Technology NewsTechnology NewsTechnology News
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Reading: Hackers Bypass AI Phishing Defenses with Obfuscated Emails
Share
Font ResizerAa
Technology NewsTechnology News
Font ResizerAa
Search
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Follow US
  • Cookie Policy (EU)
  • Contact
  • About
© 2025 NEWSLINKER - Powered by LK SOFTWARE
Cybersecurity

Hackers Bypass AI Phishing Defenses with Obfuscated Emails

Highlights

  • Hackers use benign text to trick phishing filters.

  • Egress found legitimate links often mask malicious intent.

  • Enhanced security measures are needed to counter advanced attacks.

Ethan Moreno
Last updated: 16 October, 2024 - 5:48 pm 5:48 pm
Ethan Moreno 7 months ago
Share
SHARE

As cyber threats evolve, hackers are developing more sophisticated methods to infiltrate secure systems. Recent data reveals that attackers are leveraging natural language processing (NLP) to deceive email security tools. This trend poses a significant challenge to organizations relying on AI-driven phishing defenses.

Contents
How Hackers Manipulate Natural Language ProcessorsCommon Evasion Techniques IdentifiedImpact on Email Security Measures

Earlier reports showed that phishing attacks predominantly utilized straightforward malicious content easily detectable by NLP systems. However, the latest findings indicate a shift towards more complex obfuscation techniques, making it harder for traditional filters to identify threats.

How Hackers Manipulate Natural Language Processors

Attackers incorporate benign text, random links, and whitespace into phishing emails to distort NLP analyses. By doing so, they increase the number of “safe” elements, tricking the security systems into classifying the email as non-threatening.

“It is the attackers’ hope that by stacking enough benign elements at the bottom of an email, an NLP tool will generate a general conclusion that the email is safer than it is malicious and deliver it to the recipient’s inbox,”

Egress’ data shows that emails with sufficient benign components are more likely to bypass filters.

Common Evasion Techniques Identified

The study by Egress highlighted that links to reputable sites like Bank of America and Uber are frequently used to mask malicious content. Additionally, attackers insert random characters and uncommon links that are not flagged by existing email block lists, further aiding in evasion.

Impact on Email Security Measures

With attackers exploiting the limitations of NLP-based defenses, email security tools may inadvertently release phishing emails before thorough scanning is complete.

“The simplest thing you do is just look at certain phrases that are going to show up in attacks and not show up in safe stuff,”

said Dan Shiebler, head of machine learning at Abnormal Security. Egress noted that some security systems prioritize speed over accuracy, allowing these deceptive emails to reach recipients’ inboxes undetected.

The increasing complexity of phishing attacks necessitates advancements in email security technologies. Organizations must consider integrating more robust machine learning models that can better handle sophisticated obfuscation methods. Continuous monitoring and updating of security protocols are essential to stay ahead of evolving cyber threats.

You can follow us on Youtube, Telegram, Facebook, Linkedin, Twitter ( X ), Mastodon and Bluesky

You Might Also Like

Apple Boosts Security With Extensive Software Updates

US Authorities Dismantle Botnets and Indict Foreign Nationals

SonicWall Customers Face Spike in Device Vulnerabilities

Cyberattack Forces PowerSchool to Face Extortion Scandal

CrowdStrike Faces Workforce Reduction Amid Financial Shifts

Share This Article
Facebook Twitter Copy Link Print
Ethan Moreno
By Ethan Moreno
Ethan Moreno, a 35-year-old California resident, is a media graduate. Recognized for his extensive media knowledge and sharp editing skills, Ethan is a passionate professional dedicated to improving the accuracy and quality of news. Specializing in digital media, Moreno keeps abreast of technology, science and new media trends to shape content strategies.
Previous Article SpaceX Successfully Recovers Starship Booster on Latest Test
Next Article Iranian Hackers Target Critical Sector Passwords, Agencies Warn

Stay Connected

6.2kLike
8kFollow
2.3kSubscribe
1.7kFollow

Latest News

Tesla Constructs Cortex 2.0 at Giga Texas to Boost Computing Power
Electric Vehicle
G1T4-M1N1 Droid Launch Captivates Star Wars and Tech Fans Alike
Robotics
Elon Musk Shares Tesla Optimus Dance Video
Electric Vehicle
North American Robot Orders Stabilize in Early 2025
Robotics
UR15 Boosts Automation Speed in Key Industries
Robotics
NEWSLINKER – your premier source for the latest updates in ai, robotics, electric vehicle, gaming, and technology. We are dedicated to bringing you the most accurate, timely, and engaging content from across these dynamic industries. Join us on our journey of discovery and stay informed in this ever-evolving digital age.

ARTIFICAL INTELLIGENCE

  • Can Artificial Intelligence Achieve Consciousness?
  • What is Artificial Intelligence (AI)?
  • How does Artificial Intelligence Work?
  • Will AI Take Over the World?
  • What Is OpenAI?
  • What is Artifical General Intelligence?

ELECTRIC VEHICLE

  • What is Electric Vehicle in Simple Words?
  • How do Electric Cars Work?
  • What is the Advantage and Disadvantage of Electric Cars?
  • Is Electric Car the Future?

RESEARCH

  • Robotics Market Research & Report
  • Everything you need to know about IoT
  • What Is Wearable Technology?
  • What is FANUC Robotics?
  • What is Anthropic AI?
Technology NewsTechnology News
Follow US
About Us   -  Cookie Policy   -   Contact

© 2025 NEWSLINKER. Powered by LK SOFTWARE
Welcome Back!

Sign in to your account

Register Lost your password?