Attackers use CSS to fool anti-phishing systems

Inserting invisible links throws off natural language processing, say researchers

Email and collaboration security company Avanan has spotted an attack that uses multiple techniques to fool natural language scanners in anti-phishing systems. 

The attack uses a mix of techniques to hide content from people while making it visible to machines. 

The first obfuscation technique uses cascading style sheet (CSS) information to hide links. CSS is unseen metadata that tells a browser how to display text and images. 

Attackers also hide links inside the

These attacks make it possible to get credential harvesting pages through to a victim's inbox, explained the company. The CSS hacking creates "gibberish" for natural language filters while displaying a fully rendered email to victims, it explained. 

Many anti-phishing scanners use natural language processing to spot signs of fraudulent emails. They might treat an email with suspicion if it did not come from Apple but included text such as "© 2018 Apple Corporation. All rights reserved" in the body text, explained the company in another blog post. 

While the users won't see the embedded links in these latest attacks, they fool anti-phishing scanners. "This combination can confuse text semantic analysis, which leads many to treat it as a marketing email rather than a phishing email," the company added. 

Related Resource

2021 state of email security report: Ransomware on the rise

Securing the enterprise in the COVID world

2021 state of email security report: Ransomware on the rise - whitepaper from MimecastFree download

This is the latest iteration in a series of techniques that Avanan has seen phishing criminals use to get past email scanners. These include setting the font size to zero and inserting hidden text that would break up text visible to victims. This is an old attack spammers used in the early days to circumvent anti-spamming software. 

The company recommends using a multi-layered approach to phishing protection, including domain and sender analysis tools, to increase their chances of spotting malicious emails. Companies should also train users to confirm with IT before changing any passwords, it concluded. 

Avanan made headlines last month when it discovered phishing attackers impersonating communications from DocuSign

Featured Resources

Seven steps to connect and empower your frontline workers

How business leaders can improve communication with a secure platform

Free download

Create what’s next

The future of collaboration and productivity

Free Download

Leveraging the cloud without relinquishing control

Your data. Their cloud.

Free download

Re-architecting for nonstop innovation

Unlocking productivity, scalability, and lower costs for cloud natives

Free Download

Recommended

Education and government most at risk from email threats
phishing

Education and government most at risk from email threats

26 Nov 2021
SMBs urged to update software ahead of Black Friday
e commerce

SMBs urged to update software ahead of Black Friday

25 Nov 2021
US adds dozen Chinese tech companies to trade blacklist
Policy & legislation

US adds dozen Chinese tech companies to trade blacklist

25 Nov 2021
Fifth of UK security pros discriminated against in 2021
Careers & training

Fifth of UK security pros discriminated against in 2021

23 Nov 2021

Most Popular

How to speed up Microsoft's Windows 11
Microsoft Windows

How to speed up Microsoft's Windows 11

9 Nov 2021
Nike to take customers into the metaverse with 'NIKELAND'
virtualisation

Nike to take customers into the metaverse with 'NIKELAND'

19 Nov 2021
Best MDM solutions 2020
mobile device management (MDM)

Best MDM solutions 2020

12 Nov 2021