Post AWmz5G2ZkfStDDMyO0 by Palletack@vmst.io
(DIR) More posts by Palletack@vmst.io
(DIR) Post #AWmz5G2ZkfStDDMyO0 by Palletack@vmst.io
2023-06-17T17:18:28Z
0 likes, 3 repeats
(DIR) Post #AWnIu0KjoA0KOZmBPM by me@social.jlamothe.net
2023-06-17T17:33:43Z
0 likes, 0 repeats
@Palletack I know about this type of attack, and it took me a second to spot it.
(DIR) Post #AWnIu194n0GouhKNs0 by Palletack@vmst.io
2023-06-17T20:12:37Z
0 likes, 0 repeats
@me My general habit now is that I don't click on the link...but I go directly to the website if it's something I need to look in to.
(DIR) Post #AWnIuq8TD15Z3aR7VQ by figaro@mastodon.world
2023-06-17T18:25:36Z
0 likes, 0 repeats
@Palletack dude. If the email contents seemed legit I'd absolutely fall for this
(DIR) Post #AWnIuqvOH8DjVJKBl2 by fcktheworld587@social.linux.pizza
2023-06-17T21:02:47Z
0 likes, 0 repeats
@figaro @Palletack me too
(DIR) Post #AWnIyJ7rsdM9pyoAuu by drahardja@sfba.social
2023-06-17T21:00:29Z
0 likes, 0 repeats
@Palletack These “homograph attacks” are real and they are incredibly difficult to spot. Same goes with URLs that use capital Is in place of lowercase l, as in paypaI dot com (that’s a capital I).One way you can be sure that what you clicked on is legitimate is to look at the address bar after the link is loaded, where your browser will show Cyrillic characters in punycode. For the maybаnk2u example, the spoofed address looks like “xn--maybnk2u-46g” in your browser.