Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Email Security

Phishers Use Zero-Width Spaces to Bypass Office 365 Protections

A recently addressed vulnerability in Office 365 allowed attackers to bypass existing phishing protections and deliver malicious messages to victims’ inboxes. 

A recently addressed vulnerability in Office 365 allowed attackers to bypass existing phishing protections and deliver malicious messages to victims’ inboxes. 

The issue, cloud security firm Avanan says, resided in the use of zero-width spaces (ZWSPs) in the middle of malicious URLs within the RAW HTML of the emails. This method breaks the URLs, thus preventing Microsoft’s systems from recognizing them and also preventing Safe Links from successfully protecting users.

What’s more, these zero-width spaces don’t render, meaning that the recipient would not notice the random special characters in the URL. The first wave of emails abusing this vulnerability was observed on November 10, and Microsoft addressed the issue on January 9, Avanan’s security researchers say. 

The vulnerability apparently rendered all Office 365 users vulnerable to phishing attacks, even those who were using Microsoft’s Office 365 Advanced Threat Protection. Both URL reputation check and Safe Links protections are bypassed in the attack. 

“The vulnerability was discovered when we noticed a large number of hackers using zero-width spaces (ZWSPs) to obfuscate links in phishing emails to Office 365, hiding the phishing URL from Office 365 Security and Office 365 ATP,” the security researchers say.

ZWSPs, Avanan explains, are characters that render to spaces of zero-width, and can be looked at as “empty space” characters. There are 5 ZWSP entities, namely ​ (Zero-Width Space), ‌ (Zero-Width Non-Joiner), ‍ (Zero-Width Joiner),  (Zero-Width No-Break Space), and 0 (Full-Width Digit Zero).

Although in their raw HTML form the ZWSPs appear like “a mishmash of numbers and special characters randomly inserted between the letters a word or a URL,” they are invisible when rendered in the browser, thus making the URL to appear as standard. 

ZWSPs, the researchers explain, are part of formatting the Internet every day, being used for fingerprinting articles and documents, formatting foreign languages, and breaking long words at the end of a line and continuing them on the next line. 

Advertisement. Scroll to continue reading.

As part of the observed phishing attacks, “the Zero-Width Non-Joiner (‌) is added to the middle of a malicious URL within the RAW HTML of an email,” Avanan notes. Thus, the email processing system would not recognize the URL as legitimate and would fail to apply protections. 

As soon as the victim clicks on the link in the email, however, they are taken to a credential harvesting phishing site mimicking that of Chase Bank.

The new attack, which Avanan refers to as Z-WASP, is an evolution of previously observed attempts to bypass Office 365 security either by splitting the URL into base and href tags (baseStriker) or by adding characters with font-size 0 (the ZeroFont attack).

Related: Office 365, Outlook Credentials Most Targeted by Phishing Kits

Related: Phishers Use ‘ZeroFont’ Technique to Bypass Office 365 Protections

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this event as we dive into threat hunting tools and frameworks, and explore value of threat intelligence data in the defender’s security stack.

Register

Learn how integrating BAS and Automated Penetration Testing empowers security teams to quickly identify and validate threats, enabling prompt response and remediation.

Register

People on the Move

SpecterOps has appointed Tim Bender as CFO, Pat Sheridan as CRO, and Bryce Hein as CMO.

CISA has officially announced the appointment of Madhu Gottumukkala as its new deputy director.

Cloud and cybersecurity MSP Ekco has appointed Ben Savage as UK CEO.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.