<i>>A closer link at the link, however, shows that the site is not the genuine one. In fact, ķeepass[.]info —at least when it appears in the address bar—is just an encoded way of denoting xn--eepass-vbb[.]info, which it turns out, is pushing a malware family tracked as FakeBat. Combining the ad on Google with a website with an almost identical URL creates a near perfect storm of deception.<p>“Users are first deceived via the Google ad that looks entirely legitimate and then again via a lookalike domain,” Jérôme Segura, head of threat intelligence at security provider Malwarebytes,</i><p>Back in 2017, Google Chrome 59 supposedly fixed the Punycode phishing attack. E.g. story: <a href="https://www.engadget.com/2017-04-17-google-chrome-phishing-unicode-flaw.html" rel="nofollow noreferrer">https://www.engadget.com/2017-04-17-google-chrome-phishing-u...</a><p>Maybe a dedicated criminal studied the Chromium source code that checks Punycode and noticed a flaw where it would allow 'ķ' in place of 'k' ???<p><a href="https://www.xn--80ak6aa92e.com/" rel="nofollow noreferrer">https://www.xn--80ak6aa92e.com/</a> --> fake "аррӏе.com" triggers phishing warning<p><a href="https://xn--eepass-vbb.info/" rel="nofollow noreferrer">https://xn--eepass-vbb.info/</a> --> fake "ķeepass.info" does not trigger warning