Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
New Clever Phishing Attack Uses Japanese Character “ん” to Mimic Forward Slash

New Clever Phishing Attack Uses Japanese Character “ん” to Mimic Forward Slash

Posted on August 15, 2025August 15, 2025 By CWS

Safety researchers have uncovered a complicated new phishing marketing campaign that exploits the Japanese hiragana character “ん” to create deceptively authentic-looking URLs that may idiot even vigilant web customers.

The assault, first recognized by safety researcher JAMESWT, targets explicitly prospects of the favored journey reserving platform Reserving.com.

The malicious method leverages the visible similarity between the Japanese character “ん” (Unicode U+3093) and the ahead slash (“/”) character in sure fonts and programs.

When rendered in net browsers, URLs containing this character can seem nearly an identical to professional subdirectory paths, creating an virtually excellent phantasm of authenticity.

How the Phishing Assault Works

The phishing marketing campaign makes use of URLs that look like professional Reserving[.]com addresses, resembling what seems like “https://account.reserving[.]com/element/restric-access.www-account-booking[.]com/en/”.

Nevertheless, upon nearer examination, the ahead slashes are literally changed with the Japanese “ん” character, making the actual vacation spot a totally totally different area: www-account-booking[.]com.

“This visible deception is especially harmful as a result of it bypasses conventional safety consciousness coaching,” explains a cybersecurity professional in an evaluation from current risk intelligence reviews. “Customers who’ve been taught to fastidiously study URLs should fall sufferer as a result of the spoofed handle seems professional at first look.”

In keeping with Cybersecuritynews.com evaluation with ANY.RUN sandbox reveals that the assault begins with phishing emails that direct victims to those disguised URLs.

As soon as customers click on by, they’re ultimately redirected to malicious websites that ship MSI installer recordsdata containing malware, doubtlessly together with info stealers and distant entry trojans.

This Reserving[.]com-focused marketing campaign represents the most recent evolution in homograph assaults, the place cybercriminals exploit visually comparable characters from totally different Unicode character units to deceive customers. The method builds on years of comparable assaults utilizing Cyrillic characters to imitate Latin letters in domains.

In keeping with the 2025 Phishing Traits Report, homograph assaults have develop into more and more subtle as cybercriminals search new methods to bypass e mail filters and safety instruments.

Using the Japanese “ん” character is especially intelligent as a result of it maintains visible consistency whereas circumventing many present detection programs.

Safety consultants suggest a number of protecting measures in opposition to these Unicode-based assaults. Customers ought to hover over hyperlinks earlier than clicking to disclose the precise vacation spot URL, although this method has limitations when coping with subtle character spoofing.

Trendy browsers like Chrome have carried out protections in opposition to many homograph assaults, however safety researchers emphasize that visible URL inspection alone is now not foolproof.

The simplest protection combines up to date safety software program, e mail filtering, and consumer schooling about these evolving assault vectors.

As phishing campaigns proceed to evolve, this Japanese character exploitation demonstrates how cybercriminals consistently adapt their methods to use even the smallest visible ambiguities in digital communication programs.

Enhance your SOC and assist your group shield your corporation with free top-notch risk intelligence: Request TI Lookup Premium Trial.

Cyber Security News Tags:Attack, Character, Clever, Japanese, Mimic, Phishing, Slash, ん

Post navigation

Previous Post: Privacy in the Age of Agentic AI
Next Post: U.S. Sanctions Garantex and Grinex Over $100M in Ransomware-Linked Illicit Crypto Transactions

Related Posts

Dark Partners Hackers Group Wiping Crypto Wallets With Fake Ai Tools and VPN Services Dark Partners Hackers Group Wiping Crypto Wallets With Fake Ai Tools and VPN Services Cyber Security News
Microsoft January 2026 Security Update Causes Credential Prompt Failures in Remote Desktop Connections Microsoft January 2026 Security Update Causes Credential Prompt Failures in Remote Desktop Connections Cyber Security News
Scaling SOC Team Expertise With AI-powered Insights for Faster, Easier Understanding of Threats Scaling SOC Team Expertise With AI-powered Insights for Faster, Easier Understanding of Threats Cyber Security News
New Report Warns of 68% Of Actively Serving Phishing Kits Protected by CloudFlare New Report Warns of 68% Of Actively Serving Phishing Kits Protected by CloudFlare Cyber Security News
Quid Miner Launches Mobile App to Unlock in Daily Cloud Mining Income for BTC, DOGE, and XRP for Investors Quid Miner Launches Mobile App to Unlock in Daily Cloud Mining Income for BTC, DOGE, and XRP for Investors Cyber Security News
CISA Adds Digiever Authorization Vulnerability to KEV List Following Active Exploitation CISA Adds Digiever Authorization Vulnerability to KEV List Following Active Exploitation Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News