Spotting malicious URLs is a bit of an art. The examples represented here are some of the common tricks used by hackers and phishers to fool users into visiting malicious websites. The methods shown here could be used by legitimate services, but if you see one of these “tricks” you need to make sure you’re dealing with the organization you think you are.
Look-a-Alike Domains
Slight Misspellings
-
-
-
-
- Microsoftnline
<v5pz @ onmicrosoft . com> - www.llnked in.com
- Microsoftnline
-
-
-
Brand name in URL, but not real brand domain
-
-
-
-
- ee.microsoft.co.login-update-dec20.info
- www.paypal.com.bank/logon?user=johnsmith@gmail.com
- ww17.googlechromeupdates.com/
-
-
-
Brand name in email address but doesn’t match brand domain
-
-
-
-
- Bank of America
<BankofAmerica@customerloyalty.accounts.com>
- Bank of America
-
-
-
URL Domain Name Encoding
-
-
- https://%77%77%77.%6B%6E%6F%77%62%654.%63%6F%6D
-
Shortened URLs
-
-
- When clicking on a shortened URL, watch out for malicious redirection. https://bit.ly/2SnA7Fnm
-
Domain Mismatches
-
-
- Human Services.gov
<Despina.Orrantia6731610@gmx.com>
https://www.le-blog-qui-assure.com/
- Human Services.gov
-
Strange Originating Domains
-
-
- MAERSK
<info@onlinealxex.com.pl>
- MAERSK
-
Open Redirectors
URLs which have hidden links to completely different web sites at the end.
-
-
- t-info.mail.adobe.com/r/?id=hc347a&p1=evilwebsite .com
-