Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New Phishing Attack Using Invisible Characters Hidden in Subject Line Using MIME Encoding

Posted on October 29, 2025October 29, 2025 By CWS

Cybercriminals have developed a classy phishing method that exploits invisible characters embedded inside e-mail topic traces to evade automated safety filters.

This assault technique leverages MIME encoding mixed with Unicode comfortable hyphens to disguise malicious intent whereas showing legit to human readers.

The method represents an evolution in social engineering ways, concentrating on e-mail filtering mechanisms that depend on key phrase detection and sample matching.

The assault surfaced when safety researchers found phishing messages with topic traces displaying uncommon habits in e-mail purchasers. When seen within the message listing, the topic appeared garbled or incomplete, however upon opening the e-mail, the textual content rendered as regular, readable content material.

This discrepancy indicated the presence of invisible characters strategically inserted all through the topic line to interrupt up recognizable key phrases and patterns.

The marketing campaign primarily targets credential theft by way of faux webmail login pages. Victims obtain emails with topics like “Your Password is about to Expire,” the place invisible characters fragment these set off phrases that will sometimes alert safety programs.

Electronic mail topic line show comparability exhibiting regular rendering regardless of invisible character insertion (Supply – Web Storm Middle)

The phishing messages direct recipients to compromised domains internet hosting generic credential harvesting portals designed to seize login data.

Web Storm Middle analysts recognized this system whereas reviewing malicious messages delivered to their handler inbox.

The invention highlighted a comparatively unusual software of invisible character obfuscation, significantly inside e-mail topic traces relatively than message our bodies alone.

Technical Implementation and Evasion Mechanism

The attackers implement this system by way of MIME encoded-word formatting as laid out in RFC 2047.

The topic line construction follows the sample encoded-word = “=?” charset “?” encoding “?” encoded-text, the place content material is UTF-8 character set knowledge encoded in Base64 format.

Evaluation of captured samples revealed topic headers formatted as:-

Topic: =?UTF-8?B?WcKtb3XCrXIgUMKtYXPCrXN3wq1vwq1yZCBpwq=?UTF-8?B?dMKtbyBFwq14wq1wwq1pcsKtZQ==?=

When decoded, the strings include comfortable hyphen characters (Unicode U+00AD, HTML entity ­) inserted between particular person letters.

Decoded MIME header revealing Base64 encoded topic with embedded comfortable hyphens (Supply – Web Storm Middle)

These characters stay invisible in most e-mail purchasers, together with Outlook, successfully fragmenting key phrases like “password” into “p-a-s-s-w-o-r-d” on the code stage whereas displaying usually to customers.

The method extends past topic traces into message our bodies, the place comfortable hyphens break up whole phrases to defeat content material scanning engines.

Captured phishing URLs pointed to compromised legit domains internet hosting credential theft pages formatted as generic webmail login interfaces.

Comply with us on Google Information, LinkedIn, and X to Get Extra Instantaneous Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Attack, Characters, Encoding, Hidden, Invisible, Line, MIME, Phishing, Subject

Post navigation

Previous Post: Tata Motors Data Leak – 70+ TB of Sensitive Info and Test Drive Data Exposed via AWS Keys
Next Post: New Android Malware Herodotus Mimic Human Behaviour to Bypass Biometrics Detection

Related Posts

29.7 Tbps DDoS Attack Via Aisuru botnet Breaks Internet With New World Record Cyber Security News
RondoDox Botnet Updated Their Arsenal with 650% More Exploits Targeting Enterprises Cyber Security News
RondoDox Botnet Exploits 50+ Vulnerabilities to Attack Routers, CCTV Systems and Web Servers Cyber Security News
Microsoft Scripting Engine 0-Day Vulnerability Enables Remote Code Execution Over Network Cyber Security News
APT41 Hackers Leveraging Atexec and WmiExec Windows Modules to Deploy Malware Cyber Security News
Threat Actors Leveraging compromised RDP Logins to Deploy Lynx Ransomware After Deleting Server Backups Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Cybersecurity News Weekly Newsletter – Windows, Chrome, and Apple 0-days, Kali Linux 2025.4, and MITRE Top 25
  • CISA Warns of Windows Cloud Files Mini Filter 0-Day Vulnerability Exploited in Attacks
  • 7 Best Security Awareness Training Platforms For MSPs in 2026
  • Google Warns Multiple Hacker Groups Are Exploiting React2Shell to Spread Malware
  • Empire 6.3.0 Launches With New Features for Red Teams and Penetration Testers

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Cybersecurity News Weekly Newsletter – Windows, Chrome, and Apple 0-days, Kali Linux 2025.4, and MITRE Top 25
  • CISA Warns of Windows Cloud Files Mini Filter 0-Day Vulnerability Exploited in Attacks
  • 7 Best Security Awareness Training Platforms For MSPs in 2026
  • Google Warns Multiple Hacker Groups Are Exploiting React2Shell to Spread Malware
  • Empire 6.3.0 Launches With New Features for Red Teams and Penetration Testers

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark