Synopsis
Activation Period |
14 Days |
Training Period |
30 Days |
Test Period |
N/A (single event) |
Deduplication Period |
3 Days |
Required Data |
|
Detection Modules |
|
Detector Tags |
|
ATT&CK Tactic |
|
ATT&CK Technique |
|
Severity |
Informational |
Description
The email contains HTML style attributes that could be used to hide text.
This technique can be used in attacks to disguise malicious content or hide legitimate content, instilling a sense of legitimacy and security in the recipient.
Attacker's Goals
Bypass security filters and deceive recipients, disguising harmful intents such as phishing or malware distribution.
Investigative actions
- Check the email address for any unusual spellings, missing letters, or unknown domains.
- If the message contains attachments/links, scrutinize them for any suspicious indications.
- Monitor further actions taken, such as file downloads or access to potentially malicious links.