Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical 0-Click Vulnerability Enables Attackers to Takeover Email Access Using Punycode

Critical 0-Click Vulnerability Enables Attackers to Takeover Email Access Using Punycode

Posted on September 5, 2025September 5, 2025 By CWS

A vital, zero-click vulnerability that enables attackers to hijack on-line accounts by exploiting how net functions deal with worldwide electronic mail addresses.

The flaw, rooted in a technical discrepancy often called a “canonicalization mismatch,” impacts password reset and “magic hyperlink” login techniques, that are foundational to trendy net safety.

Based on NullSecurityX, the assault requires no interplay from the sufferer, making it exceptionally harmful. An attacker can acquire full management of an account just by requesting a password reset utilizing a specifically crafted electronic mail tackle that seems an identical to the sufferer’s.

This technique bypasses the necessity for phishing or tricking the consumer into clicking a malicious hyperlink.

The vulnerability stems from the interaction between Unicode, which permits for characters from numerous languages in domains (Internationalized Area Names or IDN), and Punycode, the system that converts these characters into the usual ASCII format utilized by web infrastructure.

0-Click on Vulnerability Utilizing Punycode

Attackers can register a website utilizing Unicode characters which can be visually indistinguishable from normal letters, akin to a Cyrillic ‘o’ as an alternative of a Latin ‘o’.

Based on a technical evaluation of the vulnerability, the assault unfolds when an internet utility’s backend processes a password reset request.

For instance, an attacker may request a password reset for “[email protected]” however submit the tackle utilizing a “full-width” ‘m’ (gmail.com).

The appliance’s front-end or validation logic might fail to differentiate between the respectable tackle and the visually confusable one, approving the request.

Nonetheless, when the e-mail system sends the reset hyperlink, it appropriately routes it to the attacker-controlled Punycode model of the area (e.g., xn--…). The attacker then receives the privileged hyperlink and takes over the account, whereas the respectable consumer stays fully unaware.

This “0-click” nature is what makes the risk so extreme. The compromise isn’t a results of consumer error however a basic flaw in how completely different layers of an utility, from the consumer interface and validation guidelines to the database and mail servers, deal with electronic mail addresses.

Every element might interpret the Unicode and Punycode variations otherwise, creating a spot that attackers can exploit, NullSecurityX stated.

“The result’s that two addresses that look the identical to people may be dealt with as completely different strings by the mail transport,” the analysis paper states.

Since electronic mail typically serves as the last word “belief anchor” for recovering entry to numerous different on-line companies, a compromise can have a cascading impact.

Consultants are urging builders to right away evaluate and fortify their authentication techniques. Mitigation requires implementing constant normalization of electronic mail addresses throughout all system elements, utilizing strong validation libraries that perceive Unicode confusables, and guaranteeing that database lookups are usually not inclined to those visible tips.

This silent however potent risk highlights the necessity for a deeper, code-level understanding of how seemingly easy knowledge like an electronic mail tackle is processed and trusted.

Discover this Story Attention-grabbing! Comply with us on Google Information, LinkedIn, and X to Get Extra Prompt Updates.

Cyber Security News Tags:0click, Access, Attackers, Critical, Email, Enables, Punycode, Takeover, Vulnerability

Post navigation

Previous Post: Hackers Leverages Google Calendar APIs With Serverless MeetC2 Communication Framework
Next Post: North Korean Hackers Targeted Hundreds in Fake Job Interview Attacks

Related Posts

Stryker Faces Major Cyberattack by Iran-Linked Group Stryker Faces Major Cyberattack by Iran-Linked Group Cyber Security News
Hackers Can Leverage Delivery Receipts on WhatsApp and Signal to Extract User Private Information Hackers Can Leverage Delivery Receipts on WhatsApp and Signal to Extract User Private Information Cyber Security News
Hackers can Hijack Your Dash Cams in Seconds and Weaponize it for Future Attacks Hackers can Hijack Your Dash Cams in Seconds and Weaponize it for Future Attacks Cyber Security News
UNG0002 Actors Deploys Weaponize LNK Files Using ClickFix Fake CAPTCHA Verification Pages UNG0002 Actors Deploys Weaponize LNK Files Using ClickFix Fake CAPTCHA Verification Pages Cyber Security News
1-Click Oracle Cloud Code Editor RCE Vulnerability Lets Attackers Upload Malicious Files 1-Click Oracle Cloud Code Editor RCE Vulnerability Lets Attackers Upload Malicious Files Cyber Security News
Women’s Dating App Tea Exposes Selfie Images of 13,000 Users Women’s Dating App Tea Exposes Selfie Images of 13,000 Users Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Fragnesia Vulnerability Risks Root Access on Linux Systems
  • AI Hallucinations Pose New Security Challenges
  • Cyberattackers Exploit HWMonitor to Deploy Hidden RAT
  • Akamai to Acquire AI Security Firm LayerX for $205M
  • PraisonAI Security Flaw Exploited Within Hours

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Fragnesia Vulnerability Risks Root Access on Linux Systems
  • AI Hallucinations Pose New Security Challenges
  • Cyberattackers Exploit HWMonitor to Deploy Hidden RAT
  • Akamai to Acquire AI Security Firm LayerX for $205M
  • PraisonAI Security Flaw Exploited Within Hours

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark