Security researchers have uncovered a sophisticated new phishing campaign that exploits the Japanese hiragana character “ん” to create deceptively authentic-looking URLs that can fool even vigilant internet users.
The attack, first identified by security researcher JAMESWT, represents a significant evolution in homograph attacks that leverage visual similarities between characters from different Unicode sets.
The malicious campaign leverages the visual similarity between the Japanese character “ん” (Unicode U+3093) and the forward slash (“/”) character in certain fonts and browser rendering systems.
When displayed in web browsers, URLs containing this character can appear virtually identical to legitimate subdirectory paths, creating an almost perfect illusion of authenticity that bypasses traditional security awareness training.
Phishing attacks are a form of cybercrime where perpetrators attempt to trick users into divulging critical information by posing as reliable entities in electronic communications.
This particular campaign targets customers of the popular travel booking platform Booking.com, using URLs that appear to be legitimate addresses but actually redirect victims to malicious domains.
How the Attack Operates
The phishing campaign uses URLs that superficially resemble legitimate Booking.com addresses. However, upon closer technical examination, the forward slashes are actually replaced with the Japanese “ん” character, making the real destination a completely different malicious domain.

This visual deception is particularly dangerous because it can fool users who have been trained to carefully examine URLs before clicking.
According to cybersecurity experts, these attacks typically begin with phishing emails that direct victims to the disguised URLs.
The sophisticated nature of modern phishing attempts makes them challenging for individuals to identify due to their increasing refinement.
Once users click through, they are eventually redirected to malicious sites that deliver MSI installer files containing malware, potentially including information stealers and remote access trojans.
This Booking.com-focused campaign represents the latest evolution in social engineering techniques that exploit human psychology and trust rather than technical vulnerabilities.
Phishing attacks differ from virus assaults since they depend on social engineering techniques instead of software weaknesses.
The use of the Japanese “ん” character is particularly clever because it maintains visual consistency while circumventing many existing detection systems.
Security experts recommend several protective measures against these Unicode-based attacks.
Users should verify the legitimacy of websites and emails before providing any personal information, looking for official domain names and proper grammar and spelling.
Being vigilant and knowledgeable is key to protecting against phishing attempts.
Additional protective measures include using updated anti-virus and anti-phishing software, implementing multi-factor authentication, and regularly updating passwords with strong, unique credentials for each account.
As phishing campaigns continue to evolve, this Japanese character exploitation demonstrates how cybercriminals constantly adapt their techniques to exploit even the smallest visual ambiguities in digital communication systems.
AWS Security Services: 10-Point Executive Checklist - Download for Free
Source link