IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more

Attackers use CSS to fool anti-phishing systems

Inserting invisible links throws off natural language processing, say researchers

Email and collaboration security company Avanan has spotted an attack that uses multiple techniques to fool natural language scanners in anti-phishing systems. 

The attack uses a mix of techniques to hide content from people while making it visible to machines. 

The first obfuscation technique uses cascading style sheet (CSS) information to hide links. CSS is unseen metadata that tells a browser how to display text and images. 

Attackers also hide links inside the

These attacks make it possible to get credential harvesting pages through to a victim's inbox, explained the company. The CSS hacking creates "gibberish" for natural language filters while displaying a fully rendered email to victims, it explained. 

Many anti-phishing scanners use natural language processing to spot signs of fraudulent emails. They might treat an email with suspicion if it did not come from Apple but included text such as "© 2018 Apple Corporation. All rights reserved" in the body text, explained the company in another blog post. 

While the users won't see the embedded links in these latest attacks, they fool anti-phishing scanners. "This combination can confuse text semantic analysis, which leads many to treat it as a marketing email rather than a phishing email," the company added. 

Related Resource

2021 state of email security report: Ransomware on the rise

Securing the enterprise in the COVID world

2021 state of email security report: Ransomware on the rise - whitepaper from MimecastFree download

This is the latest iteration in a series of techniques that Avanan has seen phishing criminals use to get past email scanners. These include setting the font size to zero and inserting hidden text that would break up text visible to victims. This is an old attack spammers used in the early days to circumvent anti-spamming software. 

The company recommends using a multi-layered approach to phishing protection, including domain and sender analysis tools, to increase their chances of spotting malicious emails. Companies should also train users to confirm with IT before changing any passwords, it concluded. 

Avanan made headlines last month when it discovered phishing attackers impersonating communications from DocuSign

Featured Resources

The state of Salesforce: Future of business

Three articles that look forward into the changing state of Salesforce and the future of business

Free Download

The mighty struggle to migrate SAP to the cloud may be over

A simplified and unified approach to delivering Enterprise Transformation in the cloud

Free Download

The business value of the transformative mainframe

Modernising on the mainframe

Free Download

The Total Economic Impact™ Of IBM FlashSystem

Cost savings and business benefits enabled by FlashSystem

Free Download

Recommended

What is zero trust?
network security

What is zero trust?

14 Jul 2022
Retbleed hardware-level flaw brings overhead woe to Intel and AMD
Hardware

Retbleed hardware-level flaw brings overhead woe to Intel and AMD

13 Jul 2022
An analysis of the European cyber threat landscape
Whitepaper

An analysis of the European cyber threat landscape

8 Jul 2022
Solve cyber resilience challenges with storage solutions
Whitepaper

Solve cyber resilience challenges with storage solutions

4 Jul 2022

Most Popular

Why convenience is the biggest threat to your security
Sponsored

Why convenience is the biggest threat to your security

8 Aug 2022
How to boot Windows 11 in Safe Mode
Microsoft Windows

How to boot Windows 11 in Safe Mode

29 Jul 2022
Microsoft successfully tests emission-free hydrogen fuel cell system for data centres
data centres

Microsoft successfully tests emission-free hydrogen fuel cell system for data centres

29 Jul 2022