home bbs files messages ]

Just a sample of the Echomail archive

Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.

   CONSPRCY      How big is your tinfoil hat?      2,445 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 813 of 2,445   
   Mike Powell to All   
   Criminals are using CSS t   
   19 Mar 25 09:17:00   
   
   TZUTC: -0500   
   MSGID: 526.consprcy@1:2320/105 2c400ae9   
   PID: Synchronet 3.20a-Linux master/acc19483f Apr 26 202 GCC 12.2.0   
   TID: SBBSecho 3.20-Linux master/acc19483f Apr 26 2024 23:04 GCC 12.2.0   
   BBSID: CAPCITY2   
   CHRS: ASCII 1   
   Criminals are using CSS to get around filters and track email usage   
      
   Date:   
   Tue, 18 Mar 2025 16:22:00 +0000   
      
   Description:   
   Hackers are building on their salting technique to bypass email protection,   
   track users, and redirect them to phishing pages.   
      
   FULL STORY   
      
   Cybercriminals are using CSS in emails to track their victims, learn more   
   about them, and redirect them to phishing pages, experts have warned.    
      
   Cybersecurity researchers at Cisco Talos outlined how CSS (Cascading Style   
   Sheets) is used in emails to control the design, layout, and formatting of   
   email content. Businesses use it not only to make the emails look better, but   
   also to keep the layout consistent across different email clients. There is   
   nothing inherently malicious about CSS but, as is the case with many other   
   legitimate tools, it is being abused in attacks.    
      
   "The features available in CSS allow attackers and spammers to track users'   
   actions and preferences, even though several features related to dynamic   
   content (e.g., JavaScript) are restricted in email clients compared to web   
   browsers ," a Cisco Talos researcher said in a report.   
      
   Advanced filtering techniques   
      
   Through CSS, cybercriminals can hide content in plain sight, thus bypassing   
   email security solutions. They can also use it to redirect people to phishing   
   pages, it was said. The tool can be used to monitor user behavior which, in   
   turn, can lead to spear-phishing or fingerprinting attacks.    
      
   "This abuse can range from identifying recipients' font and color scheme   
   preferences and client language to even tracking their actions (e.g., viewing   
   or printing emails)," they said. "CSS provides a wide range of rules and   
   properties that can help spammers and threat actors fingerprint users, their   
   webmail or email client, and their system. For example, the media at-rule can   
   detect certain attributes of a user's environment, including screen size,   
   resolution, and color depth."    
      
   Cisco Talos said the new campaign builds upon a hidden text salting one they   
   uncovered in late January 2025.    
      
   To tackle this threat , the researchers suggested IT teams adopt advanced   
   filtering techniques that scan the structure of HTML emails, rather than just   
   their contents. An email security solution could, thus, look for extreme use   
   of inline styles or CSS properties such as visibility: hidden. Deploying   
   AI-powered defenses is also recommended.    
      
    Via The Hacker News   
      
   ======================================================================   
   Link to news story:   
   https://www.techradar.com/pro/security/criminals-are-using-css-to-get-around-f   
   ilters-and-track-email-usage   
      
   $$   
   --- SBBSecho 3.20-Linux   
    * Origin: capitolcityonline.net * Telnet/SSH:2022/HTTP (1:2320/105)   
   SEEN-BY: 105/81 106/201 128/187 129/305 153/7715 154/110 218/700 226/30   
   SEEN-BY: 227/114 229/110 111 114 206 300 307 317 400 426 428 470 664   
   SEEN-BY: 229/700 705 266/512 291/111 320/219 322/757 342/200 396/45   
   SEEN-BY: 460/58 712/848 902/26 2320/0 105 3634/12 5075/35   
   PATH: 2320/105 229/426   
      

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca