This devious phishing scam makes it look like dodgy emails are actually safe

Phishing
(Image credit: wk1003mike / Shutterstock)

Hackers are using the dreaded “zero font” tactic in phishing emails, instilling a false sense of legitimacy in otherwise malicious threats, researchers are saying. 

Just as the name suggests, zero font is a tactic in which hackers use the size 0 for a font, making certain text invisible to the human eye. At the same time software, and more importantly - antivirus and email protection software - can read it. Threat actors leverage this fact to confuse email security solutions and have otherwise malicious emails end up in the inbox, instead of the spam folder.

In this particular instance, however, it’s not just to confuse software, but to confuse the reader, as well. This is according to ISC Sans analyst Jan Kopriva, who’s seen a sample of a malicious email. When a victim receives a message in the Outlook client, there are three ways to read it - the list of emails, usually located to the left, the preview pane, usually seen to the right, and in a separate window, after double-clicking the message in the email list.

Scanned by a security tool?

By using zero font, hackers can type in text that will show up in the email list, but not in the email itself. In this instance, they used “Scanned and secured by Isc®Advanced Threat protection (APT),” trying to make the recipient think the email message was scanned by an endpoint security solution and was deemed clean. 

That could result in the recipients lowering their guard and clicking on links and downloading any attachments coming with the email. This particular email campaign offered a new job opportunity to the recipients, something we’ve seen Project Lazarus do in the past. 

While in his writeup, Kopriva warned Outlook users, this is not the only email client that displays content in an email list regardless of font size.

Via BleepingComputer

More from TechRadar Pro

Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.

Read more
email
Hidden text "salting" is letting hackers craft devious email attacks to evade detection
Close up of a person touching an email icon.
Criminals are using CSS to get around filters and track email usage
A digital themed isometric showing a neon padlock in the foreground, and a technological diagram of a processor logic board in the background.
SVG files are offering cybercriminals an easy way in with new phishing attacks
Hacker Typing
This devious two-step phishing campaign uses Microsoft tools to bypass email security
Someone checking their credit card details online.
Hackers use CAPTCHA scam in PDF files on Webflow CDN to get past security systems
An iPhone sitting on a wooden table
Millions at risk as malicious PDF files designed to steal your data are flooding SMS inboxes - how to stay safe
Latest in Security
ransomware avast
Ransomware attacks are costing Government offices a month of downtime on average
Lock on Laptop Screen
Data breach at Pennsylvania education union potentially exposes 500,000 victims
Data leak
Top collectibles site leaks personal data of nearly a million users
Spyware
Stalkerware data breach potentially hits over 2 million users, including thousands of Apple devices
An American flag flying outside the US Capitol building against a blue sky
Five Eyes "cannot replace US intel in Ukraine", claims former US Cyber Command Chief
Pirate skull cyber attack digital technology flag cyber on on computer CPU in background. Darknet and cybercrime banner cyberattack and espionage concept illustration.
Criminals are using a virtual hard disk image file to host and distribute dangerous malware
Latest in News
Citroen 2CV
The retro EV resurgence is in full swing, as Citroen confirms the iconic 2CV will return with batteries
Hugging Snap
This AI app claims it can see what I'm looking at – which it mostly can
Apple iPhone 16 Pro Max REVIEW
The latest batch of leaked iPhone 17 dummy units appear to show where glass meets metal on the new designs
Hornet swings their weapon in mid air
Hollow Knight: Silksong could potentially launch this year and I reckon it could be a great game for an Xbox handheld
ransomware avast
Ransomware attacks are costing Government offices a month of downtime on average
Cassian looking at someone off-camera from a TIE fighter cockpit in Andor season 2
Star Wars: Andor creator is taking a stance against AI by canceling plans to release its scripts, and I completely get why