Phishing Scam Exploits ‘rnicrosoft.com’ Domain to Steal Microsoft Credentials

30 December 2025 Technology

WASHINGTON, D.C. — A new wave of phishing scams is targeting Microsoft users by exploiting a clever visual deception involving the domain “rnicrosoft.com,” security experts warn. By replacing the letter “m” with the letters “r” and “n” placed side by side, scammers create a domain name that appears nearly identical to “microsoft.com” at a quick glance, especially on mobile devices where screen space is limited and URLs are often truncated.

This technique, known as typosquatting, takes advantage of how the human brain processes familiar words. Instead of scrutinizing each letter, users subconsciously fill in gaps, making “rn” look like an “m” in many fonts. Cybercriminals leverage this to craft emails and websites that closely mimic Microsoft’s branding, layout, and tone, fostering a false sense of legitimacy that prompts victims to enter their login credentials.

According to cybersecurity reports, these fraudulent domains are used in multiple scams, including credential phishing, fake human resources notices, and fraudulent vendor payment requests. The attackers rely on speed and familiarity to bypass suspicion, often catching victims off guard before they realize the deception.

Experts emphasize that this is not an isolated problem affecting only Microsoft users. Banks, retailers, healthcare providers, and government services have all been targets of similar typosquatting attacks. The Cybersecurity and Infrastructure Security Agency (CISA) has highlighted the growing sophistication of such scams, urging users to carefully verify URLs and be cautious when clicking links in unsolicited emails.

Additional common typosquatting tactics include replacing letters with similar-looking numbers, such as substituting “o” with “0” in “micros0ft.com,” adding hyphens to create domains like “microsoft-support.com,” or switching top-level domains to mimic legitimate sites, such as “microsoft.co.” These variations increase the likelihood that users will fall victim to the scam.

Mobile devices exacerbate the risk because URL bars often shorten addresses, making it harder for users to detect subtle differences. The Federal Trade Commission (FTC) advises users to double-check URLs, avoid clicking on suspicious links, and use multi-factor authentication to add an extra layer of security to online accounts.

To combat these threats, organizations are encouraged to implement domain monitoring and educate employees about phishing tactics. The United States Computer Emergency Readiness Team (US-CERT) provides resources and alerts to help individuals and businesses recognize and respond to such cyber threats.

Microsoft itself has taken steps to warn users and improve detection of typosquatting domains, but experts caution that vigilance remains critical. Users should carefully inspect URLs, especially in emails that urge immediate action or contain unexpected requests. When in doubt, visiting the official Microsoft website directly rather than following email links can help prevent falling prey to these scams.

As cybercriminals continue to refine their methods, public awareness and cautious online behavior remain the best defenses against these increasingly sophisticated phishing attacks.

BREAKING NEWS
Never miss a breaking news alert!
Written By
Maya Chen reports on international politics, conflict and diplomacy. She specializes in explaining how global events shape U.S. security, trade and migration, and how decisions made abroad ripple into life at home.
View Full Bio & Articles →

Leave a Reply