Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New Clever Phishing Attack Uses Japanese Character “ん” to Mimic Forward Slash

Posted on August 15, 2025August 15, 2025 By CWS

Safety researchers have uncovered a complicated new phishing marketing campaign that exploits the Japanese hiragana character “ん” to create deceptively authentic-looking URLs that may idiot even vigilant web customers.

The assault, first recognized by safety researcher JAMESWT, targets explicitly prospects of the favored journey reserving platform Reserving.com.

The malicious method leverages the visible similarity between the Japanese character “ん” (Unicode U+3093) and the ahead slash (“/”) character in sure fonts and programs.

When rendered in net browsers, URLs containing this character can seem nearly an identical to professional subdirectory paths, creating an virtually excellent phantasm of authenticity.

How the Phishing Assault Works

The phishing marketing campaign makes use of URLs that look like professional Reserving[.]com addresses, resembling what seems like “https://account.reserving[.]com/element/restric-access.www-account-booking[.]com/en/”.

Nevertheless, upon nearer examination, the ahead slashes are literally changed with the Japanese “ん” character, making the actual vacation spot a totally totally different area: www-account-booking[.]com.

“This visible deception is especially harmful as a result of it bypasses conventional safety consciousness coaching,” explains a cybersecurity professional in an evaluation from current risk intelligence reviews. “Customers who’ve been taught to fastidiously study URLs should fall sufferer as a result of the spoofed handle seems professional at first look.”

In keeping with Cybersecuritynews.com evaluation with ANY.RUN sandbox reveals that the assault begins with phishing emails that direct victims to those disguised URLs.

As soon as customers click on by, they’re ultimately redirected to malicious websites that ship MSI installer recordsdata containing malware, doubtlessly together with info stealers and distant entry trojans.

This Reserving[.]com-focused marketing campaign represents the most recent evolution in homograph assaults, the place cybercriminals exploit visually comparable characters from totally different Unicode character units to deceive customers. The method builds on years of comparable assaults utilizing Cyrillic characters to imitate Latin letters in domains.

In keeping with the 2025 Phishing Traits Report, homograph assaults have develop into more and more subtle as cybercriminals search new methods to bypass e mail filters and safety instruments.

Using the Japanese “ん” character is especially intelligent as a result of it maintains visible consistency whereas circumventing many present detection programs.

Safety consultants suggest a number of protecting measures in opposition to these Unicode-based assaults. Customers ought to hover over hyperlinks earlier than clicking to disclose the precise vacation spot URL, although this method has limitations when coping with subtle character spoofing.

Trendy browsers like Chrome have carried out protections in opposition to many homograph assaults, however safety researchers emphasize that visible URL inspection alone is now not foolproof.

The simplest protection combines up to date safety software program, e mail filtering, and consumer schooling about these evolving assault vectors.

As phishing campaigns proceed to evolve, this Japanese character exploitation demonstrates how cybercriminals consistently adapt their methods to use even the smallest visible ambiguities in digital communication programs.

Enhance your SOC and assist your group shield your corporation with free top-notch risk intelligence: Request TI Lookup Premium Trial.

Cyber Security News Tags:Attack, Character, Clever, Japanese, Mimic, Phishing, Slash, ん

Post navigation

Previous Post: Privacy in the Age of Agentic AI
Next Post: U.S. Sanctions Garantex and Grinex Over $100M in Ransomware-Linked Illicit Crypto Transactions

Related Posts

New Android Malware Herodotus Mimic Human Behaviour to Bypass Biometrics Detection Cyber Security News
Underground Ransomware Gang With New Tactics Against Organizations Worldwide Cyber Security News
Real-Time Threat Intelligence for Proactive Cyber Defense in 2025 Cyber Security News
AI-powered Pentesting Tool ‘Villager’ Combines Kali Linux Tools with DeepSeek AI for Automated Attacks Cyber Security News
CISA Warns of Cisco Firewall 0-Day Vulnerabilities Actively Exploited in the Wild Cyber Security News
Palo Alto Networks to Acquire CyberArk in $25 Billion Deal Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Leveraging OSINT Tools for Enhanced Cybersecurity Threat Intelligence
  • Data Breach at Texas Gas Station Operator Exposes Info of 377,000+ Customers
  • MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors
  • Europol Arrests 34 Black Axe Members in Spain Over €5.9M Fraud and Organized Crime
  • New MacSync Stealer Uses Signed macOS App to Evade Gatekeeper and Steal Data

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Leveraging OSINT Tools for Enhanced Cybersecurity Threat Intelligence
  • Data Breach at Texas Gas Station Operator Exposes Info of 377,000+ Customers
  • MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors
  • Europol Arrests 34 Black Axe Members in Spain Over €5.9M Fraud and Organized Crime
  • New MacSync Stealer Uses Signed macOS App to Evade Gatekeeper and Steal Data

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark