Microsoft 365 Anti-phishing Feature Bypassed Using CSS Style Tags

Phishing is the supreme manner for an attacker to infiltrate an organization. Several assault systems and systems will more than likely be found in for an attacker to send a phishing electronic mail.
On the opposite hand, electronic mail purchasers resembling Outlook or Gmail even own safety features to warn users at any time when they in discovering an unknown electronic mail.
One such security measure is the “First Contact Security Tip,” which alerts Outlook users at any time when they in discovering an electronic mail from an unknown sender.
This alert warns the user, “You don’t fundamentally salvage electronic mail from [email protected]. Study why right here is important.”

This electronic mail helps many users dwell far from unknown senders or phishing emails. This characteristic is one of many a bunch of systems obtainable for anti-phishing in Exchange On-line and Microsoft Defender that can even be feeble by organizations the use of Build of enterprise 365.
On the opposite hand, researchers own realized a manner to avoid this warning, which is ready to construct the phishing electronic mail extra legitimate and thereby enable the user to work on the side of its contents or attachments.
Bypassing “First Contact Security Tip”
Outlook prepends the “First Contact Security Tip” to the physique of an HTML electronic mail. This kind that an attacker can alter the sort it is displayed to the victim user by the use of CSS-type tags.
The proof of theory interesting hiding the “First Contact Security Tip” message in the HTML electronic mail. The researchers may well well also also alternate the background and font colors to white, which may well well well conceal the alert from the end user.
...[SNIP]...
In addition, the researchers had been also in a yelp to spoof the icons that Microsoft Outlook provides to encrypted and /or signed emails. The code below is one other proof of theory for spoofing the signed icons.
...[SNIP]...
#mainTable {
width: 100%;
z-index: 1;
margin-bottom: 1em;
}
#signedBy {
font-size: 0.9em;
}
.badge {
width: 2.8em;
text-align: right;
}
Signed By nimmerrichtermarc@gmail․com |

As a matter of truth, the string with “Signed By [email protected]” does no longer use a normal interval (.). As a replace, it uses a Unicode persona U+2024 alongside which the legitimate pictures are hooked up.
The use of this unicode persona makes Outlook detect it as an electronic mail address and generate an mailto hyperlink that is likely to be completely different from the usual text we strive to spoof.
On the opposite hand, attentive users are highly likely to peek the difference in formatting. Many users don’t pay great consideration to this and can mild tumble victim to phishing attacks.
In accordance to Microsoft’s response, Microsoft has no longer addressed this habits for now.
Microsoft’s response to the researchers, dated February 14, 2024, states, “We obvious your discovering is legitimate however does no longer meet our bar for immediate servicing, serious about right here is mainly relevant for phishing attacks. On the opposite hand, we’ve mild marked your discovering for future review as a likelihood to enhance our merchandise.”
It may well well perhaps be vital for all users to pay extra consideration to phishing emails and uncover about any alternate in layout or malicious links got in emails. Attain no longer click on on unknown links or download any attachments from unknown senders.
Source credit : cybersecuritynews.com