Booking.com Phishing Campaign Uses Unicode Character "ん" to Trick Users

Attackers are exploiting a special Unicode character to create phishing links that look like the official Booking.com links in a new campaign to distribute malware. This attack uses the Japanese hiragana character "ん", which can appear as a slash on some systems, making the phishing URL seem legitimate to users at a glance.

Homoglyph Attack Technique

This attack, first discovered by security researcher JAMESWT, takes advantage of the Japanese hiragana character "ん" (Unicode U+3093), which resembles the Latin character sequence '/n' or '/~' in some fonts. This visual similarity allows scammers to create URLs that appear to belong to the official Booking.com domain but actually lead users to a malicious website.

Copy of phishing email shared by security researcher JamesWt

This technique is a type of homoglyph attack—using characters that look similar but belong to different character sets or alphabets. For example, the Cyrillic character "О" (U+041E) can appear identical to the Latin letter "O" (U+004F) to humans, but they are different characters.

In the phishing email shared by the researcher, the text appears as "https://admin.booking.com/hotel/hoteladmin/..."** which seems like the real Booking.com address, but the actual link points to:

Phishing page as it appears in a web browser

texthttps://account.booking.comんdetailんrestric-access.www-account-booking.com/en/

How Malware Works and Is Distributed

When displayed in a web browser's address bar, the characters "ん" can trick users into thinking they are navigating through a subdirectory of booking.com. In reality, the registered domain is actually www-account-booking[.]com, a fake malicious website, and everything before that is just a string of deceptive subdomains.

Victims who click the link are redirected to a malicious MSI file from a CDN link. The MSI file is used to drop further payloads, which may include an infostealer or a remote access trojan. Samples of the malicious website are available on MalwareBazaar by abuse.ch, with any.run analysis showing the infection chain.

Unicode attacks are becoming more sophisticated. According to research from Juniper Threat Labs, a new JavaScript obfuscation technique using invisible Unicode characters is being used in phishing attacks targeting branches of a US political action committee.

This technique exploits invisible Unicode characters, specifically Hangul half-width (U+FFA0) and Hangul full-width (U+3164), to hide malicious JavaScript code in white space. These attacks are highly personalized, include non-public information, and use anti-debugging measures to evade analysis.

Phishing Statistics and Economic Impact 2025

Phishing has become a leading threat with alarming numbers:

Attack Volume: An estimated 3.4 billion phishing emails are sent daily, accounting for 1.2% of global email traffic. APWG detected over 1 million unique phishing attack websites in just the first quarter of 2025.

Financial Impact: The average cost of a data breach involving phishing is about $4.88 million. In 2024, consumers reported losses exceeding $12.5 billion due to email scams, a 25% increase from the previous year.

Success Rate: Phishing is the starting point for 36% of all data breaches, making it the most reliable method for attackers to gain an initial foothold in a target network.

Impact of AI on Phishing

The advent of generative AI has revolutionized phishing. Since the launch of ChatGPT in late 2022, the volume of phishing emails has increased by 1,265%. AI enables attackers to create emails with perfect grammar, contextual awareness, and high persuasiveness that are almost indistinguishable from legitimate communications.

According to an IBM experiment, AI can build a sophisticated phishing campaign in just 5 minutes using 5 prompts, while a team of human experts takes 16 hours to complete the same task. Currently, AI-generated content is used in 82.6% of phishing emails.

Similar Intuit Phishing Campaign

BleepingComputer also discovered a separate phishing campaign targeting users with Intuit-themed emails. These emails use domains starting with "Lntuit" - something that, when written in lowercase, can resemble "intuit" in certain fonts.

Intuit phishing email on mobile

The unusually narrow layout of this email suggests it is primarily designed for mobile viewing, with attackers betting that mobile users will click on the phishing link without checking carefully.

ClickFix Attack Trend

According to research from Cofense Intelligence, fake Booking.com campaigns have surged, with 47% of the total campaign volume occurring in March 2025 alone. These campaigns use the ClickFix technique, where users are tricked into performing "verification" steps that include copying and executing a script via Windows shortcuts.

Analysis shows that 75% of campaigns using fake CAPTCHA employ the fake Booking.com template, while 64% deliver RATs (Remote Access Trojans) and 47% distribute information stealers. XWorm RAT accounts for 53% of the total threat activity reports in these campaigns.

Targeted Industries

According to statistics from EasyDMARC, the most targeted industries in 2024 include:

  • Software and IT services: 26% of phishing attacks

  • Education: 8.62%

  • Financial services: 6.13%

The IT industry faces greater risks due to its critical role in infrastructure and access to valuable data.

Comprehensive Prevention Measures

Email and DNS Authentication

Implement email authentication protocols: Use SPF, DKIM, and DMARC to verify emails sent from your domain. DMARC allows email recipients to determine if the message is truly from the sender.

Enable DNSSEC: DNS Security Extensions help prevent DNS spoofing attacks by verifying the integrity of DNS records.

Domain Monitoring

Monitor similar domains: Proactively register common typos, alternative TLDs, and homograph variations of your organization's domain. Use domain monitoring tools or threat intelligence feeds to detect new registrations similar to your domain.

Education and Training

User awareness training: Conduct regular training sessions for employees to help them recognize phishing attempts and other spoofing tactics. Train users to identify suspicious emails, including poor grammar, urgent requests for sensitive information, or unfamiliar sender addresses.Giải Pháp Công Nghệ

Implement advanced email filtering: Use advanced email filtering solutions to detect and block phishing emails, especially those attempting to spoof domains. Anti-phishing tools leverage machine learning and real-time threat intelligence to analyze email content, sender reputation, and embedded links.

Use dedicated security tools: Specialized software and hardware like email security gateways and advanced threat protection software perform incoming message analysis to identify anomalies and block suspicious spoofed messages.

Testing and Monitoring

Conduct regular security assessments: Provide periodic evaluations of security posture through comprehensive assessments, including reviews of email system vulnerabilities, security protocol evaluations, and continuous adherence to best practices.

Continuous monitoring: Regularly monitor your domain registrations and DNS records to detect unauthorized changes. Periodic checks of these records can quickly alert you to potential security breaches before they become actual spoofing incidents.

Browser Configuration

Enable Punycode display: For Firefox users, type "about:config" in the address bar, search for "network.IDN_show_puny_code," and set the value to true to display Punycode instead of ASCII. Chrome has addressed this issue since version 58.

Use a password manager: If you are on a Unicode domain, the password manager will not be fooled and will not fill in login information in the fields. When this happens, it is a major warning sign about the site you are visiting.

Conclusion

Homoglyph attacks using Unicode characters like "ん" represent an increasingly sophisticated threat in the current phishing landscape. With the rise of AI and new obfuscation techniques, defense requires a multi-layered approach combining technology, education, and continuous monitoring.

These incidents serve as a reminder that attackers will continue to find creative ways to exploit typography for social engineering. Visually checking URLs is no longer reliable enough, requiring organizations to invest in comprehensive security solutions and raise awareness of these new threats.


References

  1. BleepingComputer: Booking.com phishing campaign uses sneaky 'ん' character to trick you

  2. Mesh Security: Homoglyph Email Attacks: Understanding and Mitigating the Threat

  3. Infosecurity Magazine: Phishing Campaign Uses Fake Booking.com Emails to Deliver Malware

  4. Cofense: ClickFix Campaign Spoofs Booking.com for Malware Delivery

  5. Deepstrike: Phishing Statistics 2025: AI, Behavior & $4.88M Breach Costs

  6. EasyDMARC: Global Phishing Statistics, Trends, and Insights

  7. SentinelOne: Domain Spoofing: Definition, Impact, and Prevention

  8. CyCognito: How Domain Spoofing Works and 8 Ways to Prevent It

  9. TechMagic: Phishing Statistics in 2025: The Ultimate Insight

0
Subscribe to my newsletter

Read articles from Đinh Văn Mạnh directly inside your inbox. Subscribe to the newsletter, and don't miss out.

Written by

Đinh Văn Mạnh
Đinh Văn Mạnh