Phishing attacks are getting sneakier, and sometimes all it takes is a single Unicode character to fool even a trained eye. One of the newest phishing techniques involves swapping the regular / (slash) with a similar-looking Unicode character.
Visually? Everything looks normal.
Under the hood? The link is not what you think.
Let’s take a look 👇
🔍 Phishing with Unicode: Slash Lookalikes
Attackers exploit Unicode to mimic legitimate URLs by swapping out the slash / with homoglyphs — characters that look the same but are actually different.
| Character | Unicode | Description | Hover Link |
|---|---|---|---|
| / | U+002F | Solidus (Normal Slash) | https://booking.com |
| ∖ | U+2216 | Set Minus (Backslash-like) | https://booking.com |
| ⁄ | U+2044 | Fraction Slash | https://booking.com |
| ∕ | U+2215 | Division Slash | https://booking.com |
| ⧸ | U+29F8 | Big Solidus | https://booking.com |
| / | U+FF0F | Fullwidth Solidus | https://booking.com |
| ︐ | U+FE10 | Presentation Form for Vertical Comma | https://booking.com |
| 〳 | U+3033 | Vertical Kana Repeat Mark Upper | https://booking.com |
| ㇓ | U+31D3 | CJK Stroke-like Character | https://booking.com |
| ん | U+3093 | Hiragana Letter N (used in phishing) | https://booking.com |
| ׃ | U+05C3 | Hebrew Punctuation Sof Pasuq | https://booking.com |
| ܁ | U+0701 | Syriac Supralinear Full Stop | https://booking.com |
| ᜵ | U+1735 | Philippine Single Punctuation | https://booking.com |
| ፡ | U+1361 | Ethiopic Wordspace | https://booking.com |
| • | U+2022 | Bullet | https://booking.com |
| \ | U+FF3C | Fullwidth Reverse Solidus (Backslash) | https://booking.com |
| ᠆ | U+1806 | Mongolian Todo Soft Hyphen | https://booking.com |
| ⁂ | U+2042 | Asterism | https://booking.com |
| ⸻ | U+2E3B | Two-Em Dash | https://booking.com |
| ⹝ | U+2E5D | Oblique Hyphen | https://booking.com |
| … | U+2026 | Ellipsis | https://booking.com |
🛡️ Why This Matters
Phishing pages crafted this way can:
- Bypass visual inspection
- Evade some automated filters
- Trick users into trusting a malicious link
Hovering over links or inspecting the full URL is no longer enough unless you're looking for non-standard characters.
This phishing method has been spotted in the wild, including in a campaign targeting Booking.com customers:
📰 Read the full breakdown here:
👉 Booking.com phishing campaign uses sneaky character to trick you
🎬 Watch the analysis by John Hammond:
👉 YouTube: John Hammond Explains the Unicode Phishing Trick
Stay sharp and stay safe. Just because a link looks right, doesn’t mean it is.
💬 Have you seen similar techniques in the wild? Share below!


Top comments (0)