Homoglyph “rn” Typosquatting Targets Marriott and Microsoft Users With Lookalike Domains

Related

Cybersecurity Leaders to Watch in Australian Financial Services

Australia’s financial services sector sits at the epicenter of...

Microsoft Develops Scanner to Detect Backdoors in Open-Weight Large Language Models

What happened Microsoft has developed a lightweight scanner designed to...

EDR-Killer Malware Abuse via SonicWall SSLVPN Exploit Chain

What happened Security researchers have detailed a malware campaign in...

Cisco Meeting Management Vulnerability Lets Remote Attackers Upload Arbitrary Files

What happened A high-severity vulnerability in Cisco Meeting Management was...

Share

What happened

Hackers use ‘rn’ typo trick to impersonate Microsoft and Marriott International in a homoglyph phishing campaign that registers lookalike domains replacing the letter “m” with “rn.” The report described fake domains such as rnarriottinternational.com, rnarriotthotels.com, and rnicrosoft.com, designed to appear legitimate in common fonts and especially on mobile screens. A security firm, Netcraft, was cited as identifying malicious domains impersonating Marriott International, with suspected intent to steal loyalty account credentials or personal guest data. Harley Sugarman of Anagram was cited describing a similar campaign targeting Microsoft users with phishing emails using rnicrosoft.com to deliver fake security alerts or invoice notifications. The campaign is characterized as typosquatting/homoglyph abuse to capture credentials via convincing brand-mimic pages.

Who is affected

Users and customers of Marriott International and Microsoft services are directly affected through credential phishing risk. Organizations are indirectly affected when employee accounts are targeted, particularly on mobile devices where domain inspection is harder and phishing success rates may increase.

Why CISOs should care

Homoglyph typosquatting is a low-cost, high-scale technique that evades user vigilance and can bypass basic domain pattern checks. Successful credential theft can lead to account takeover, MFA fatigue scenarios, downstream BEC, and wider compromise where enterprise SSO or reused credentials are involved.

3 practical actions

  • Block and monitor lookalike domains: Add known homoglyph domains to blocking controls and monitor DNS/proxy logs for related typosquat access attempts.

  • Harden authentication against phishing: Enforce phishing-resistant MFA where possible and tighten conditional access for risky sign-ins and new devices.

  • Improve user reporting workflows: Ensure employees can rapidly report suspicious login prompts and brand-impersonation emails, especially from mobile clients.