HomeSample Page

Sample Page Title


It is nothing new for cybercriminals to make use of sneaky HTML tips of their try and infect computer systems or dupe unsuspecting recipients into clicking on phishing hyperlinks.

Spammers have been utilizing a vast number of tips for years in an try and get their advertising messages previous anti-spam filters and in entrance of human eyeballs.

It is sufficient to make you would like that electronic mail shoppers did not help HTML in any respect, and that each message needed to be in plaintext electronic mail. Think about a world the place electronic mail may by no means include any pictures (except it was ASCII artwork!), and the place you could not click on on hyperlinks that did not present you precisely the place they have been pointing…

Ahh, however we are able to solely dream. And you already know in addition to I do this advertising departments working for reliable firms around the globe can be apoplectic that our trivial safety issues meant they needed to chuck their beautifully-crafted HTML emails into the rubbish can.

The explanation I am contemplating the deserves (or in any other case) of HTML electronic mail right now, is a report from ISC Sans analyst Jan Kopriva, who has recognized what he describes as “a brand new spin on the ZeroFont phishing method.”

“ZeroFont phishing” is a time period first coined in 2018, by safety researchers describing how cybercriminals may bypass spam filters.

The trick includes inserting phrases into an electronic mail which can be “invisible” to the bare eye (on account of HTML setting their font measurement to zero) however which are seen by automated spam-filtering options.

Take the next instance. An electronic mail arrives at your organization, containing the next content material:

An automatic system would possibly discover it troublesome to identify the undesirable message amongst all that, however to the human eye, it could learn:

It is a quite simple instance – a spammer would most definitely go to a lot larger efforts to obfuscate their message from these attempting to get it previous an anti-spam filter – but it surely makes the purpose succinctly.

The “new spin” on the concept Kopriva is reporting takes benefit of the truth that right now’s electronic mail shoppers usually present a preview of the primary couple of traces of messages in an inbox, in a separate window from the physique of the particular chosen message.

In accordance with Kopriva, attackers used the “ZeroFont” method to control the preview of a message to recommend it had already been scanned for threats.

In a screenshot Kopriva shared, he confirmed how the small preview pane claimed the message had been “Scanned and secured by Isc®Superior Risk safety (APT): 9/22/2023T6:42 AM”

Nonetheless, the studying pane of the message had no human-visible point out of this, and went straight right into a bogus job supply.

Microsoft Outlook doesn’t show the faux “Scanned and secured” message in the principle rendering of the e-mail, however does seize it and show it within the preview pane.

As Kopriva describes, “the aim is to instill a false sense of legitimacy and safety within the recipient,” with the intent of accelerating the prospect {that a} goal will belief and open the offending message.

The ethical of the story? Stay vigilant.


Editor’s Be aware: The opinions expressed on this and different visitor writer articles are solely these of the contributor, and don’t essentially mirror these of Tripwire.

Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles