Attackers use CSS to fool anti-phishing systems
Inserting invisible links throws off natural language processing, say researchers
The attack uses a mix of techniques to hide content from people while making it visible to machines.
The first obfuscation technique uses cascading style sheet (CSS) information to hide links. CSS is unseen metadata that tells a browser how to display text and images.
Attackers also hide links inside the
These attacks make it possible to get credential harvesting pages through to a victim's inbox, explained the company. The CSS hacking creates "gibberish" for natural language filters while displaying a fully rendered email to victims, it explained.
Many anti-phishing scanners use natural language processing to spot signs of fraudulent emails. They might treat an email with suspicion if it did not come from Apple but included text such as "© 2018 Apple Corporation. All rights reserved" in the body text, explained the company in another blog post.
While the users won't see the embedded links in these latest attacks, they fool anti-phishing scanners. "This combination can confuse text semantic analysis, which leads many to treat it as a marketing email rather than a phishing email," the company added.
2021 state of email security report: Ransomware on the rise
Securing the enterprise in the COVID worldFree download
This is the latest iteration in a series of techniques that Avanan has seen phishing criminals use to get past email scanners. These include setting the font size to zero and inserting hidden text that would break up text visible to victims. This is an old attack spammers used in the early days to circumvent anti-spamming software.
The company recommends using a multi-layered approach to phishing protection, including domain and sender analysis tools, to increase their chances of spotting malicious emails. Companies should also train users to confirm with IT before changing any passwords, it concluded.
Avanan made headlines last month when it discovered phishing attackers impersonating communications from DocuSign.
How virtual desktop infrastructure enables digital transformation
Challenges and benefits of VDIFree download
The Okta digital trust index
Exploring the human edge of trustFree download
Optimising workload placement in your hybrid cloud
Deliver increased IT agility with the cloudFree Download
Modernise endpoint protection and leave your legacy challenges behind
The risk of keeping your legacy endpoint security toolsDownload now