BleepingComputer reports that malicious actors compromised a U.S. political action committee's affiliates in an advanced phishing attack campaign that leveraged invisible Unicode characters to conceal the JavaScipt payload. Aside from utilizing Hangul half-width and full-width characters to hide malicious code in a blank space that could be retrieved using a 'get()trap' JavaScript proxy, threat actors have also adopted base64 encoding and anit-debugging measures to further bypass analysis and detection systems, according to a report from Juniper Networks. Such intrusions, which involved a pair of Tycoon 2FA phishing kit-linked domains, "were highly personalized, including non-public information, and the initial JavaScript would try to invoke a debugger breakpoint if it were being analyzed, detect a delay, and then abort the attack by redirecting to a benign website," said Juniper Networks, which noted that the invisible obfuscation technique could gain more traction among cyber attackers due to its stealthiness and ease of implementation.
Phishing, Malware, Threat Intelligence
Invisible Unicode leveraged in sophisticated phishing campaign

(Adobe Stock)
Related Events
Get daily email updates
SC Media's daily must-read of the most current and pressing daily news
You can skip this ad in 5 seconds