RL Blog

Topics

All Blog PostsAppSec & Supply Chain SecurityDev & DevSecOpsProducts & TechnologySecurity OperationsThreat Research
Why RL Built Spectra Assure Community
April 14, 2026

Why RL Built Spectra Assure Community

We set out to help dev and AppSec teams secure the village: OSS dependencies, malware, more. Learn how.

Read More about Why RL Built Spectra Assure Community
Why RL Built Spectra Assure Community

Follow us

XX / TwitterLinkedInLinkedInFacebookFacebookInstagramInstagramYouTubeYouTubeblueskyBluesky

Subscribe

Get the best of RL Blog delivered to your in-box weekly. Stay up to date on key trends, analysis and best practices across threat intelligence and software supply chain security.

ReversingLabs: The More Powerful, Cost-Effective Alternative to VirusTotalSee Why
Skip to main content
Contact UsSupportLoginBlogCommunity
reversinglabsReversingLabs: Home
Solutions
Secure Software OnboardingSecure Build & ReleaseProtect Virtual MachinesIntegrate Safe Open SourceGo Beyond the SBOM
Increase Email Threat ResilienceDetect Malware in File Shares & StorageAdvanced Malware Analysis SuiteICAP Enabled Solutions
Scalable File AnalysisHigh-Fidelity Threat IntelligenceCurated Ransomware FeedAutomate Malware Analysis Workflows
Products & Technology
Spectra Assure®Software Supply Chain SecuritySpectra DetectHigh-Speed, High-Volume, Large File AnalysisSpectra AnalyzeIn-Depth Malware Analysis & Hunting for the SOCSpectra IntelligenceAuthoritative Reputation Data & Intelligence
Spectra CoreIntegrations
Industry
Energy & UtilitiesFinanceHealthcareHigh TechPublic Sector
Partners
Become a PartnerValue-Added PartnersTechnology PartnersMarketplacesOEM Partners
Alliances
Resources
BlogContent LibraryCybersecurity GlossaryConversingLabs PodcastEvents & WebinarsLearning with ReversingLabsWeekly Insights Newsletter
Customer StoriesDemo VideosDocumentationOpenSource YARA Rules
Company
About UsLeadershipCareersSeries B Investment
EventsRL at RSAC
Press ReleasesIn the News
Pricing
Software Supply Chain SecurityMalware Analysis and Threat Hunting
Request a demo
Menu
Threat ResearchJuly 16, 2019

Catching deceptive links before the click

Blog 1 of 5 part series on advanced research into modern phishing attacks

Tomislav Pericin headshot
Tomislav Peričin, Chief Software Architect & Co-Founder at ReversingLabsTomislav Peričin
FacebookFacebookXX / TwitterLinkedInLinkedInblueskyBlueskyEmail Us
Catching deceptive links before the click

Email-based attacks are a nightmare personified for every defender out there. The average organization receives thousands upon thousands of email messages carrying attachments and links every day. Each of those emails has the potential of being malicious, and any could slip by the existing array of defenses. And all those that do slip have but one purpose: to trick a single person into clicking a link that carries out a nefarious task.

Sometimes, all it takes is one person and one click. Once the attackers get it, they can redirect the link target to a credentials phishing page or a malicious file download.

It's very easy for a tech-savvy person to scoff and claim they would never be tricked in such a way. However, the number of these types of attacks is increasing, and they are always evolving. Each iteration is getting progressively harder to catch by simply glancing over the link. “Think before you click” might well be a thing of the past for some of the more sophisticated attacks out there.

To understand why, let's explore what some of those attacks looked like, and what they’ve evolved into.

Link typosquat: Variant A

https://www.yuotube.com/channel/UXDDSh98klsd9Lz9tDtzTW?view_as=subscriber

URL analysis tags: [ #uri-domain-typosquat ]

Typosquatting is probably the oldest trick in the book when it comes to deceiving the user into thinking they are visiting a trusted website. It's a simple letter rearrangement attack that relies on the lack of user attention. Unsuspecting users can be tricked into visiting a rogue website and potentially expose their credentials through a convincing phishing page

Link typosquat: Variant B

https://cdn.stubdownloader.services.moziIa.com/builds/firefox-stub/en-US/FirefoxInstaller.exe

URL analysis tags: [ #uri-domain-typosquat, #uri-interesting-file ]

Some typosquatting attacks are harder to detect than others. A missing letter can be just as hard to spot as letter rearrangement. In this case, the deceptive link doesn't lead to a phishing page. Instead, it directly links to a malicious payload that will infect the user if downloaded. Given it looks like a browser installation link, the likelihood of it being executed increases drastically.

Deceptive file extension

https://cdn.users-imgur.com/r/gifs/6VbcKzO.gif.exe?client=firefox-b-d&q=image&data=exclusive

URL analysis tags: [ #uri-domain-spoofed, #uri-deceptive-file ]

Multiple file extensions are extremely hard for users to decipher. Most of the time, users skip to the first thing they recognize and act on it. Dual extensions, combined with long file names, play on the lack of expertise and hope to trick users into downloading and executing malicious content. Deceptive file extensions are typically coupled with misleading file icons, increasing the odds of a successful attack.

Trusted domain spoofing

https://www.google.com-amp-accounts.net/security/login.php

URL analysis tags: [ #uri-domain-spoofed ]

Attacks evolve as defenders improve their detection mechanisms. Trusted domains recently became even harder to recognize. This example is particularly hard to recognize, as it's using a trusted domain as a sub-domain for the domain highlighted in red. Since it's just a sub-domain, the attacker has the option of getting a valid certificate for it, resulting in a green lock icon next to the address in the browser window. This makes it next to impossible for the user to discern a rogue from a legitimate website.

Trusted link path spoofing

https://google.enterprise-login.com/signin/v2/identifier

URL analysis tags: [ #uri-path-spoofed ]

Habits are a funny thing. When users are conditioned to see a set of characters together every day, a sense of familiarity is formed. Just glancing over the link triggers this sense, and allows the deception to fly under the radar. Known login paths, like the one above, are perfect for such phishing attacks. Seeing them on unexpected domains is always a cause for alarm.

Trusted domain homoglyphs

https://accounts.gọọgle.com/servicelogin

URL analysis tags: [ #uri-domain-homoglyph ]

Perhaps the most difficult attack to detect by inspecting the link itself, homoglyph attacks are the latest trick in the attacker’s playbook. They became popular fairly recently when IANA (Internet Assigned Numbers Authority) opened up the Web to Unicode domain name registration. That made it possible to set up typosquat attacks that vary from hard to genuinely impossible to spot. The example above uses non-English alphabet to mask the letter “O” behind something that looks a lot like an “O”. Since the Unicode alphabet is quite large, the potential for these kinds of attacks is almost unlimited. That makes it the attacker’s new favorite toy.

Deception is at the core of most email phishing attacks. It relies on an ever-increasing number of ways the user can be misled into visiting a deceptive link. Because some of those deceptive links are impossible to spot with a naked eye, ReversingLabs has expanded its Titanium Platform with the capability to detect them.

Every example listed above - and many more alongside them - can be detected with our new static URL analysis technology. This new analysis component is deployed seamlessly to analyze any link our static file decomposition finds within emails, documents, multimedia, archives and programs. It gives the defenders a fighting chance by inspecting millions of emails an organization would typically see every month.

By looking deep within every single email, it’s fully capable of detecting that one bad link in an email forward chain within an attached archive that was a password-protected document. No other technology goes to these lengths to make sure the users are protected.

The extent of this feature is greater than just detecting deceptive links. Paired with the rest of our platform, it offers a unique link aggregation point. This provides the defenders with insights and pivot points around every link shared with their organization, whether the links come from the email body, or from any of the message attachments.

Arm your team against phishing attacks. Get the ebook.
Arm your team against phishing attacks. Get the ebook.

Keep learning

  • Get up to speed on the state of software security with RL's Software Supply Chain Security Report 2026. Plus: See the the webinar to discussing the findings.
  • Learn why binary analysis is a must-have in the Gartner® CISO Playbook for Commercial Software Supply Chain Security.
  • Take action on securing AI/ML with our report: AI Is the Supply Chain. Plus: See RL's research on nullifAI and watch how RL discovered the novel threat.
  • Get the report: Go Beyond the SBOM. Plus: See the CycloneDX xBOM webinar.

Explore RL's Spectra suite: Spectra Assure for software supply chain security, Spectra Detect for scalable file analysis, Spectra Analyze for malware analysis and threat hunting, and Spectra Intelligence for reputation data and intelligence.

Tags:Threat Research

More Blog Posts

Copy Fail Linux yara rules

Copy Fail Flaw: 5 YARA Rules for Detection

Here’s what you need to know about the Linux kernel privilege escalation — and how to use YARA rules to get on top of it.

Learn More about Copy Fail Flaw: 5 YARA Rules for Detection
Copy Fail Flaw: 5 YARA Rules for Detection
Claude AI adds PromptMink malware to crypto trading agent

Claude adds malware to crypto agent

PromptMink has evolved into a malicious dependency in a package that allows access to crypto wallets and funds.

Learn More about Claude adds malware to crypto agent
Claude adds malware to crypto agent
Graphalgo supply chain campaign respawned.

Graphalgo fake recruiter campaign returns

An attack targeting crypto developers has been respawned — with an LLC and new techniques.

Learn More about Graphalgo fake recruiter campaign returns
Graphalgo fake recruiter campaign returns
TeamPCP supply chain attack

The TeamPCP supply chain attack evolves

The malicious campaign started with Trivy and Checkmarx and has shifted to LiteLLM — and now telnix. Here's how.

Learn More about The TeamPCP supply chain attack evolves
The TeamPCP supply chain attack evolves

Spectra Assure Free Trial

Get your 14-day free trial of Spectra Assure for Software Supply Chain Security

Get Free TrialMore about Spectra Assure Free Trial
Blog
Events
About Us
Webinars
In the News
Careers
Demo Videos
Cybersecurity Glossary
Contact Us
reversinglabsReversingLabs: Home
Privacy PolicyCookiesImpressum
All rights reserved ReversingLabs © 2026
XX / TwitterLinkedInLinkedInFacebookFacebookInstagramInstagramYouTubeYouTubeblueskyBlueskyRSSRSS
Back to Top