Raleigh, NC

32°F
Broken Clouds Humidity: 89%
Wind: 1.54 M/S

Hackers Leverage CSS to Bypass Spam Filters and Monitor Email Users

Hackers Leverage CSS to Bypass Spam Filters and Monitor Email Users

Cybercriminals are exploiting Cascading Style Sheets (CSS) to evade spam filters and track user activities

Cybercriminals are exploiting Cascading Style Sheets (CSS) to evade spam filters and track user activities, posing significant security and privacy risks, according to new research from Cisco Talos. 

"CSS features allow attackers and spammers to monitor user actions and preferences, even though email clients restrict certain dynamic content, like JavaScript," said Talos researcher Omid Mirzaei in a recent report. 

Building on previous findings about a surge in email threats using hidden text salting in late 2024, researchers found that attackers manipulate legitimate HTML and CSS features to insert hidden content that can bypass spam filters. Specifically, threat actors use CSS properties such as text-indent and opacity to conceal malicious content in email bodies, sometimes leading recipients to phishing sites. 

Additionally, CSS enables cybercriminals to track user behavior through spam emails. By embedding properties like the @media at-rule, attackers can conduct fingerprinting attacks, gathering details about recipients’ email clients, system configurations, and actions such as viewing or printing emails. 

"This technique allows threat actors to detect users' font and color preferences, language settings, and even screen resolution," Mirzaei noted. 

To counter these threats, experts recommend implementing advanced filtering techniques to detect hidden text manipulation and using email privacy proxies to protect users from CSS-based tracking. 

Image

With Cybersecurity Insights, current news and event trends will be captured on cybersecurity, recent systems / cyber-attacks, artificial intelligence (AI), technology innovation happening around the world; to keep our viewers fast abreast with the current happening with technology, system security, and how its effect our lives and ecosystem. 

Please fill the required field.