New Phishing Attack Using Invisible Characters Hidden in Subject Line Using MIME Encoding

New Phishing Attack Using Invisible Characters Hidden in Subject Line Using MIME Encoding

Cybercriminals have developed a sophisticated phishing technique that exploits invisible characters embedded within email subject lines to evade automated security filters.

This attack method leverages MIME encoding combined with Unicode soft hyphens to disguise malicious intent while appearing legitimate to human readers.

The technique represents an evolution in social engineering tactics, targeting email filtering mechanisms that rely on keyword detection and pattern matching.

The attack surfaced when security researchers discovered phishing messages with subject lines displaying unusual behavior in email clients. When viewed in the message list, the subject appeared garbled or incomplete, but upon opening the email, the text rendered as normal, readable content.

This discrepancy indicated the presence of invisible characters strategically inserted throughout the subject line to break up recognizable keywords and patterns.

The campaign primarily targets credential theft through fake webmail login pages. Victims receive emails with subjects like “Your Password is about to Expire,” where invisible characters fragment these trigger words that would typically alert security systems.

google

New Phishing Attack Using Invisible Characters Hidden in Subject Line Using MIME Encoding
Email subject line display comparison showing normal rendering despite invisible character insertion (Source – Internet Storm Center)

The phishing messages direct recipients to compromised domains hosting generic credential harvesting portals designed to capture login information.

Internet Storm Center analysts identified this technique while reviewing malicious messages delivered to their handler inbox.

The discovery highlighted a relatively uncommon application of invisible character obfuscation, particularly within email subject lines rather than message bodies alone.

Technical Implementation and Evasion Mechanism

The attackers implement this technique through MIME encoded-word formatting as specified in RFC 2047.

The subject line structure follows the pattern encoded-word = “=?” charset “?” encoding “?” encoded-text, where content is UTF-8 character set data encoded in Base64 format.

Analysis of captured samples revealed subject headers formatted as:-

Subject: =?UTF-8?B?WcKtb3XCrXIgUMKtYXPCrXN3wq1vwq1yZCBpwq
=?UTF-8?B?dMKtbyBFwq14wq1wwq1pcsKtZQ==?=

When decoded, the strings contain soft hyphen characters (Unicode U+00AD, HTML entity ­) inserted between individual letters.

New Phishing Attack Using Invisible Characters Hidden in Subject Line Using MIME Encoding
Decoded MIME header revealing Base64 encoded subject with embedded soft hyphens (Source – Internet Storm Center)

These characters remain invisible in most email clients, including Outlook, effectively fragmenting keywords like “password” into “p-a-s-s-w-o-r-d” at the code level while displaying normally to users.

The technique extends beyond subject lines into message bodies, where soft hyphens break up entire words to defeat content scanning engines.

Captured phishing URLs pointed to compromised legitimate domains hosting credential theft pages formatted as generic webmail login interfaces.

Follow us on Google News, LinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

googlenews



Source link