Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityLogical SecuritySecurity & Business Resilience

Email obfuscation tactics elude security protections

By J Stephen Kowski
Email app on phone

Image via Unsplash

June 19, 2024

Cyber attackers have used email obfuscation techniques for decades to conceal malicious code or data within a file, script or network traffic. There are many email obfuscation methods, such as putting addresses into images, captchas or texts that bots cannot read. Such traditional email obfuscation tactics are well known, and security controls have historically been good at patching and stopping them. But recently our threat researchers have uncovered some newly evolving techniques that are designed to evade modern security controls. Below, we detail this new attack technique including real-world examples our researchers have observed.

JavaScript-based obfuscation involves addresses that are dynamically placed onto a webpage, effectively hiding them from bots. Attackers can set an ID for the HTML tag containing the email address, with the email encoded in base64, a binary-to-text encoding scheme. Base64 represents binary data in an ASCII string format by translating it into a visual representation to ensure that humans can read the printable data. 

The hidden encoding is designed to carry binary data across channels that can only reliably support text content, making it an ideal choice for embedding binary data within scripts or HTML documents. Encoding text into character sets like base64 is an effective obfuscation technique because obfuscation through encoding makes the analysis and detection of malicious content more difficult for security tools and analysts. Attackers leverage base64 and similar encoding techniques to hide malware, evade filters, embed malicious code and facilitate data exfiltration.

New phishing attacks incorporate homographic techniques

When designing an attack, the attackers will ask themselves, “How can I create content in a way that is clearly visible and understandable to the user, but the technical controls won’t be able to make sense of it?”

One effective way of doing so involves a homograph attack, which is a type of cyberthreat that exploits the similarity between characters from different scripts to deceive users into visiting malicious websites or opening harmful files. This technique relies on the use of homographs, which are characters that look alike but belong to different character sets, such as Latin and Cyrillic alphabets.

For example, an attacker might register a domain that visually resembles a legitimate domain by substituting similar-looking characters from different alphabets. The deceptive domain can then be used in phishing emails to trick users into believing they are visiting a trusted site. When recipients of the email click on the link, they may be led to a site that installs malware on their device or steals sensitive information.

Homograph attacks are particularly dangerous because they can be difficult to detect with a casual glance, making even the most alert users susceptible to phishing attempts. One example of the new threat we have identified involves the real-world advanced attack seen below that was sent to a company CFO in three layers, including homograph techniques, base64 encoding and CDN obfuscated credential harvesting pages.

Email screenshotFigure 1: Redacted example of the new email obfuscation technique. This phishing email appears to be an innocuous work order hosted in SharePoint that needs review by the CFO: “You have one(1) file awaiting your review on SharePoint.” Image courtesy of Kowski


In the subject line, we find utf-8 encoded characters “‚Äã‚Äã‚Äã‚Äã” repeated between each highlighted letter of the subject:

Email subject lineImage courtesy of Kowski


The attacker has crafted a subject line that looks like “Important Notice” to the human eye. Yet the technical controls see a somewhat random pattern of character strings. This strategy borrows inspiration from the old homograph attacks that swapped a lower case ‘L’ for an upper case ‘i’ in a domain name.

When the body of this email is viewed in an Image or Plaintext view, there isn’t much to see. But when you use the HTML view to peer behind it to the original message, you can see the body of this attack. In this situation, you won’t see a clear message, you will see a base64 encoded set of data. This tactic makes the body of this message unintelligible unless it is rendered by tools designed to decode this data, such as a browser or an HTML-rendered preview in your email client of choice.

Spoofed Cloudflare CDN message Figure 2: Image of a spoofed Cloudflare CDN message that requires the user to check a box in order to proceed. Image courtesy of Kowski


The web link provides the last piece of this puzzle, with obfuscation techniques delivered through a Content Delivery Network or CDN, which is a distributed network of servers that cache website content to speed data delivery. CDN tools have opened the floodgates to attackers, making it very economical to frustrate legacy security controls. Newer security protections must move past this CDN page to the true destination, where the malicious intent of the real page can be analyzed.

From this threat analysis, we can conclude that these new sophisticated attacks involve three different evasive obfuscation techniques and malicious email content. Therefore, security solutions must enable users to view attacks in these various formats and download original messages for more in-depth scrutiny. As attackers continue to refine their methods, the arms race will only persist between cybersecurity teams and bad actors, highlighting the need for vigilance, education and cutting-edge technology to secure our digital world.

KEYWORDS: email security email spoofing phishing phishing campaigns research threat landscape

Share This Story

J stephen kowski headshot

J Stephen Kowski is a Field CTO at SlashNext. Image courtesy of Kowski 

Blog Topics

Security Blog

On the Track of OSAC

Blog Roll

Security Industry Association

Security Magazine's Daily News

SIA FREE Email News

SDM Blog

Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing