Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Threat Intelligence

1/15/2020
12:45 PM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
100%
0%

New Report Spotlights Changes in Phishing Techniques

Common and evolving strategies include the use of zero-font attacks, homograph attacks, and new tactics for fake attachments.

As email security providers strengthen their defenses, attackers develop new ways to work around them. A new report from Inky sheds light on how these techniques are evolving to become more complex and difficult to detect by unsuspecting targets.

"They're clearly testing those systems, and then they're exploring ways to get through," says Inky co-founder Dave Baggett of email security defenses. Today's adversaries are looking for ways to hide from legacy protection systems while avoiding suspicion from users, he adds.

One of the strategies Inky highlights is the use of hidden text and zero-font attacks to disguise malicious emails from security software. Someone may use an Office 365 logo to make a phish appear legitimate; the problem is, this would likely trigger defenses to see whether the email came from a Microsoft domain. Adding hidden text in the logo can confuse defensive tools.

"Attackers will put invisible [characters] in between the letters so the end user doesn't see it," Baggett says. Keyword stuffing is a similar tactic. With this technique, the attacker adds hidden text – white text on a white background – that contains keywords to make the email appear to be a conversation between two people rather than a transaction.

Malicious fake attachments are not a new technique, but with these attackers are also shifting their techniques to slip past defenses. Now they're embedding local images into emails. If a victim sees an attachment that appears to be a PDF and clicks to open it, they may instead be redirected to a malicious website that asks for their credentials, Inky explains in the report.

A third tactic is the use of homograph attacks. Attackers may use Unicode lettering to trick people into thinking a fake domain name is real. Instead of spelling Microsoft with a normal "M" character, for example, they may use a visually similar letter from a different alphabet. The result is a domain name that appears real but bypasses detection from security software.

"Some of these things end up being a tell," Baggett says. "Microsoft themselves would never spell their name with a funny Unicode M." Still, he points out, chances are unsuspecting users wouldn't notice.

Related Content:

Check out The Edge, Dark Reading's new section for features, threat data, and in-depth perspectives. Today's top story: "6 Unique InfoSec Metrics CISOs Should Track in 2020."

Kelly Sheridan is the Staff Editor at Dark Reading, where she focuses on cybersecurity news and analysis. She is a business technology journalist who previously reported for InformationWeek, where she covered Microsoft, and Insurance & Technology, where she covered financial ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
NSA Appoints Rob Joyce as Cyber Director
Dark Reading Staff 1/15/2021
Vulnerability Management Has a Data Problem
Tal Morgenstern, Co-Founder & Chief Product Officer, Vulcan Cyber,  1/14/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-27852
PUBLISHED: 2021-01-20
A stored Cross-Site Scripting (XSS) vulnerability in the survey feature in Rocketgenius Gravity Forms before 2.4.21 allows remote attackers to inject arbitrary web script or HTML via a textarea field. This code is interpreted by users in a privileged role (Administrator, Editor, etc.).
CVE-2021-3137
PUBLISHED: 2021-01-20
XWiki 12.10.2 allows XSS via an SVG document to the upload feature of the comment section.
CVE-2020-27850
PUBLISHED: 2021-01-20
A stored Cross-Site Scripting (XSS) vulnerability in forms import feature in Rocketgenius Gravity Forms before 2.4.21 allows remote attackers to inject arbitrary web script or HTML via the import of a GF form. This code is interpreted by users in a privileged role (Administrator, Editor, etc.).
CVE-2020-27851
PUBLISHED: 2021-01-20
Multiple stored HTML injection vulnerabilities in the "poll" and "quiz" features in an additional paid add-on of Rocketgenius Gravity Forms before 2.4.21 allows remote attackers to inject arbitrary HTML code via poll or quiz answers. This code is interpreted by users in a privile...
CVE-2020-13134
PUBLISHED: 2021-01-20
Tufin SecureChange prior to R19.3 HF3 and R20-1 HF1 are vulnerable to stored XSS. The successful exploitation requires admin privileges (for storing the XSS payload itself), and can exploit (be triggered by) admin users. All TOS versions with SecureChange deployments prior to R19.3 HF3 and R20-1 HF1...