Red Flags of Malicious URLs

Published On: November 2nd, 2021Categories: Business Technology, Cyber Security, Tech Tips

Spotting malicious URLs is a bit of an art. We have put together some of the common tricks used by hackers and phishers to fool users into visiting malicious websites. The methods shown here could be used by legitimate services, but if you see one of these “tricks” you need to make sure you’re dealing with the organization you think you are.

Look-a-Alike Domains
Domain names that seem to belong to respected, trusted brands.

  • Slight Misspellings
    • Microsoftnline
      <v5pz @ onmicrosoft . com>
    • www . l l nked in . co m
  • Brand name in URL, but not real brand domain
    • ee . microsoft . co . login-update-dec20 . info
    • www . paypal . com . bank / logon? user= johnsmith @ gmail . com
    • ww17 . googlechromeupdates . com/
  • Brand name in email address but doesn’t match brand domain
    • Bank of America
      <BankofAmerica @ customerloyalty . accounts . com>
  • Brand name is in URL but not part of the domain name
    • devopsnw . com / login.microsoftonline . com?userid=johnsmith

URL Domain Name Encoding

  • https :// %77%77%77.%6B%6E%6F%77%62%654.%63%6F%6D

Shortened URLs
When clicking on a shortened URL, watch out for malicious redirection.

  • https : // bit . ly / 2SnA7Fnm

Domain Mismatches

  • Human Services .gov
    <Despina . Orrantia6731610 @ gmx . com>
  • https : // www . le-blog-qui-assure . com/

Strange Originating Domains

  • MAERSK
    <info @ onlinealxex . com . pl>

Overly Long URLs
URLs with 100 or more characters in order to obscure the true domain.

  • http : // innocent website . com/irs . gov/logon / fasdjkg – sajdkjndfjnbkasldjfbkajsdbfkjbasdf/adsnfjksdngkfdfgfgjhfgd/ght.php

File Attachment is an Image/Link
It looks like a file attachment, but is really ani mage file with a malicious URL.

  • https : //d. pr/free/f/jsaeoc – Click or tap to follow link.

Open Redirectors
URLs which have hidden links to completely different websites at the end.

  • t-info . mail . adobe.com /r/ ?id=hc347a&p1=evilwebsite .com

Share This Story, Choose Your Platform!

About the Author: Eric Vicencio

Eric began his career in healthcare, and he has been working in the IT field since 2006 when he graduated from Northern Illinois University. Eric specializes in Infrastructure, SQL and compliance: Licensing, HIPAA, GLBA and PCI.