Email salting attacks: the whats, whys, and hows
Threat actors always prefer staying a step ahead of the cybersecurity mechanisms. Just when brands and organizations were feeling relieved, a whole new email-based threat attack entered the scene. Known as the email salting attack, it is a clever and sophisticated move by threat actors to bypass email security measures and spam filters. The core purpose of this attacking strategy is to evade detection mechanisms and carry out malicious tasks such as business email compromise, ransomware attacks, phishing email delivery, and social engineering attacks. Reputed names such as Norton LifeLock and Wells Fargo have already fallen prey to email salting attacks.
This blog aims to explore this newly emerging attack tactic that currently poses a huge threat to email communication systems across the globe.
Email salting attack: definition
An email salting attack is a powerful technique used by threat actors to insert hidden texts in the email content so that detection systems and security mechanisms fail to identify them. It is highly effective against spam filters and parsers that are dependent on specific keywords.
Cyberattackers very smartly use the features of HTML and CSS to insert comments and keywords that can go undetected by cybersecurity systems. These irrelevant and malicious texts can successfully impact the efficiency of security systems and email parsers, thereby leading to threat attacks through email communications. There are multiple ways through which email salting attacks are carried out. As a result, this latest threat attack tactic is giving a hard time to cybersecurity experts.
Traditionally, the salting tactic was not used to carry out malicious activities. Rather, it was used to strengthen the passwords to boost security. However, threat actors have started using this strategy against security mechanisms to penetrate email ecosystems.
Cybercriminals use email salting attacks primarily for:
- Bypassing spam filters by inserting hidden texts.
- Increasing the chances of malicious email delivery into inboxes instead of spam folders.
- Evading different email analysis tools that are reliant on specific patterns and keywords.
Types of email salting techniques
There are four major types of email salting techniques popular among threat actors. These are:
1. Hidden text salting
This email salting attack involves the insertion of unclear or hidden texts into emails. These hidden messages can include:
White texts
It is impossible to detect or decipher any white text that is written on a white background. This is a popular hidden text salting tactic used by threat actors to sneak in malicious texts.
Invisible Unicode characters
Zero-width characters or Unicode characters are easily inserted within email content in order to evade spam filters and parsers that depend on keywords for successful spam detection.
Commands
Commands like font-size:0 and display: none are also used to manipulate CSS properties, thereby hiding spammy texts.
2. Bayesian poisoning
Another smart email salting attack technique involves the insertion of random words that are harmless in nature into email content. The goal is to bypass Bayesian spam filters. These spam filters work on the principle of Bayesian probability to distinguish genuine messages from email spam. Threat actors try to evade these filters by inserting well-planned strings of words or even random words so that the emails are not flagged or delivered into spam folders. The Bayesian poisoning tactics make the malicious email appear superficially safe.
3. Email header salting
This technique involves the insertion of misleading information in the Reply-to or Return-path fields of an email with the goal of modifying email headers. By manipulating the email headers, it gets easy for threat actors to bypass detection systems. This technique makes the malicious emails appear legitimate.
4. Unicode homoglyph attacks
This is another highly effective email salting technique that involves replacing genuine email content with malicious characters. It is impossible to detect any kind of tampering through the naked eye. For example, threat actors effectively replace ‘m’ with ‘rn’ to evade detection strategies.
How do email salting attacks work?
Threat actors aim to achieve different malicious goals, such as data theft, financial fraud, and phishing. This is how email salting attacks are carried out step by step:
Target identification
First of all, the threat actors carry out detailed research about their victims by using social engineering tactics. The idea is to understand the communication patterns of the target closely.
Email manipulation
Next, lookalike email addresses are created by subtly altering the username or domain.
Message crafting
The threat actors pay extra attention to make the email sound convincing to the real sender. The email content can revolve around a fake login alert, an urgent request for payment, or even an invitation to click on a malicious link.
Delivery and deception
Next, upon receiving the email, the victim may think of it as legitimate and click on the link or share sensitive data.
Exploitation
Now, the threat actor can easily steal user credentials, share sensitive data, or install malware.
How to mitigate email salting attacks?
It is possible to mitigate email salting attacks by implementing the below-mentioned strategies:
Visual content analysis
Visual content analysis can easily identify hidden messages within emails. It is a highly effective tactic to detect invisible texts and commands.
Advanced filtering
This is a complete game-changer strategy to successfully detect email salting attacks. With advanced filtering systems, it gets easier to identify unusual HTML structures and hidden texts. Filtering tactics can be used to detect questionable commands such as visibility: hidden and display: none. With these filtering systems, it is possible to analyze the HTML source structures. By evaluating the structure, one can detect unnecessary usage of inline styles or hidden elements.
AI and machine learning
Artificial Intelligence can effectively mitigate email salting threats. There are multiple AI-driven tools that can help identify email salting attack trends. Implementing SPF, DKIM, and DMARC can help mitigate email salting attacks by ensuring email authentication, preventing domain spoofing, and blocking malicious emails before they reach the recipient’s inbox.
Wrapping up!
It is possible to evade email salting attacks by staying vigilant and adopting the right security protocols. Also, training employees can help identify suspicious emails. With such sophisticated cyberattacking strategies coming up every now and then, the only way to safeguard your system and data is to stay aware and take proactive measures to strengthen your email defense mechanism.