Fraudsters Use HTML Legos to Evade Detection in Phishing Attack

Criminals stitch pieces of HTML together and hide them in JavaScript files, researchers report.

Dark Reading Staff, Dark Reading

April 9, 2021

1 Min Read

Researchers with Trustwave SpiderLabs are warning of a phishing campaign that employs what it calls "HTML Lego" to deliver a fake login page.

The phishing campaign is aimed at Microsoft 365 users and designed to mimic a Microsoft login interface. Trustwave says the emails contain nothing in the email body but have an attachment that appears to be an Excel file offering information about an investment. This attachment is actually an HTML document with two sections of URL encoded text.  Fraudsters pieced together different pieces of HTML hidden in JavaScript files to generate the fake login page.

Researchers say the first block of URL encoded text is the first part of the HTML code, where the beginning HTML tag is located. The second block of URL encoded text contains an HTML JavaScript code that validates victims' email and password input.

“This phishing campaign design was a little more tricky than usual,” researchers say in a summary of the findings. “By improvising an HTML email attachment that incorporates remote JavaScript code located on a free JavaScript hosting site, and ensuring the code is encoded uniquely, the attackers seek to fly under the radar to avoid detection.”

A detailed analysis of the campaign can be found here.

About the Author(s)

Dark Reading Staff

Dark Reading

Dark Reading is a leading cybersecurity media site.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like

More Insights