Attackers are exploiting a new typosquatting trick by swapping the letter “m” in microsoft.com with “rn”, creating a lookalike domain that is nearly indistinguishable at a glance.
According to Cybersecurity News, attackers are now replacing the ‘m’ in microsoft.com with ‘rn’. This typographical trick of placing ‘r’ and ‘n’ close to one another mimics the letter ‘m’, thus confusing the reader, allowing them to fall victim to cyberattacks such as credential phishing scams, internal HR impersonation campaigns, and vendor invoice scams.
The use of ‘rm’ is one variation that attackers are using to trick victims. Other variations include
The attack thrives on its subtleness and becomes even more acute on mobile devices, as the screen real estate is limited and the address bar often shortens the full URL. When using a high-resolution desktop monitor, an attentive observer might notice the discrepancy; however, the brain's tendency to anticipate text often conceals this anomaly.
This type of attack is known as typosquatting or URL hijacking. As Microsoft describes it, typosquatting is “when people - often criminals - register a common misspelling of another organization's domain as their own.”
To prevent this type of attack, Microsoft suggests:
Cybercriminals understand that users trust well-known brands like Microsoft and often don’t scrutinize URLs closely, especially when they’re busy, distracted, or using a small screen. By swapping characters in ways that look nearly identical, attackers create domains that appear legitimate at first glance, giving them a powerful foothold for social engineering.
See also: HIPAA Compliant Email: The Definitive Guide (2025 Update)
Most people don’t scrutinize URLs closely, and the brain tends to recognize familiar patterns automatically. This makes subtle changes easy to miss.
No. Typosquatting affects all major brands, including banking, e-commerce, social media, healthcare, and government platforms.
Report it immediately, avoid interacting with the site, and share the suspicious URL with the security team so it can be blocked organization-wide.