T 5.87 Web spoofing

Within the framework of web spoofing, an attacker forges an existing website, i.e. he designs one of his own websites in such a way that it looks like the website of a known organisation. The already existing website that was reproduced is not changed in so doing, but continues to be available in its genuine form. With the help of different tricks, the attacker then tries to lure users to the website he put on the web.

To do so, he may select its web address in such a way that a large number of users assume they are connected to a certain organisation simply because of the address they entered. For example, he may register a site where the host name is identical to the one of the original website, but where the top level domain was changed. However, he may also try to use an address containing frequent typing errors ("Typosquatting") and lure the users to the forged site this way.

Another possibility is to distribute manipulated links. Different character sets and similarly looking letters can be used in order to create deceptively authentic links. For example, figures looking like letters at the first glance or similar letters may be used. Along with the hardly discernible difference between "I" (capital "i") and "l" (lower case "L"), similarly looking letters may also be used. This, for example, includes the Latin and the Cyrillic writing style of the letter "a", which looks similar but is coded differently.

Users may also be provided with addresses not identical to those addresses the link would lead to. For example, the URL of the trustworthy site may be displayed although the link leads to a forged site by using a HTML link. Another option is to prefix the user name and the password to the site name in the URL. Users not familiar with this writing style assume that they are directed to the website specified as user name/password, although the actually used host name is contained significantly more towards the end of the URL.

Examples: