{"id":22093,"date":"2025-06-18T12:00:56","date_gmt":"2025-06-18T10:00:56","guid":{"rendered":"https:\/\/blog.rwth-aachen.de\/itc\/?p=22093"},"modified":"2025-06-17T14:30:52","modified_gmt":"2025-06-17T12:30:52","slug":"typosquatting","status":"publish","type":"post","link":"https:\/\/blog.rwth-aachen.de\/itc\/en\/2025\/06\/18\/typosquatting\/","title":{"rendered":"What Is Typosquatting?"},"content":{"rendered":"<div class=\"twoclick_social_bookmarks_post_22093 social_share_privacy clearfix 1.6.4 locale-en_US sprite-en_US\"><\/div><div class=\"twoclick-js\"><script type=\"text\/javascript\">\/* <![CDATA[ *\/\njQuery(document).ready(function($){if($('.twoclick_social_bookmarks_post_22093')){$('.twoclick_social_bookmarks_post_22093').socialSharePrivacy({\"txt_help\":\"Wenn Sie diese Felder durch einen Klick aktivieren, werden Informationen an Facebook, Twitter, Flattr, Xing, t3n, LinkedIn, Pinterest oder Google eventuell ins Ausland \\u00fcbertragen und unter Umst\\u00e4nden auch dort gespeichert. N\\u00e4heres erfahren Sie durch einen Klick auf das <em>i<\\\/em>.\",\"settings_perma\":\"Dauerhaft aktivieren und Daten\\u00fcber-tragung zustimmen:\",\"info_link\":\"http:\\\/\\\/www.heise.de\\\/ct\\\/artikel\\\/2-Klicks-fuer-mehr-Datenschutz-1333879.html\",\"uri\":\"https:\\\/\\\/blog.rwth-aachen.de\\\/itc\\\/en\\\/2025\\\/06\\\/18\\\/typosquatting\\\/\",\"post_id\":22093,\"post_title_referrer_track\":\"What+Is+Typosquatting%3F\",\"display_infobox\":\"on\"});}});\n\/* ]]> *\/<\/script><\/div><p><div id=\"attachment_22095\" style=\"width: 310px\" class=\"wp-caption alignright\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-22095\" class=\"size-medium wp-image-22095\" src=\"https:\/\/blog.rwth-aachen.de\/itc\/files\/2025\/05\/Blog-Layout-1-300x200.png\" alt=\"Businessman hand touching to search icon bar\" width=\"300\" height=\"200\" srcset=\"https:\/\/blog.rwth-aachen.de\/itc\/files\/2025\/05\/Blog-Layout-1-300x200.png 300w, https:\/\/blog.rwth-aachen.de\/itc\/files\/2025\/05\/Blog-Layout-1-1024x683.png 1024w, https:\/\/blog.rwth-aachen.de\/itc\/files\/2025\/05\/Blog-Layout-1-768x512.png 768w, https:\/\/blog.rwth-aachen.de\/itc\/files\/2025\/05\/Blog-Layout-1-1536x1024.png 1536w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><p id=\"caption-attachment-22095\" class=\"wp-caption-text\">Source: <a href=\"https:\/\/www.freepik.com\/free-photo\/businessman-hand-touching-search-icon-bar-seo-search-engine-optimisation-marketing-survey-concept-by-3d-render-illustration_26266731.htm#fromView=search&amp;page=1&amp;position=2&amp;uuid=bd93458f-28e3-4d0e-abc4-bc72c9f79c68&amp;query=URL\">Freepik<\/a><\/p><\/div><\/p>\n<p>The internet offers many opportunities &#8211; but also risks. One of the lesser known but potentially very dangerous threats in the field of cyber security is typosquatting. But what does this term actually mean? Typosquatting refers to a technique in which attackers attempt to redirect users to fake or unwanted websites. This is usually done by exploiting typos or similar domain names of well-known websites. Instead of the actual website, you end up on a page that looks deceptively similar to the real one or contains completely different, sometimes malicious content.<\/p>\n<p><!--more--><\/p>\n<p>&nbsp;<\/p>\n<h3><span style=\"color: #00549f;\">How Does Typosquatting Work?<\/span><\/h3>\n<p>Typically, cyber criminals register domain names that strongly resemble known web addresses &#8211; for example by<\/p>\n<ul>\n<li><strong>Swapping letters<\/strong> (e.g. \u2018googel.com\u2019 instead of \u2018google.com\u2019)<\/li>\n<li><strong>Forgetting a letter<\/strong> (e.g. \u2018amazn.de\u2019 instead of \u2018amazon.de\u2019)<\/li>\n<li><strong>Additional characters<\/strong> (e.g. \u2018paypal-secure.com\u2019)<\/li>\n<li><strong>Other domain extensions<\/strong> (e.g. \u2018.net\u2019 instead of \u2018.com\u2019)<\/li>\n<\/ul>\n<p>As soon as such an incorrect URL is entered into the browser, the user is redirected to the wrong page. Various risks can lurk there, such as phishing attempts (tapping into passwords or credit card details):<\/p>\n<ul>\n<li>Phishing attempts (tapping into passwords or credit card details) You can read more about phishing in our other <a href=\"https:\/\/blog.rwth-aachen.de\/itc\/en?s=phishing\">articles<\/a>.<\/li>\n<li>Spread of <a href=\"https:\/\/blog.rwth-aachen.de\/itc\/en\/2025\/01\/24\/zwischen-viren-und-wurmern\/\">malware<\/a><\/li>\n<li>Advertising or dubious content<\/li>\n<li>Fraudulent shops<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h3><span style=\"color: #00549f;\">Why Is Typosquatting Dangerous?<\/span><\/h3>\n<p>At first glance, fake websites often appear harmless or barely distinguishable from the original. Especially under time pressure or with inattentive users, the probability of disclosing sensitive data or starting malicious downloads is high. This not only threatens companies with a loss of image, but also direct economic damage.<\/p>\n<p>&nbsp;<\/p>\n<h3><span style=\"color: #00549f;\">How can you protect yourself?<\/span><\/h3>\n<p>A conscious approach to URLs and websites can help to protect against typosquatting. Here are some tips:<\/p>\n<ul>\n<li><strong>Check the URL carefully<\/strong>: It is worth taking a second look at the address, especially when entering sensitive data.<\/li>\n<li><strong>Use bookmarks<\/strong>: Bookmarks in the browser can help to call up the correct address &#8211; but they are not one hundred per cent protection.<\/li>\n<li><strong>Check SSL certificates<\/strong>: Look for the small lock symbol next to the web address.<\/li>\n<li><strong>Use the latest browser:<\/strong> Modern browsers offer protection mechanisms and warnings for suspicious websites.<\/li>\n<li><strong>Be careful with links in emails or messages:<\/strong> It is better to always go directly to the official page via URL instead of clicking on links.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h2>URL Security at the IT Center<\/h2>\n<p>At the IT Center we attach great importance to security in the digital space. We support students, staff and researchers in protecting themselves against threats such as typosquatting. Through education and secure IT infrastructures, we help to raise awareness of cyber risks and ensure the safe use of web services. That&#8217;s why we always keep the <a href=\"https:\/\/blog.rwth-aachen.de\/itc\/en\/category\/themen\/it-sicherheit\/\">IT-Security category<\/a> up to date. If you have any questions or uncertainties about IT security, our <a href=\"https:\/\/help.itc.rwth-aachen.de\/service\/b734502cd73e4201b1f763a65a61bf9c\/article\/cbf1b80232b34626bbd53dda48578c09\/\">IT-ServiceDesk<\/a> is always on hand to provide advice.<\/p>\n<p>At first glance, typosquatting may appear to be a sophisticated but harmless scam. In reality, however, it can have serious consequences for individuals and companies. A watchful eye, technical protective measures and education are crucial to staying safe online.<\/p>\n<p>&nbsp;<\/p>\n<hr \/>\n<p>Responsible for the content of this article is <a href=\"https:\/\/www.itc.rwth-aachen.de\/cms\/it-center\/it-center\/profil\/team\/~epvp\/mitarbeiter-campus-\/?gguid=PER-FSX9U9J&amp;allou=1\">Malak Mostafa<\/a>.<\/p>","protected":false},"excerpt":{"rendered":"<p>Sorry, this entry is only available in Deutsch.<\/p>\n","protected":false},"author":5003,"featured_media":22094,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"c2c_always_allow_admin_comments":false,"footnotes":""},"categories":[311,312,314,315,305],"tags":[61,1459,70,1457,1458],"class_list":["post-22093","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-fun-facts","category-insight-it-center","category-it-sicherheit","category-services-support","category-themen","tag-it-sicherheit","tag-malware","tag-phishing","tag-typosquatting","tag-url"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/posts\/22093","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/users\/5003"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/comments?post=22093"}],"version-history":[{"count":3,"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/posts\/22093\/revisions"}],"predecessor-version":[{"id":22323,"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/posts\/22093\/revisions\/22323"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/media\/22094"}],"wp:attachment":[{"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/media?parent=22093"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/categories?post=22093"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/tags?post=22093"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}