known domains, leaving many others uncovered.

Mozilla Firefox takes a greater strategy by visually highlighting the core a part of the area within the handle bar, which helps customers extra simply spot potential spoofs.

Whereas Microsoft marked the problem as resolved in its Edge browser, researchers be aware that the underlying vulnerability in URL illustration stays.

To remain protected, customers ought to domesticate a behavior of suspicion. At all times hover over hyperlinks to examine their true vacation spot earlier than clicking, fastidiously confirm a website’s SSL certificates, and be cautious of any URL that seems to combine totally different language scripts or comprises uncommon formatting.

Finally, enhanced consumer consciousness and improved browser-level defenses are important to neutralize this misleading menace.

Discover this Story Fascinating! Comply with us on Google Information, LinkedIn, and X to Get Extra Instantaneous Updates.

Cyber Security News Tags:Browser, Exploit, Gaps, Hackers, Hide, Malicious, RTLLTR, Scripts, URLs

Post navigation

Previous Post: Microsoft Dismantles 300+ Websites Used to Distribute RaccoonO365 Phishing Service
Next Post: Agentless Access, Sensitive Data Masking, and Smooth Session Playback

Related Posts

Encrypting Data to Meet Global Privacy Law Requirements Cyber Security News
PoisonSeed Phishing Kit Bypasses MFA to Acquire Credentials from Individuals and Organizations Cyber Security News
Telecommunications Companies in Spain Experiencing Downtime Cyber Security News
Chrome 140 Released With Fix For Six Vulnerabilities that Enable Remote Code Execution Attacks Cyber Security News
Microsoft VS Code Remote-SSH Extension Hacked to Execute Malicious Code on Developer’s Machine Cyber Security News
Cisco Secure Firewall Vulnerability Allows Hackers to Inject Remote Shell Command Injection Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • CISA Warns of Hackers Exploiting Ivanti Endpoint Manager Mobile Vulnerabilities to Deploy Malware
  • In Other News: 600k Hit by Healthcare Breaches, Major ShinyHunters Hacks, DeepSeek’s Coding Bias
  • SystemBC Powers REM Proxy With 1,500 Daily VPS Victims Across 80 C2 Servers
  • 17,500 Phishing Domains Target 316 Brands Across 74 Countries in Global PhaaS Surge
  • Turla and Gamaredon Working Together in Fresh Ukrainian Intrusions

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • CISA Warns of Hackers Exploiting Ivanti Endpoint Manager Mobile Vulnerabilities to Deploy Malware
  • In Other News: 600k Hit by Healthcare Breaches, Major ShinyHunters Hacks, DeepSeek’s Coding Bias
  • SystemBC Powers REM Proxy With 1,500 Daily VPS Victims Across 80 C2 Servers
  • 17,500 Phishing Domains Target 316 Brands Across 74 Countries in Global PhaaS Surge
  • Turla and Gamaredon Working Together in Fresh Ukrainian Intrusions

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News