Article Details
Scrape Timestamp (UTC): 2024-08-07 05:04:07.701
Original Article Text
Click to Toggle View
Microsoft 365 anti-phishing feature can be bypassed with CSS. Researchers have demonstrated a method to bypass an anti-phishing measure in Microsoft 365 (formerly Office 365), elevating the risk of users opening malicious emails. Specifically, the anti-phishing measure that can be hidden is the 'First Contact Safety Tip,' which warns email recipients on Outlook when they receive a message from an unfamiliar address. Certitude analysts who discovered the flaw reported their findings to Microsoft, but the tech giant decided not to address it at this time. Hiding the warning The "First Contact Safety Tip" is a feature designed to alert Outlook users when they receive emails from new contacts. It displays a message that reads: "You don't often get email from xyz@example.com. Learn why this is important." The key aspect of this mechanism is that the alert is appended to the main body of the HTML email, opening up the potential for manipulation using CSS embedded in an email message. Certitude discovered that it's possible to hide this safety message by manipulating the CSS (Cascading Style Sheets) within the HTML of the email, as shown below: The role of each rule is the following: When this CSS is used in a phishing email sent from a new contact to a target, no alert shows up to warn the recipient. Taking the deception one step further, Certitude found that it's also possible to add more HTML code that spoofs the icons Microsoft Outlook adds to encrypted/signed emails to make them appear even more secure. Although some formatting limitations don't allow for a perfect visual result, the trick still creates a convincing false image of security that could easily pass anything less than careful inspections. The researchers told BleepingComputer that they have not observed any cases of active exploitation of the described method or found ways to manipulate the HTML so that arbitrary text is displayed in the email. Certitude sent Microsoft a proof of concept for the above techniques and a detailed report via the Microsoft Researcher Portal (MSRC). However, they received the following response from Microsoft: "We determined your finding is valid but does not meet our bar for immediate servicing considering this is mainly applicable for phishing attacks. However, we have still marked your finding for future review as an opportunity to improve our products." - Microsoft BleepingComputer has contacted Microsoft to learn more about its decision not to address the risk, but we have not received a response by publication.
Daily Brief Summary
Researchers have uncovered a method to bypass Microsoft 365's anti-phishing tool, potentially allowing malicious emails to go undetected.
The exploit involves using CSS to hide the "First Contact Safety Tip" warning in Outlook, designed to alert users about emails from new contacts.
Attackers can further manipulate the appearance of an email to mimic secure, encrypted messages, increasing the deception for unsuspecting users.
Microsoft acknowledges the flaw reported by Certitude analysts but has not prioritized an immediate fix, citing its application mainly in phishing scenarios.
There have been no observed active exploits using this technique, and there is no evidence of arbitrary text manipulation within emails.
This discovery leaves Microsoft 365 users vulnerable to more sophisticated phishing attacks if the flaws are harnessed by attackers.