Malicious URL

24th September 2020 | Cybrary Malicious URL


malicious URLs

A Malicious URL is a link created with the purpose of promoting scams, attacks, and fraud. By clicking on an infected URL, you may download malware or a trojan that can take control of your device, or you might be persuaded into providing personal information on a fake website such as your username and password. Malicious URLs are often seen embedded in phishing attacks, tricking users into clicking on the link(s). Hackers use techniques like “typosquatting” to make malicious URLs look legitimate. For example, the URL is r n icrosoft.com rather than microsoft.com can be used to trick users due to it looking legitimate at a glance.

Source: Gatefy

Additional Reading: Smishing, The New Phishing

Related Terms: Typosquatting, Phishing, Trojan Horse

What does this mean for a Business Owner or Employee?

Businesses should be doing all they can to reduce the likelihood of employees falling victim to malicious URLs or other cyber risks. CyberHoot recommends following these best practices to help your organization stay more secure:

Nothing you do will guarantee you cannot be compromised. However, doing these things proactively will act like the ounce of prevention Ben Franklin was fond of talking about with respect to Fire prevention.  It’s worth a pound of cure during a fire (or a breach).  Watch the video below for more details on these attacks.

To learn more about malicious URLs through typosquatting, watch this short video:

Are you doing enough to protect your business?

Sign up with CyberHoot today and sleep better knowing your

employees are cyber trained and on guard!


Sign Up Today!

Latest Blogs

Stay sharp with the latest security insights

Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.

Cybercriminals Are Exploiting DocuSign with Customizable Phishing Templates

Cybercriminals Are Exploiting DocuSign with Customizable Phishing Templates

DocuSign has become one of the most trusted tools in modern business. Contracts, HR paperwork, NDAs, vendor...

Read more
PromptSpy: The Android Malware That Hired an AI Assistant

PromptSpy: The Android Malware That Hired an AI Assistant

And yes, Google's Gemini AI had no idea it was working for the bad guys. Malware has always followed a script....

Read more
Ransomware Entry Points are Changing. Here Is What to Do About It?

Ransomware Entry Points are Changing. Here Is What to Do About It?

Ransomware groups are not breaking in organizations the same way they did five years ago. The entry methods have...

Read more