Scammers are using a clever typosquatting technique to impersonate Microsoft, exploiting visual similarities in domain names to steal user login credentials.
A new phishing campaign is leveraging a subtle visual trick that can easily go unnoticed. Attackers are utilizing the domain rnicrosoft.com to impersonate Microsoft and steal login credentials. The deception lies in the way the letters are arranged; instead of the letter “m,” the scammers use “r” and “n” placed side by side. In many fonts, these letters can appear almost identical to an “m” at a quick glance.
Security experts are raising alarms about this tactic, which has proven effective. The phishing emails closely mimic Microsoft’s branding, layout, and tone, creating a false sense of familiarity and trustworthiness. This illusion often leads users to click links before realizing something is amiss.
This attack exploits the way people read. Our brains tend to predict words rather than scan each letter individually. When something appears familiar, we automatically fill in the gaps. While a careful reader might spot the flaw on a large desktop monitor, the risk increases significantly on mobile devices. The address bar often shortens URLs, leaving little room for detailed inspection—exactly where attackers want users to be vulnerable.
Once trust is established, victims are more likely to enter passwords, approve fraudulent invoices, or download harmful attachments. Attackers typically employ multiple visual deceptions to enhance their chances of success. For instance, they might use mmicros0ft.com to replace the letter “o” with the number “0,” or use domains like microsoft-support.com that add official-sounding words to appear legitimate.
Typosquatting domains such as rnicrosoft.com are rarely used for a single purpose; criminals often repurpose them across various scams. Common follow-up tactics include credential phishing, fake HR notices, and vendor payment requests. In every case, the attackers benefit from speed—the quicker they act, the less likely users are to notice the mistake.
Most individuals do not take the time to read URLs character by character. Familiar logos and language reinforce trust, particularly during a busy workday. The prevalence of mobile device use exacerbates this issue. Smaller screens, shortened links, and constant notifications create an environment ripe for mistakes. This is not an issue exclusive to Microsoft; banks, retailers, healthcare portals, and government services are all susceptible to similar risks.
Typosquatting scams thrive on the rush to trust what appears familiar. However, there are steps users can take to slow down and identify fake domains before any damage is done. Before clicking on any link, it is advisable to open the full sender address in the email header. Display names and logos can be easily faked, but the domain reveals the true source.
Users should look closely for swapped letters, such as “rn” in place of “m,” added hyphens, or unusual domain endings. If the address feels even slightly off, it is wise to treat the message as potentially hostile. On a desktop, hovering the mouse over links can reveal the actual destination. On mobile devices, long-pressing the link allows users to preview the URL. This simple pause can often expose lookalike domains designed to steal login credentials.
When an email claims urgent action is needed for an account, it is best not to use the provided links. Instead, open a new browser tab and manually navigate to the official website using a saved bookmark. Legitimate companies do not require users to act through unexpected links, and this practice can effectively thwart most typosquatting attempts.
Employing strong antivirus software can also provide an additional layer of protection. Such software can block known phishing domains, flag malicious downloads, and alert users before they enter credentials on risky sites. While it may not catch every new typo trick, it serves as an important safety net when human attention falters.
Even if the sender’s address appears correct, it is crucial to inspect the “Reply To” field. Many phishing campaigns direct replies to external inboxes unrelated to the actual company. A mismatch here is a strong indicator that the message is a scam.
Typosquatting attacks often begin with leaked or scraped contact details. Utilizing a data removal service can help eliminate personal information from data broker sites, thereby reducing the number of scam emails and targeted phishing attempts that reach your inbox. While no service can guarantee complete removal of personal data from the internet, investing in a data removal service is a prudent choice. These services actively monitor and systematically erase personal information from numerous websites, providing peace of mind.
For email, banking, and work portals, using bookmarks created by the user is an effective strategy. This practice eliminates the risk of mistyping addresses or trusting links in messages, serving as one of the simplest and most effective defenses against lookalike domain attacks.
Typosquatting preys on human behavior rather than software flaws. A single swapped character can bypass filters and deceive even the most vigilant individuals in seconds. By becoming aware of these tricks, users can slow down attackers and regain control over their online security. Awareness transforms a sophisticated scam into an obvious fake.
If a single letter can determine whether you fall victim to a scam, how closely are you really scrutinizing the links you trust every day? For more information on protecting yourself from phishing scams, visit CyberGuy.com.

