CyberHappenings logo

Track cybersecurity events as they unfold. Sourced timelines. Filter, sort, and browse. Fast, privacy‑respecting. No invasive ads, no tracking.

BiDi Swap URL Spoofing Exploiting Bidirectional Text

First reported
Last updated
1 unique sources, 1 articles

Summary

Hide ▲

A decade-old vulnerability in how browsers handle Right-to-Left (RTL) and Left-to-Right (LTR) scripts can be exploited to create deceptive URLs. This technique, known as BiDi Swap, allows attackers to craft URLs that appear legitimate but redirect users to malicious sites. The issue primarily affects subdomains and URL parameters, making it a significant risk for phishing attacks. The BiDi Algorithm, part of the Unicode Standard, is designed to handle mixed LTR and RTL scripts but struggles with subdomains and URL parameters, leaving a gap for potential exploitation. Various browsers have partial mitigations, but the problem persists. Awareness and improved browser protections are recommended to combat this threat.

Timeline

  1. 28.10.2025 16:05 1 articles · 13d ago

    BiDi Swap URL Spoofing Exploit Detailed

    The BiDi Swap vulnerability, which exploits how browsers handle RTL and LTR scripts, has been detailed by Varonis Threat Labs. This technique allows attackers to create deceptive URLs that appear legitimate but redirect users to malicious sites. The issue primarily affects subdomains and URL parameters, making it a significant risk for phishing attacks. Various browsers have partial mitigations, but the problem persists. Awareness and improved browser protections are recommended to combat this threat.

    Show sources

Information Snippets