Have you been attacked? Digitpol the global investigation firm can help you, visit Digitpol’s website to learn more.
A recently addressed vulnerability in Office 365 allowed attackers to bypass existing phishing protections and deliver malicious messages to victims’ inboxes.
The issue, cloud security firm Avanan says, resided in the use of zero-width spaces (ZWSPs) in the middle of malicious URLs within the RAW HTML of the emails. This method breaks the URLs, thus preventing Microsoft’s systems from recognizing them and also preventing Safe Links from successfully protecting users.
What’s more, these zero-width spaces don’t render, meaning that the recipient would not notice the random special characters in the URL. The first wave of emails abusing this vulnerability was observed on November 10, and Microsoft addressed the issue on January 9, Avanan’s security researchers say.
The vulnerability apparently rendered all Office 365 users vulnerable to phishing attacks, even those who were using Microsoft’s Office 365 Advanced Threat Protection. Both URL reputation check and Safe Links protections are bypassed in the attack.
“The vulnerability was discovered when we noticed a large number of hackers using zero-width spaces (ZWSPs) to obfuscate links in phishing emails to Office 365, hiding the phishing URL from Office 365 Security and Office 365 ATP,” the security researchers say.
ZWSPs, Avanan explains, are characters that render to spaces of zero-width, and can be looked at as “empty space” characters. There are 5 ZWSP entities, namely (Zero-Width Space), (Zero-Width Non-Joiner), (Zero-Width Joiner), (Zero-Width No-Break Space), and ０ (Full-Width Digit Zero).
Although in their raw HTML form the ZWSPs appear like “a mishmash of numbers and special characters randomly inserted between the letters a word or a URL,” they are invisible when rendered in the browser, thus making the URL to appear as standard.
ZWSPs, the researchers explain, are part of formatting the Internet every day, being used for fingerprinting articles and documents, formatting foreign languages, and breaking long words at the end of a line and continuing them on the next line.
As part of the observed phishing attacks, “the Zero-Width Non-Joiner () is added to the middle of a malicious URL within the RAW HTML of an email,” Avanan notes. Thus, the email processing system would not recognize the URL as legitimate and would fail to apply protections.
As soon as the victim clicks on the link in the email, however, they are taken to a credential harvesting phishing site mimicking that of Chase Bank.
The new attack, which Avanan refers to as Z-WASP, is an evolution of previously observed attempts to bypass Office 365 security either by splitting the URL into base and href tags (baseStriker) or by adding characters with font-size 0 (the ZeroFont attack).