Advertisement

Verisign, Amazon patch zero-day vulnerability that utilized homoglyph characters

The blending of scripts has been barred generally, but these bogus homoglyphs sneaked through.
homoglyph zero day
The "Latin Alpha" was one of the abused homoglyphs, according to Soluble. (Getty Images/Photo Mosh)

Verisign has fixed an issue that could have allowed attackers to register bogus domains by using homoglyphs in place of more common characters, due to research from California-based security firm Soluble.

Matt Hamilton, principal security researcher at Soluble, discovered the flaw when he attempted to register an Amazon Web Services S3 bucket with Unicode emoji characters. “It was possible to register Latin homoglyph characters, specifically Unicode Latin IPA Extension homoglyphs,” he wrote in a blog released Wednesday. “I then checked if it was possible to register domains with these homoglyph characters. Ruh-roh, it was.”

Hamilton called out the abuse of the following characters:

Advertisement

For years, domain providers have been aware of homoglyph attacks and have put in place restrictions to prevent their exploitation, such as barring the use of both Latin and Cyrillic characters at once. Verisign, which operates registries for .com and .net TLDs, prevents registering domains with mixed-scripts, but Hamilton found that a blend of Unicode and Latin characters still passed the smell test “as long as the Unicode characters were themselves Latin.”

Over the last three years, 15 of 300 domains Hamilton tested were registered using this homoglyph technique and were issued HTTPS certificates.

“This included prominent financial, internet shopping, technology, and other Fortune 100 sites. There is no legitimate or non-fraudulent justification for this activity,” Hamilton said. “My speculation is that this vulnerability was only used in highly-targeted social engineering campaigns.”

In recent days Verisign developed a fix that prevents the registration of domains containing these homoglyphs by updating its approved character table.

Amazon worked to prevent Unicode in subdomain registration by blocking buckets beginning with “xn--”, which should prevent this kind of script spoofing.

Advertisement

Some of the companies that Hamilton contacted about the possible exploitation were not responsive.

“[W]e view this a very low risk for our users at this time,” DigitalOcean told Hamilton last month, although they confirmed they were going to investigate mitigations.

The Director of Product Security at DigitalOcean, Mike McBryde, told CyberScoop in a statement he thinks the responsibility for dealing with this flaw lies with browsers or DNS providers.

“DigitalOcean takes all security vulnerabilities seriously and has investigated ways to mitigate the specific risk of homoglyph collision attacks,” McBryde said. “We believe the best remediation against such attacks is on the browser and/or DNS provider level, and most major browsers already have some type of policy in place. We will continue to monitor the situation and work with our users as appropriate.”

Google and Wasabi were last in touch with Hamilton in November and December of last year. Hamilton said he continuously updated them on the research while Verisign worked to deploy mitigations before disclosure.

Advertisement

Wasabi issued a statement in March noting “part of the protection against this type attack comes from web browsers that can defend against the problem,” adding that “domain registrars are working to do their part by preventing the registration of problematic domain names.”

“This particular case was by-and-large a disappointment due to the unresponsiveness of vendors,” Hamilton said. “Kudos to Amazon and Verisign who, in my view, were the only vendors to take this issue seriously and alter their policies in a timely manner to address this vulnerability.”

Google did not immediately return request for comment.

Shannon Vavra

Written by Shannon Vavra

Shannon Vavra covers the NSA, Cyber Command, espionage, and cyber-operations for CyberScoop. She previously worked at Axios as a news reporter, covering breaking political news, foreign policy, and cybersecurity. She has appeared on live national television and radio to discuss her reporting, including on MSNBC, Fox News, Fox Business, CBS, Al Jazeera, NPR, WTOP, as well as on podcasts including Motherboard’s CYBER and The CyberWire’s Caveat. Shannon hails from Chicago and received her bachelor’s degree from Tufts University.

Latest Podcasts