Friday, May 9, 2025
HomeCyber Security NewsHackers Use Hidden Text Salting to Bypass Spam Filters and Evade Detection

Hackers Use Hidden Text Salting to Bypass Spam Filters and Evade Detection

Published on

SIEM as a Service

Follow Us on Google News

In the latter half of 2024, Cisco Talos identified a significant increase in email threats leveraging “hidden text salting,” also referred to as HTML poisoning.

This deceptive yet effective technique enables cybercriminals to bypass email parsers, confuse spam filters, and evade detection engines by embedding hidden, non-visible text into email content.

Email Threats Using Hidden Text Salting

The method relies on exploiting HTML and CSS properties to conceal elements that can interfere with keyword-based detection and filtering mechanisms.

- Advertisement - Google News

Talos highlighted the wide adoption of this tactic for purposes such as brand impersonation, language manipulation, and HTML smuggling.

Are you from SOC/DFIR Teams? - Analyse Malware Files & Links with ANY.RUN Sandox -> Try for Free

Hidden text salting capitalizes on the flexibility of HTML and CSS to insert characters or content that remain invisible when emails are rendered by clients but retain their textual properties in the backend.

A spear phishing email with an HTML attachment.
A spear phishing email with an HTML attachment.

One approach involves using CSS properties like display: inline-block with a width set to zero or applying overflow: hidden to conceal data.

For example, phishing campaigns impersonating brands such as Wells Fargo have embedded irrelevant characters between letters to disrupt brand name extraction by detection systems.

A phishing email impersonating the Wells Fargo brand.
A phishing email impersonating the Wells Fargo brand.

Another variant identified involves inserting invisible Unicode characters like Zero-Width Space (ZWSP) or Zero-Width Non-Joiner (ZWNJ) between text strings techniques observed in emails impersonating organizations like Norton LifeLock.

Despite being undetectable to the human eye, these characters affect how parsers analyze the text, effectively bypassing spam filters.

In some cases, attackers utilized hidden text salting to confuse language-detection systems.

Talos noted an example where a phishing email targeting a victim in English was identified as French by Microsoft’s Exchange Online Protection (EOP) service due to embedded hidden French text.

Attackers leveraged CSS properties to hide these additional linguistic elements, tricking language-based detection mechanisms.

HTML smuggling was also observed as a significant use case for this technique.

Attackers inserted irrelevant comments within base64-encoded characters in email attachments to obfuscate malicious payloads.

This approach hindered parsers from accurately piecing together and decoding the content, effectively evading detection systems.

To counteract the growing threat of hidden text salting, advanced filtering techniques are essential. Detection systems must be designed to examine suspicious CSS properties like visibility: hidden and display: none.

Additionally, analyzing structural anomalies within HTML, such as excessive inline styles or unusual element nesting, can uncover attempts to conceal malicious text.

Organizations may also benefit from incorporating visual analysis into email threat detection, as reliance solely on text-based methods leaves room for exploitation.

AI-powered solutions like Secure Email Threat Defense offer comprehensive protection by leveraging deep learning and Natural Language Processing (NLP) to monitor email content, including text and images, for hidden threats.

Such systems enhance resilience against evolving email-based threats by providing detailed insight into malicious techniques, pinpointing business risks, and categorizing vulnerabilities.

As cybercriminals continue to refine their evasion methods, sustained advancements in email security technology remain critical to mitigating the risks posed by tactics like hidden text salting.

Integrating Application Security into Your CI/CD Workflows Using Jenkins & Jira -> Free Webinar

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Critical Vulnerability in Ubiquiti UniFi Protect Camera Allows Remote Code Execution by Attackers

Critical security vulnerabilities in Ubiquiti’s UniFi Protect surveillance ecosystem-one rated the maximum severity score...

IXON VPN Client Vulnerability Allows Privilege Escalation for Attackers

A critical security vulnerability in IXON’s widely used VPN client has exposed Windows, Linux,...

Cisco IOS Software SISF Vulnerability Could Enable Attackers to Launch DoS Attacks

Cisco has released security updates addressing a critical vulnerability in the Switch Integrated Security...

Seamless AI Communication: Microsoft Azure Adopts Google’s A2A Protocol

Microsoft has announced its support for the Agent2Agent (A2A) protocol, an open standard developed...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Critical Vulnerability in Ubiquiti UniFi Protect Camera Allows Remote Code Execution by Attackers

Critical security vulnerabilities in Ubiquiti’s UniFi Protect surveillance ecosystem-one rated the maximum severity score...

IXON VPN Client Vulnerability Allows Privilege Escalation for Attackers

A critical security vulnerability in IXON’s widely used VPN client has exposed Windows, Linux,...

Cisco IOS Software SISF Vulnerability Could Enable Attackers to Launch DoS Attacks

Cisco has released security updates addressing a critical vulnerability in the Switch Integrated Security...