Hackers Use CSS Properties and Messages to Inject Malicious Codes in Hidden Text Salting Attack

Cisco Talos has uncovered a growing abuse of Cascading Style Sheet (CSS) properties in email-based cyberattacks, leveraging a stealthy tactic called hidden text salting to bypass detection systems.

This technique, monitored between March 2024 and July 2025, involves inserting irrelevant or malicious snippets into emails while making them visually invisible to recipients.

Hidden text salting has been identified in phishing, spear phishing, and scam campaigns, occurring significantly more frequently in spam than in legitimate messages, posing challenges for both AI-driven and straightforward defenses.

Abuse of CSS to Evade Detection

Hidden text salting works by blending invisible “salt”, either random characters, multilingual words, or HTML comments, into email parts such as the preheader, header, attachments, and body. Talos documented multiple abuse methods:

  • Text property manipulation: Using font-size: 0, matching text color to background, or embedding zero-width spaces (ZWSP) and zero-width non-joiners (ZWNJ) between brand names such as “Norton LifeLock” to defeat keyword-based detection.
  • Visibility/display alteration: Setting opacity: 0visibility: hidden, or display: none to hide malicious text blocks inserted between legitimate content.
  • Clipping and sizing exploitation: Forcing container widths to zero or clipping oversized salt into invisible shapes with overflow: hidden.

Talos found attackers embedding invisible phrases to disrupt language detection used by solutions like Microsoft Exchange Online Protection (EOP), making phishing emails appear multilingual when they are primarily English.

In one case, French words hidden via display: none Confused spam filters, resulting in increased delivery success rates.

Attachments are also a primary vector. HTML files were padded with irrelevant Base64 comments to obstruct URL decoding, or hidden German paragraphs designed to evade static analysis.

Spear phishing messages targeted Cisco Secure ETD customers by inserting junk HTML tags and concealed malicious scripts while displaying legitimate logos like Microsoft SharePoint.

A scam email impersonating the PayPal brand.

Advanced adversaries manipulate CSS salt to affect Large Language Model (LLM)-driven detection pipelines.

By inserting invisible, random phrases, attackers have altered AI-derived intent and sentiment scores from “Request Action” to benign values, such as “Schedule Meeting,” allowing malicious prompts to slip through security layers undetected.

Mitigation Strategies for Email Security

Talos recommends HTML sanitization during ingestion to strip invisible salt before downstream processing, as well as proactive prompt guarding in email gateways to automatically ignore hidden content.

Detection models should expand beyond keyword scanning to include analysis of visual characteristics and AI-driven behavioral detection, ensuring that legitimate responsive designs are not falsely flagged while malicious salting is neutralized.

Phishing email impersonating the Blue Cross Blue Shield organization.

This evolving CSS abuse highlights the need for continuous adaptation of email security strategies, with Cisco Secure Email Threat Defense integrating NLP, deep learning, and ML to maintain resilience.

With adversaries refining invisible injection methods, security teams must actively hunt for hidden text patterns across all email components to counter this stealthy and increasingly impactful threat vector.

Find this Story Interesting! Follow us on Google News , LinkedIn and X to Get More Instant Updates

Priya
Priya
Priya is a Security Reporter who tracks malware campaigns, exploit kits, and ransomware operations. Her reporting highlights technical indicators and attack patterns that matter to defenders

Recent Articles

Related Stories

LEAVE A REPLY

Please enter your comment!
Please enter your name here