Technology NewsTechnology NewsTechnology News
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Reading: Hackers Bypass AI Phishing Defenses with Obfuscated Emails
Share
Font ResizerAa
Technology NewsTechnology News
Font ResizerAa
Search
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Follow US
  • Cookie Policy (EU)
  • Contact
  • About
© 2025 NEWSLINKER - Powered by LK SOFTWARE
Cybersecurity

Hackers Bypass AI Phishing Defenses with Obfuscated Emails

Highlights

  • Hackers use benign text to trick phishing filters.

  • Egress found legitimate links often mask malicious intent.

  • Enhanced security measures are needed to counter advanced attacks.

Ethan Moreno
Last updated: 16 October, 2024 - 5:48 pm 5:48 pm
Ethan Moreno 9 months ago
Share
SHARE

As cyber threats evolve, hackers are developing more sophisticated methods to infiltrate secure systems. Recent data reveals that attackers are leveraging natural language processing (NLP) to deceive email security tools. This trend poses a significant challenge to organizations relying on AI-driven phishing defenses.

Contents
How Hackers Manipulate Natural Language ProcessorsCommon Evasion Techniques IdentifiedImpact on Email Security Measures

Earlier reports showed that phishing attacks predominantly utilized straightforward malicious content easily detectable by NLP systems. However, the latest findings indicate a shift towards more complex obfuscation techniques, making it harder for traditional filters to identify threats.

How Hackers Manipulate Natural Language Processors

Attackers incorporate benign text, random links, and whitespace into phishing emails to distort NLP analyses. By doing so, they increase the number of “safe” elements, tricking the security systems into classifying the email as non-threatening.

“It is the attackers’ hope that by stacking enough benign elements at the bottom of an email, an NLP tool will generate a general conclusion that the email is safer than it is malicious and deliver it to the recipient’s inbox,”

Egress’ data shows that emails with sufficient benign components are more likely to bypass filters.

Common Evasion Techniques Identified

The study by Egress highlighted that links to reputable sites like Bank of America and Uber are frequently used to mask malicious content. Additionally, attackers insert random characters and uncommon links that are not flagged by existing email block lists, further aiding in evasion.

Impact on Email Security Measures

With attackers exploiting the limitations of NLP-based defenses, email security tools may inadvertently release phishing emails before thorough scanning is complete.

“The simplest thing you do is just look at certain phrases that are going to show up in attacks and not show up in safe stuff,”

said Dan Shiebler, head of machine learning at Abnormal Security. Egress noted that some security systems prioritize speed over accuracy, allowing these deceptive emails to reach recipients’ inboxes undetected.

The increasing complexity of phishing attacks necessitates advancements in email security technologies. Organizations must consider integrating more robust machine learning models that can better handle sophisticated obfuscation methods. Continuous monitoring and updating of security protocols are essential to stay ahead of evolving cyber threats.

You can follow us on Youtube, Telegram, Facebook, Linkedin, Twitter ( X ), Mastodon and Bluesky

You Might Also Like

AT&T Launches Wireless Account Lock to Block SIM-Swapping Attacks

US Authorities Target North Korean IT Worker Schemes and Make Arrest

Hacker Tracks FBI Agent, Cartel Targets Witnesses in El Chapo Case

Cambodian Scam Compounds Trap Victims in Forced Labor, Amnesty Finds

Cybercrime Group Targets Airlines in New Wave of Attacks

Share This Article
Facebook Twitter Copy Link Print
Ethan Moreno
By Ethan Moreno
Ethan Moreno, a 35-year-old California resident, is a media graduate. Recognized for his extensive media knowledge and sharp editing skills, Ethan is a passionate professional dedicated to improving the accuracy and quality of news. Specializing in digital media, Moreno keeps abreast of technology, science and new media trends to shape content strategies.
Previous Article SpaceX Successfully Recovers Starship Booster on Latest Test
Next Article Iranian Hackers Target Critical Sector Passwords, Agencies Warn

Stay Connected

6.2kLike
8kFollow
2.3kSubscribe
1.7kFollow

Latest News

Agtonomy and Captron Lead New Advances in Smart Agriculture
AI Robotics
Tesla Responds to Executive Exit as Musk Directs Global Sales
Electric Vehicle
Netflix Streams Real-Time Space Missions With New NASA Partnership
Technology
Amazon Deploys 1 Millionth Robot, Deploys DeepFleet AI Across Network
AI Robotics
European Firms Drive Surge in AI Gigafactory Proposals
AI
NEWSLINKER – your premier source for the latest updates in ai, robotics, electric vehicle, gaming, and technology. We are dedicated to bringing you the most accurate, timely, and engaging content from across these dynamic industries. Join us on our journey of discovery and stay informed in this ever-evolving digital age.

ARTIFICAL INTELLIGENCE

  • Can Artificial Intelligence Achieve Consciousness?
  • What is Artificial Intelligence (AI)?
  • How does Artificial Intelligence Work?
  • Will AI Take Over the World?
  • What Is OpenAI?
  • What is Artifical General Intelligence?

ELECTRIC VEHICLE

  • What is Electric Vehicle in Simple Words?
  • How do Electric Cars Work?
  • What is the Advantage and Disadvantage of Electric Cars?
  • Is Electric Car the Future?

RESEARCH

  • Robotics Market Research & Report
  • Everything you need to know about IoT
  • What Is Wearable Technology?
  • What is FANUC Robotics?
  • What is Anthropic AI?
Technology NewsTechnology News
Follow US
About Us   -  Cookie Policy   -   Contact

© 2025 NEWSLINKER. Powered by LK SOFTWARE
Welcome Back!

Sign in to your account

Register Lost your password?