The "rn" vs. "m" Illusion: Hacking the Human Eye
Category: Identity Security / Social Engineering / Phishing
The current campaign, flagged by security researchers this week, is targeting massive brands like Microsoft and Marriott. The "hook" is simple: the lowercase letters "r" and "n" when placed together (rn) look nearly identical to the lowercase letter "m" in many common digital fonts (like Arial, Helvetica, or Segoe UI).
The Technical Deep Dive: Why It Works
This isn't a bug in the code; it's a "feature" of Kerning—the space between characters in a font.
Font Rendering: In modern web browsers and mobile devices, fonts are optimized for readability. When "r" and "n" are placed next to each other, the "shoulder" of the r often blends into the first "stem" of the n.
The Result:
rnarriottinternational.combecomesmarriottinternational.comto the casual observer.The Mobile Trap: On small smartphone screens, the resolution and font size make this distinction mathematically impossible for the human eye to catch at a glance.
The Attack Chain: From "rn" to Account Takeover
Domain Hunting: Attackers use tools like DNSDumpster to find high-traffic domains with an "m".
Registration: They register the "rn" version (e.g.,
rnicrosoft.com) through privacy-focused registrars, often paying in cryptocurrency to remain anonymous.The Phishing Kit: They deploy a "Phishing-as-a-Service" kit (like the recently tracked RaccoonO365). These kits automatically clone the real website’s CSS and HTML.
Bypassing Filters: To bypass email scanners, they use ZLOGS (Zero-day Link Obfuscation) or hide the link behind a legitimate service like a Microsoft Forms or SharePoint page.
The Payload: The victim enters their credentials. The kit even supports MFA-Interception, prompting the user for their 2FA code and immediately using it to log in on the real site in the background (Adversary-in-the-Middle).
Technical Indicators of Compromise (IOCs)
Security researchers have identified several active domains currently being used for credential harvesting and Adversary-in-the-Middle (AiTM) attacks.
| Impersonated Brand | Malicious Phishing Domain | Typosquatting Technique |
| Microsoft 365 | rnicrosoft.com | m $\rightarrow$ rn |
| Marriott Intl. | rnarriottinternational.com | m $\rightarrow$ rn |
| Marriott Hotels | rnarriotthotels.com | m $\rightarrow$ rn |
| Microsoft | micros0ft.com | o $\rightarrow$ 0 (Zero) |
| Microsoft | rnicrosoft-login.com | m $\rightarrow$ rn + Suffix |
Associated IP Patterns & TTPs:
Hosting: Frequently hosted on Cloudflare or Namecheap to mask the true origin IP.
MFA Bypass: These domains often use the Tycoon2FA or RaccoonO365 phishing kits, which can intercept MFA codes in real-time.
Email Sender:
security-noreply@rnicrosoft.comorbookings@rnarriotthotels.com.
SOC Monitoring Strategy: What Analysts Must Look For
For a SOC team, detecting these attacks requires moving beyond basic URL filtering. The goal is to detect the "Visual Deception" before the user enters their credentials.
SIEM Search Queries (The "rn" Regex): Analysts should run regex searches on DNS logs and Email Gateway logs.
Regex Example:
.*rn.*inside common brand strings.Logic: Flag any domain where
rnexists in a position where the company usually has anm.
DNS Anomaly Detection: Monitor for newly registered domains (less than 30 days old) that have a high Levenshtein Distance (similarity) to your protected brand names.
Email Header & "Reply-To" Inspection: Check if the Display Name is "Microsoft Security" but the From address is
alert@rnicrosoft.com.Behavioral Red Flags (The AiTM Pattern): Alert on Impossible Travel—e.g., a user logs in from their home IP, and 5 minutes later, a session token for the same user is seen from a known hosting provider IP.
ZyberWalls Analysis: The "Semantic Backdoor"
At ZyberWalls, we view this as a Trust Failure. The industry has spent billions on "Zero Trust" architecture, but we still trust our own eyes—and our eyes are easily deceived.
The Reality Check: A hacker doesn't need to find a 0-day vulnerability in Microsoft's servers if they can find a 0-day vulnerability in your perception. This campaign is particularly dangerous because the emails mimic "Urgent Security Alerts," which trigger an emotional response that lowers our guard.
The "Safe-Sight" Checklist: How to Spot the Trick
The "Hover" Test: On a desktop, hover your mouse over any link and look at the status bar at the very bottom.
Password Manager Defense: Managers like Bitwarden or 1Password look at the actual encoded domain. If it won't auto-fill, it's a trap.
The Manual Entry Rule: Never click "Login" from an email. Always type the official website manually into your browser.
Look for Punycode: If you see
xn--in a URL, it is a 100% confirmation of an attack.
Stay Alert. Stay Human. Stay Safe. — ZyberWalls Research Team

Comments
Post a Comment