A phishing with invisible characters in the subject line

    Published: 2025-10-28. Last Updated: 2025-10-28 10:12:32 UTC
    by Jan Kopriva (Version: 1)
    0 comment(s)

    While reviewing malicious messages that were delivered to our handler inbox over the past few days, I noticed that the “subject” of one phishing e-mail looked quite strange when displayed in the Outlook message list…

    As you can see, once the message was open, the subject was displayed as a normal, readable text. This suggested that some invisible characters were likely present…

    A quick look at the e-mail headers proved this to be the case. The subject was composed of the following two lines:

    Subject: =?UTF-8?B?WcKtb3XCrXIgUMKtYXPCrXN3wq1vwq1yZCBpwq1zIEHCrWLCrW91dCA=?=
    	=?UTF-8?B?dMKtbyBFwq14wq1wwq1pcsKtZQ==?=

    This formatting meant that the subject was included in the message in a MIME “encoded-word” format, which is described in RFC 2047 as having the following structure[1]:

    encoded-word = "=?" charset "?" encoding "?" encoded-text "?="

    In our case, the subject therefore consisted of two encoded words containing text written in the UTF-8 character set, which has been Base64 encoded.

    Once both lines were decoded, one could clearly see that an invisible character was indeed being used in multiple places in the strings – specifically the soft hyphen, which has a Unicode code point U+00AD, and which is more commonly used as the ­ HTML entity[2].

    Although soft hyphens aren’t – strictly speaking – invisible, Outlook as well as most other e-mail clients don’t render them as visible text in most cases.

    The use of the soft hyphen character – combined with splitting the subject into multiple MIME encoded-words – was clearly intended as an attempt at bypassing e-mail filtering mechanisms that are supposed to automatically detect potentially malicious messages.

    Why is this approach noteworthy?

    Because although the use of invisible characters in phishing e-mails in general (and of the use of the “shy” character in particular[3]) is quite common when it comes to making the contents of e-mail messages less readable to security solutions, it is quite unusual to see it also applied to a subject of a message.

    In fact, the only allusion to this technique I’ve been able to find with a quick Google search was a general mention in an article by Microsoft Threat Intelligence from 2021, which states that “In several observed campaigns, attackers inserted invisible Unicode characters to break up keywords in an email body or subject line in an attempt to bypass detection and automated security analysis”[4].

    Since the use of invisible characters in e-mail subject lines doesn’t seem to be widely known, I have therefore decided that it would be worthwhile to dedicate this short diary to it.

    It should be noted that the subject line wasn’t the only place where the soft hyphen character was used in the message – it was also heavily present in the text itself, where it was used to break up individual words…

    For completeness’s sake, we should also mention that the link in the phishing pointed to the URL hxxps[:]//stopsoriasis[.]co[.]il/Webmail/webmail.php?email=[recipient@domain.tld], where a generic “webmail login” credential stealing page was placed…

    [1] https://datatracker.ietf.org/doc/html/rfc2047
    [2] https://en.wikipedia.org/wiki/Soft_hyphen
    [3] https://isc.sans.edu/diary/31626
    [4] https://www.microsoft.com/en-us/security/blog/2021/08/18/trend-spotting-email-techniques-how-modern-phishing-emails-hide-in-plain-sight/

    -----------
    Jan Kopriva
    LinkedIn
    Nettles Consulting

    Keywords: Phishing
    0 comment(s)
    ISC Stormcast For Tuesday, October 28th, 2025 https://isc.sans.edu/podcastdetail/9674

      Comments


      Diary Archives