NEWYou tin present perceive to Fox News articles!
A caller phishing run is exploiting a ocular instrumentality that is casual to miss and hard to unsee erstwhile you cognize it. Attackers are utilizing the domain rnicrosoft.com to impersonate Microsoft and bargain login credentials. The instrumentality is simple. Instead of the missive m, scammers spot r and n broadside by side. In galore fonts, those letters blur unneurotic and look astir identical to an m astatine a speedy glance.
Security experts are sounding the alarm due to the fact that this maneuver works. These emails intimately transcript Microsoft branding, layout and tone, which makes them consciousness acquainted and trustworthy. That mendacious consciousness of legitimacy is often each it takes to get a speedy click earlier you recognize thing is wrong.
Sign up for my FREE CyberGuy Report
Get my champion tech tips, urgent information alerts, and exclusive deals delivered consecutive to your inbox. Plus, you’ll get instant entree to my Ultimate Scam Survival Guide - escaped erstwhile you articulation my CYBERGUY.COM newsletter.
MOST PARKED DOMAINS NOW PUSH SCAMS AND MALWARE

Cybersecurity experts pass of a caller phishing scam that uses the fake domain rnicrosoft.com to mimic Microsoft and bargain login credentials. (Photo by Oliver Berg/picture confederation via Getty Images)
Why your encephalon falls for the rn trick
This onslaught relies connected however radical read. Your encephalon predicts words alternatively of scanning each letter. When thing looks familiar, you capable successful the gaps automatically. On a ample desktop monitor, a cautious scholar mightiness spot the flaw. On a phone, the hazard jumps. The code barroom often shortens URLs, and the surface leaves small country for adjacent inspection. That is precisely wherever attackers privation you. Once spot is established, you are much apt to participate passwords, o.k. fake invoices oregon download harmful attachments.
Common typosquatting variations to ticker for
Attackers seldom trust connected a azygous trick. They premix respective ocular deceptions to summation their odds.
Letter combinations
rnicrosoft.com
Uses r and n unneurotic to mimic m
Number swapping
micros0ft.com
Replaces the missive o with the fig 0
Hyphenation
microsoft-support.com
Adds official-sounding words to look legitimate
TLD switching
microsoft.co
Uses a antithetic domain ending to look real
What attackers bash aft you click
Typosquatting domains similar rnicrosoft.com are seldom utilized for a azygous purpose. Criminals reuse them crossed aggregate scams. Common follow-ups include credential phishing, fake HR notices and vendor outgo requests. In each case, the attacker benefits from speed. The faster you act, the little apt you are to announcement the mistake.
Why these fake domains support working
Most radical bash not dilatory down to work URLs quality by character. Familiar logos and connection reenforce trust, particularly during a engaged workday. Mobile usage makes this worse. Smaller screens, shortened links and changeless notifications make cleanable conditions for mistakes. This is not a Microsoft-only problem. Banks, retailers, healthcare portals and authorities services each look the aforesaid risk.
How to enactment harmless from typosquatting attacks
Typosquatting scams enactment due to the fact that they unreserved you into trusting what looks familiar. These steps dilatory that infinitesimal down and assistance you spot fake domains earlier harm is done.
1) Expand the afloat sender code each time
Before clicking anything, unfastened the afloat sender code successful the email header. Display names and logos are casual to fake, but domains archer the existent story. Look intimately for swapped letters similar rn successful spot of m, added hyphens oregon unusual domain endings. If the code feels adjacent somewhat off, dainty the connection arsenic hostile.
NETFLIX SUSPENSION SCAM TARGETS YOUR INBOX

Scammers are replacing the missive "m" with "rn" successful web addresses, a subtle instrumentality that tin fool users astatine a speedy glance. (Photo By Paul Chinn/The San Francisco Chronicle via Getty Images)
2) Preview links earlier you click
On a desktop, hover your rodent implicit links to uncover the existent destination. On a phone, long-press the nexus to preview the URL. This elemental intermission often exposes lookalike domains designed to bargain logins. If the nexus does not lucifer the nonstop tract you expect, bash not proceed.
3) Avoid email links for password oregon information alerts
When an email claims your relationship needs urgent action, bash not usage its links. Instead, unfastened a caller browser tab and manually spell to the authoritative website utilizing a saved bookmark. Legitimate companies bash not necessitate you to enactment done astonishment links, and this wont cuts disconnected astir typosquatting attempts instantly.
4) Use beardown antivirus bundle for added protection
Strong antivirus bundle tin artifact known phishing domains, emblem malicious downloads and pass you earlier you participate credentials connected risky sites. While it cannot drawback each caller typo trick, it adds an important information nett erstwhile quality attraction slips.
The champion mode to safeguard yourself from malicious links that instal malware, perchance accessing your backstage information, is to person beardown antivirus bundle installed connected each your devices. This extortion tin besides alert you to phishing emails and ransomware scams, keeping your idiosyncratic accusation and integer assets safe.
Get my picks for the champion 2025 antivirus extortion winners for your Windows, Mac, Android & iOS devices at Cyberguy.com.
5) Check the Reply To tract for hidden reddish flags
Even if the sender's code looks correct, inspect the Reply To field. Many phishing campaigns way replies to outer inboxes that person thing to bash with the existent company. A mismatch present is simply a beardown awesome that the connection is simply a scam.
HOLIDAY DELIVERIES AND FAKE TRACKING TEXTS: HOW SCAMMERS TRACK YOU

A typosquatting run targeting Microsoft users highlights however tiny ocular changes successful URLs tin pb to large information risks. (Photo by THOMAS SAMSON / AFP) (Photo by THOMAS SAMSON/AFP via Getty Images)
6) Consider a information removal work to trim targeting
Typosquatting attacks often statesman with leaked oregon scraped interaction details. A information removal work tin assistance region your idiosyncratic accusation from information broker sites, reducing the fig of scam emails and targeted phishing attempts that scope your inbox.
While nary work tin warrant the implicit removal of your information from the internet, a information removal work is truly a astute choice. They aren't cheap, and neither is your privacy. These services bash each the enactment for you by actively monitoring and systematically erasing your idiosyncratic accusation from hundreds of websites. It's what gives maine bid of caput and has proven to beryllium the astir effectual mode to erase your idiosyncratic information from the internet. By limiting the accusation available, you trim the hazard of scammers cross-referencing information from breaches with accusation they mightiness find connected the acheronian web, making it harder for them to people you.
Check retired my apical picks for information removal services and get a escaped scan to find retired if your idiosyncratic accusation is already retired connected the web by visiting Cyberguy.com.
Get a escaped scan to find retired if your idiosyncratic accusation is already retired connected the web: Cyberguy.com.
7) Rely connected saved bookmarks for captious accounts
For email, banking and enactment portals, usage bookmarks you created yourself. This eliminates the hazard of mistyping addresses oregon trusting links successful messages. It is 1 of the simplest and astir effectual defenses against lookalike domain attacks.
CLICK HERE TO DOWNLOAD THE FOX NEWS APP
Kurt's cardinal takeaways
Typosquatting works due to the fact that it targets quality behavior, not bundle flaws. A azygous swapped quality tin bypass filters and fool astute radical successful seconds. Knowing these tricks slows attackers down and gives you backmost control. Awareness turns a blase scam into an evident fake.
If a azygous missive tin determine whether you get hacked, however intimately are you truly speechmaking the links you spot each day? Let america cognize by penning to america at Cyberguy.com.
Sign up for my FREE CyberGuy Report
Get my champion tech tips, urgent information alerts, and exclusive deals delivered consecutive to your inbox. Plus, you’ll get instant entree to my Ultimate Scam Survival Guide - escaped erstwhile you articulation my CYBERGUY.COM newsletter.
Copyright 2025 CyberGuy.com. All rights reserved.
Kurt "CyberGuy" Knutsson is an award-winning tech writer who has a heavy emotion of technology, cogwheel and gadgets that marque beingness amended with his contributions for Fox News & FOX Business opening mornings connected "FOX & Friends." Got a tech question? Get Kurt’s escaped CyberGuy Newsletter, stock your voice, a communicative thought oregon remark astatine CyberGuy.com.











English (CA) ·
English (US) ·
Spanish (MX) ·