ZeroFont Phishing Ataque Shunt Escritório 365 Segurança

imagem ataque ZeroFont phishing

A nova tática de hackers perigoso foi identificado como o ataque de phishing ZeroFont que é responsável por infecções causadas pelo Gabinete 365 manipulação. This is done by using social engineering tactics that manipulate the users into interacting with attached documents containing zero-size fonts. This technique has proved successful and is being leveraged in an ongoing attack against targets worldwide.

ZeroFont Phishing Attack Leverages Office 365 against Users

The security researchers that revealed information on the ZeroFont phishing attack showcased that the main delivery method are direct messages that have been able to fool several anti-SPAM filters. Recipients receive email messages that look like legitimate notifications from popular services. The hackers use text and graphics taken and design the emails using the same methods. The phishing attack is marked unique as it uses an entirely new way of scamming people into interacting with the dangerous elements. According to the researchers one of the key characteristics is the use of Office 365 as the cloud service. The following steps are made by the hacker operators behind the campaign:

  1. The criminals look orchestrate the campaign against Office 365 email users. They may profile them using harvested information or work together with groups that have their personal information in order to create personalized mesages.
  2. The messages are sent to Office 365 servers and bypass Microsoft’s algorithms by using a natural language processing bypass.
  3. The users receive messages in their Inbox that appear as standard security notifications.

The most concerning fact is that the hackers have been able to discover a way to go around Microsoft’s SPAM filters. This is done by emulating the design elements of real legitimate messages such as the watermarks, copyright notices and etc. The messages are constructed so that they can correlate with the sender and recipients, as well as fit into contexts that can present a real customer or service issue. The captured samples appear to impersonate 365 quota limit notifications.

The reason why the attacks are calledZeroFontis due to a novel technique that utilizes zero-size font content. Random text strings are inserted into the messages and programmed with a font size 0, this is interpreted by the email servers and the graphical user interfaces in the correct way. These text strings are not visible to the users. At the same time the algorithm reads the hidden text and flags it as safe content that is delivered to the recipients.

Story relacionado: LinkedIn golpes de phishing - Como detectar e evitar spam e-mails

Consequences of The ZeroFont Phishing Attack: Beyond Office 365

The ZeroFont phishing attack represents the latest novel approach that hackers are taking in delivering counterfeit messages to their prescribed targets. A weakness has been found in Microsoft’s algorithm that handles natural language processing through font size modification of random letters. Public disclosures about such high-impact vulnerabilities are posted by security researchers after the company has addressed the issue.
Use of this technique can be directed against other email hosting services and cloud software. The criminal groups can use it for malicious actions such as the following:

  • Ransomware Deployment — The hackers can send viruses through emails by either attaching them directly as files or hyperlinking them in the body contents.
  • Malware Redirect — Such email messages can be used to redirect the victims to hacker-controlled sites.
  • Mensagens de SPAM — By overcoming the associated SPAM filters companies, hackers and other interested parties can deliver personalized and non-personalized messages for advertisement purposes.

At this point there is no information about the number of affected files nor the hackers that are leveraging the ZeroFont phishing attack.


Martin Beltov

Martin formou-se na publicação da Universidade de Sofia. Como a segurança cibernética entusiasta ele gosta de escrever sobre as ameaças mais recentes e mecanismos de invasão.

mais Posts

Me siga:

Deixe um comentário

seu endereço de e-mail não será publicado. Campos obrigatórios são marcados *

limite de tempo está esgotado. Recarregue CAPTCHA.

Compartilhar no Facebook Compartilhar
Compartilhar no Twitter chilrear
Compartilhar no Google Plus Compartilhar
Partilhar no Linkedin Compartilhar
Compartilhar no Digg Compartilhar
Compartilhar no Reddit Compartilhar
Partilhar no StumbleUpon Compartilhar