+44 (0)203 88 020 88

Menu

Search

Cyber Security News & Articles

 

Cyber Security
News & Articles

Trusted Cyber Security Experts
25+ Years Industry Experience
Ethical, Professional & Pragmatic

New Phishing techniques avoid detection with fake web fonts

svg phishing attack fonts

Endpoints and security gateway appliances use a variety of techniques to attempt to identify Phishing websites that are trying to steal login credentials from unsuspecting users.

A typical phishing website may appear to the average human to be a login page for a well-known service, such as Gmail, Dropbox or your cloud-hosted ERP system.  Users who are tricked into visiting that website, by clicking a link in a fraudulent email for example, will very often be coerced into providing their login details to cyber-criminals if they attempt to login on the phishing website.

The first generation of phishing protection attempted to detect the copy of the well-known login pages being used against the wrong URL. For example, a copy of the GMail login page being loaded from a webserver on a domain name of “fakegmail.com”.

Cyber criminals responded to this by obfuscating the HTML of the phishing websites through Javascript functions to encode the HTML, so that what gets downloaded to the user’s browser is simply a large blob of data. The user’s web browser decodes the JavaScript locally before rendering the HTML for the fake login page. In turn, security vendors responded by adding features to their products which looked for the large blobs of encoded data as a warning sign and vendors even tried to decoding the data on-the-fly, in order to check the purpose of the HTML and whether or not it was a known phishing page.

More recently, cybercriminals have responded with a new generation of phishing tools that do not use Javascript to obfuscate the webpage content.  According to proofpoint, the latest technique involves using a combination of CSS and customised web fonts to encrypt and then decode the webpage text.  The lack of obvious JavaScript obfuscation techniques means the current generation of anti-phishing tools may not detect this new attack vector. This new technique has also been seen in the wild with SVG instructions in the HTML that draw the logos of the bank which the phishing page is meant to be emulating.  As a result, this means that the data downloaded to the user’s browser from the phishing server contains none of the wording from the fake login page, nor any of the well-known graphic images for logos which security software would be looking for. Only when the CSS is processed and the SVG instructions are rendered in the users web browser, after it has passed through the security gateways, will the fake login page become recognisable to the end-user.

Security vendors will likely upgrade their systems to detect this new attack vector in the near future; however, this serves as a useful reminder of the boundless creativity of cyber-criminals and the danger of assuming the systems that protected your network effectively last month, are still as effective today.

Subscribe to our monthly newsletter today

If you’d like to stay up-to-date with the latest cyber security news and articles from our technical team, you can sign up to our monthly newsletter. 

We hate spam as much as you do, so we promise not to bombard you with emails. We’ll send you a single, curated email each month that contains all of our cyber security news and articles for that month.

Why Choose SecureTeam?

CREST
CCS
ISO9001
ISO27001
CE-PLUS

Customer Testimonials

“We were very impressed with the service, I will say, the vulnerability found was one our previous organisation had not picked up, which does make you wonder if anything else was missed.”

Aim Ltd Chief Technology Officer (CTO)

"Within a very tight timescale, SecureTeam managed to deliver a highly professional service efficiently. The team helped the process with regular updates and escalation where necessary. Would highly recommend"

IoT Solutions Group Limited Chief Technology Officer (CTO) & Founder

“First class service as ever. We learn something new each year! Thank you to all your team.”

Royal Haskoning DHV Service Delivery Manager

“We’ve worked with SecureTeam for a few years to conduct our testing. The team make it easy to deal with them; they are attentive and explain detailed reports in a jargon-free way that allows the less technical people to understand. I wouldn’t work with anyone else for our cyber security.”

Capital Asset Management Head of Operations

“SecureTeam provided Derbyshire's Education Data Hub with an approachable and professional service to ensure our schools were able to successfully certify for Cyber Essentials. The team provided a smooth end-to-end service and were always on hand to offer advice when necessary.”

Derbyshire County Council Team Manager Education Data Hub

“A very efficient, professional, and friendly delivery of our testing and the results. You delivered exactly what we asked for in the timeframe we needed it, while maintaining quality and integrity. A great job, done well.”

AMX Solutions IT Project Officer

“We were very pleased with the work and report provided. It was easy to translate the provided details into some actionable tasks on our end so that was great. We always appreciate the ongoing support.”

Innovez Ltd Support Officer

Get in touch today

If you’d like to see how SecureTeam can take your cybersecurity posture to the next level, we’d love to hear from you, learn about your requirements and then send you a free quotation for our services.

Our customers love our fast-turnaround, “no-nonsense” quotations – not to mention that we hate high-pressure sales tactics as much as you do.

We know that every organisation is unique, so our detailed scoping process ensures that we provide you with an accurate quotation for our services, which we trust you’ll find highly competitive.

Get in touch with us today and a member of our team will be in touch to provide you with a quotation. 

0

No products in the basket.

No products in the basket.