Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

4/2/2020
06:35 PM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
50%
50%

Phishers Try 'Text Direction Deception' Technique to Bypass Email Filters

With COVID-19 concerns running high, attackers are trying new tactics to get to users.

Scammers can be pretty innovative when it comes to finding new ways to sneak phishing messages past secure email gateways and other filtering mechanisms.

One example is "text direction deception," a tactic where an attacker forces an HTML rendering engine to correctly display text that has been deliberately entered backward in the code — for example, getting text that exists in HTML code as "563 eciffO" to render forward correctly as "Office 365."

Security vendor Inky Technologies discovered the direction deception tactic being used in an email that was part of a phishing campaign. In a report this week, the company described the tactic as designed to trick security controls that filter email messages based on whether the emails contain text and text sequences that have been previously associated with phishing scams.

Such tactics could become more common as cybercriminals take advantage of the worldwide concern around the COVID-19 pandemic to fill email inboxes with phishing messages designed to trick users in various ways.

Just this week, for instance, Menlo Security reported what it described as a sophisticated, multistage phishing campaign targeted at stealing the credentials of specific individuals in the executive and finance teams at hundreds of companies.

The emails contained a phishing message that purported to be from the CEOs of each of the targeted companies. The emails also included an attachment that seemingly contained COVID-19 related employee information. The attachment contained a shortened link to a hosted form on a legitimate Microsoft service that prompted users for their login credentials.

With many email security products getting better at spotting scam emails, criminals have begun innovating as well. "To increase their success rate, attackers have adopted multi-stage attacks leveraging email, PDF attachments, and trusted SaaS services," Menlo said in its report. According to the security vendor, email users have been falling for such COVID-19 themed phishing emails in much larger numbers than with other phishing scams.

The rush to take advantage of COVID-19 fears is so high that some are dusting off old phishing kits and redeploying them again with a pandemic-themed lure. According to Akamai, its researchers have observed several threat actors recycling old phishing kits in new COVID-19 campaigns.

Innovative Tactics
Dave Baggett, CEO and co-founder of Inky, says he expects more criminals to use innovative tactics, such as text direction deception and other similar gambits, in COVID-19 related scams. As one example of another tactic, he points to COVID-19 scams where text in the HTML has the font size set to zero so it's effectively invisible to secure email gateways.

"This is just another method the attacker can use to hide text," he says of the text direction reversal method. "Anecdotally, it's used a lot less frequently than ordinary zero font, but that's probably because it will take a while for this tactic to find its way into phishing kits purveyed on the Dark Web."

Most secure email gateways use statistical models to learn the text sequences associated with legitimate email and that are associated with phishing, spam and other bad email, Inky said. "These models — the workhorse of mail protection since the 90s — learn, for example, that dollar signs in the subject line and 'make money fast!' in the body correlate with spam," the vendor said it its report.

Direction deception allows the attackers to thwart these pattern-matching capabilities by ensuring the text the email gateways are looking for doesn't appear in the HTML code. At the same time, the tactic ensures that email recipients see the text as perfectly normal, Inky said.

The security vendor described text direction deception as taking advantage of certain obscure capabilities in Cascading Style Sheets (CSS), a technology for describing how HTML documents are presented to the user. The capabilities pertain to how documents containing scripts like Arabic, which flows from the right to the left, and Latin are displayed. The specific property that the attackers abused allowed them to control how text is read and rendered, the vendor said.

Related Content:

Check out The Edge, Dark Reading's new section for features, threat data, and in-depth perspectives. Today's featured story: "Untangling Third-Party Risk (and Fourth, and Fifth...)."

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 8/10/2020
Pen Testers Who Got Arrested Doing Their Jobs Tell All
Kelly Jackson Higgins, Executive Editor at Dark Reading,  8/5/2020
Researcher Finds New Office Macro Attacks for MacOS
Curtis Franklin Jr., Senior Editor at Dark Reading,  8/7/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Changing Face of Threat Intelligence
The Changing Face of Threat Intelligence
This special report takes a look at how enterprises are using threat intelligence, as well as emerging best practices for integrating threat intel into security operations and incident response. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-16275
PUBLISHED: 2020-08-10
A cross-site scripting (XSS) vulnerability in the Credential Manager component in SAINT Security Suite 8.0 through 9.8.20 could allow arbitrary script to run in the context of a logged-in user when the user clicks on a specially crafted link.
CVE-2020-16276
PUBLISHED: 2020-08-10
An SQL injection vulnerability in the Assets component of SAINT Security Suite 8.0 through 9.8.20 allows a remote, authenticated attacker to gain unauthorized access to the database.
CVE-2020-16277
PUBLISHED: 2020-08-10
An SQL injection vulnerability in the Analytics component of SAINT Security Suite 8.0 through 9.8.20 allows a remote, authenticated attacker to gain unauthorized access to the database.
CVE-2020-16278
PUBLISHED: 2020-08-10
A cross-site scripting (XSS) vulnerability in the Permissions component in SAINT Security Suite 8.0 through 9.8.20 could allow arbitrary script to run in the context of a logged-in user when the user clicks on a specially crafted link.
CVE-2020-15139
PUBLISHED: 2020-08-10
In MyBB before version 1.8.24, the custom MyCode (BBCode) for the visual editor doesn't escape input properly when rendering HTML, resulting in a DOM-based XSS vulnerability. The weakness can be exploited by pointing a victim to a page where the visual editor is active (e.g. as a post or Private Mes...