Attackers use CSS to fool anti-phishing systems

Inserting invisible links throws off natural language processing, say researchers

Email and collaboration security company Avanan has spotted an attack that uses multiple techniques to fool natural language scanners in anti-phishing systems. 

The attack uses a mix of techniques to hide content from people while making it visible to machines. 

The first obfuscation technique uses cascading style sheet (CSS) information to hide links. CSS is unseen metadata that tells a browser how to display text and images. 

Attackers also hide links inside the

These attacks make it possible to get credential harvesting pages through to a victim's inbox, explained the company. The CSS hacking creates "gibberish" for natural language filters while displaying a fully rendered email to victims, it explained. 

Many anti-phishing scanners use natural language processing to spot signs of fraudulent emails. They might treat an email with suspicion if it did not come from Apple but included text such as "© 2018 Apple Corporation. All rights reserved" in the body text, explained the company in another blog post. 

While the users won't see the embedded links in these latest attacks, they fool anti-phishing scanners. "This combination can confuse text semantic analysis, which leads many to treat it as a marketing email rather than a phishing email," the company added. 

Related Resource

2021 state of email security report: Ransomware on the rise

Securing the enterprise in the COVID world

2021 state of email security report: Ransomware on the rise - whitepaper from MimecastFree download

This is the latest iteration in a series of techniques that Avanan has seen phishing criminals use to get past email scanners. These include setting the font size to zero and inserting hidden text that would break up text visible to victims. This is an old attack spammers used in the early days to circumvent anti-spamming software. 

The company recommends using a multi-layered approach to phishing protection, including domain and sender analysis tools, to increase their chances of spotting malicious emails. Companies should also train users to confirm with IT before changing any passwords, it concluded. 

Avanan made headlines last month when it discovered phishing attackers impersonating communications from DocuSign

Featured Resources

How virtual desktop infrastructure enables digital transformation

Challenges and benefits of VDI

Free download

The Okta digital trust index

Exploring the human edge of trust

Free download

Optimising workload placement in your hybrid cloud

Deliver increased IT agility with the cloud

Free Download

Modernise endpoint protection and leave your legacy challenges behind

The risk of keeping your legacy endpoint security tools

Download now

Recommended

Russia's "politically motivated" REvil raid could be used as leverage, experts warn
ransomware

Russia's "politically motivated" REvil raid could be used as leverage, experts warn

17 Jan 2022
Meta files lawsuit to uncover hackers targeting Facebook, WhatsApp
phishing

Meta files lawsuit to uncover hackers targeting Facebook, WhatsApp

21 Dec 2021
Five things to consider before choosing an MFA solution
Security

Five things to consider before choosing an MFA solution

17 Dec 2021
Australia and US sign CLOUD Act data-sharing deal to support criminal investigations
cyber crime

Australia and US sign CLOUD Act data-sharing deal to support criminal investigations

16 Dec 2021

Most Popular

Sony pulls out of MWC 2022
Business operations

Sony pulls out of MWC 2022

14 Jan 2022
How to boot Windows 11 in Safe Mode
Microsoft Windows

How to boot Windows 11 in Safe Mode

6 Jan 2022
Dell XPS 15 (2021) review: The best just got better
Laptops

Dell XPS 15 (2021) review: The best just got better

14 Jan 2022