{"id":165430,"date":"2025-10-08T08:48:57","date_gmt":"2025-10-08T08:48:57","guid":{"rendered":"https:\/\/gbhackers.com\/?p=165430"},"modified":"2025-10-08T08:49:02","modified_gmt":"2025-10-08T08:49:02","slug":"css-properties","status":"publish","type":"post","link":"https:\/\/gbhackers.com\/css-properties\/","title":{"rendered":"Hackers Exploit CSS Properties to Conceal Malicious Code in Hidden Text Salting Attacks"},"content":{"rendered":"\n<p>In a sophisticated evolution of email-based attacks, adversaries have begun leveraging Cascading Style Sheets (CSS) to inject hidden \u201csalt\u201d \u2014 irrelevant content used to confuse detection systems \u2014 deep within HTML emails. <\/p>\n\n\n\n<p>Cisco Talos\u2019s year-long monitoring (March 1, 2024 \u2013 July 31, 2025)<a href=\"https:\/\/blog.talosintelligence.com\/too-salty-to-handle-exposing-cases-of-css-abuse-for-hidden-text-salting\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\"> reveals <\/a>a marked increase in the abuse of CSS properties to conceal malicious code and hamper both signature-based and advanced ML-driven defenses. <\/p>\n\n\n\n<p>By embedding hidden text salts in strategic email components, attackers can evade filters, manipulate language detection, and even distort LLM-based intent analysis.<\/p>\n\n\n\n<p>Hidden text salting emerged as a countermeasure to growing email defenses. Initially, threat actors inserted random characters between keywords to slip past signature scanners. <\/p>\n\n\n\n<p>Over time, adversaries refined the approach by styling these characters with CSS properties\u2014such as setting <code>font-size:0<\/code> or <code>opacity:0<\/code>\u2014to make the salt invisible to users but legible to parsers. <\/p>\n\n\n\n<p>By hiding irrelevant French terms amidst English text, attackers have tricked Microsoft\u2019s language detection into misclassifying phishing emails, sending them through filters unscathed. <\/p>\n\n\n\n<p>In one case, a PayPal-impersonating scam contained the sentence \u201cGreat news, we\u2019ve got your order\u201d concealed in a <code>&lt;div><\/code> with <code>font-size:1px<\/code> and <code>line-height:0<\/code>, only revealed when font size was increased to 20px. <\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" src=\"https:\/\/blog.talosintelligence.com\/content\/images\/size\/w1000\/2025\/10\/1.png\" alt=\"A scam email impersonating the PayPal brand.\"\/><figcaption class=\"wp-element-caption\"><em>A scam email impersonating the PayPal brand.<\/em><\/figcaption><\/figure>\n<\/div>\n\n\n<p>Likewise, Harbor Freight phishing emails included hidden French salt via <code>display:none<\/code>, confusing the <code>X-Forefront-Antispam-Report<\/code> language field.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"techniques-and-examples\"><strong>Techniques and Examples<\/strong><\/h2>\n\n\n\n<p>Cisco Talos categorizes the misuse of CSS for hidden text salting into three content types and four insertion points. The content types are random characters, irrelevant paragraphs, and HTML\/<a href=\"https:\/\/gbhackers.com\/critical-javascript-library-vulnerability\/\" target=\"_blank\" rel=\"noreferrer noopener\">JavaScript<\/a> comments. <\/p>\n\n\n\n<p>Characters often include zero-width spaces (ZWSP) or non-joiners (ZWNJ) inserted between brand names, as seen in Norton LifeLock impersonations. <\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" src=\"https:\/\/blog.talosintelligence.com\/content\/images\/size\/w1000\/2025\/10\/13.png\" alt=\"HTML source snippet of the above phishing email, with ZWSP and ZWNJ characters.\"\/><figcaption class=\"wp-element-caption\"><em>HTML source snippet of the above phishing email, with ZWSP and ZWNJ characters<\/em>.<\/figcaption><\/figure>\n<\/div>\n\n\n<p>Attackers embed German and Finnish phrases in paragraph salt within HTML attachments to thwart static analysis. In another campaign, irrelevant comments were interspersed within Base64-encoded URLs to complicate decoding.<\/p>\n\n\n\n<p>These salts appear in four main email regions: preheader, header, attachments, and body. Preheaders have contained tempting phrases like \u201cFOUR yummy soup recipes just for you!\u201d hidden via <code>opacity:0<\/code>, <code>max-height:0<\/code>, and <code>mso-hide:all<\/code> to entice clicks without detection.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/blog.talosintelligence.com\/content\/images\/size\/w1000\/2025\/10\/7.png\" alt=\"HTML source snippet of the above phishing email, showing how salt is added to the pre-header text.\"\/><figcaption class=\"wp-element-caption\"><em>HTML source snippet of the above phishing email, showing how salt is added to the pre-header text.<\/em><\/figcaption><\/figure>\n\n\n\n<p>Attachments carry salts in HTML, where attackers insert random comments around Base64 data. The body remains the most common locus, with raw keywords interspersed with junk characters to evade filters.<\/p>\n\n\n\n<p>Attackers also manipulate <a href=\"https:\/\/gbhackers.com\/hackers-use-css-tricks-to-bypass-spam-filters\/\" target=\"_blank\" rel=\"noreferrer noopener\">CSS property<\/a> categories to cloak salt. Text properties (<code>font-size<\/code>, <code>color<\/code>, <code>line-height<\/code>) shrink or recolor text to blend with backgrounds. <\/p>\n\n\n\n<p>Visibility and display properties (<code>display:none<\/code>, <code>visibility:hidden<\/code>) remove elements from rendering. Clipping and sizing (<code>width:0<\/code>, <code>overflow:hidden<\/code>) clip hidden text within zero-dimension containers. <\/p>\n\n\n\n<p>In a Wells Fargo phishing example, meaningful keywords were salted using a global <code>bdo<\/code> selector with <code>font-size:0<\/code>, altering the intent classification of LLM-based defenses from \u201cRequest Action\u201d to \u201cSchedule Meeting.\u201d<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"mitigation-strategies-and-takeaways\"><strong>Mitigations<\/strong><\/h2>\n\n\n\n<p>Defenders must adopt a dual approach: detection and filtering. Detection solutions should extend beyond simple text parsing to analyze CSS usage patterns and visual discrepancies. <\/p>\n\n\n\n<p>Talos selected a few simple CSS properties that can be used to hide the added salt, including &#8220;font-size: 0,&#8221; &#8220;opacity: 0,&#8221; &#8220;display: none,&#8221; &#8220;max-width: 0,&#8221; &#8220;max-height: 0,&#8221; &#8220;color: transparent,&#8221; &#8220;visibility: hidden,&#8221; &#8220;width: 0&#8221; or &#8220;height: 0.&#8221; We then searched for these indicators in emails reclassified by Cisco Secure ETD customers.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" src=\"https:\/\/blog.talosintelligence.com\/content\/images\/size\/w1000\/2025\/10\/19.jpg\" alt=\"The prevalence of hidden content in spam and ham messages.\"\/><figcaption class=\"wp-element-caption\"><em>The prevalence of hidden content in spam and ham messages.<\/em><\/figcaption><\/figure>\n<\/div>\n\n\n<p>Advanced filters can inspect email parts\u2014preheader, header, body, attachments\u2014to identify and flag hidden content. Incorporating visual-based analysis, such as rendering email snapshots to detect invisible overlays, can thwart image-based threats. <\/p>\n\n\n\n<p>Organizations should fine-tune policies to tolerate legitimate uses while flagging abnormal CSS payloads. Adopting <a href=\"https:\/\/gbhackers.com\/emerging-ai-driven-phishing-trends\/\" target=\"_blank\" rel=\"noreferrer noopener\">AI-driven<\/a>, deep-learning models that consider visual, structural, and contextual features can dramatically improve resilience against this evasive tactic.<\/p>\n\n\n\n<p>Filtering solutions must sanitize HTML at ingestion, stripping or escaping invisible elements before downstream engines process messages. Email gateways can deploy prompt guards to ignore any content styled as hidden.<\/p>\n\n\n\n<p>Hidden text salting is far more prevalent in spam and phishing than in legitimate mail, though some benign uses of CSS (responsive design, tracking pixels) resemble these techniques. <\/p>\n\n\n\n<p>By recognizing and neutralizing hidden text salting, security teams can restore the integrity of email defenses and prevent adversaries from slipping past layers of protection. <\/p>\n\n\n\n<p>Continuous monitoring of CSS misuse, coupled with proactive sanitization, will be critical in countering this emerging threat.<\/p>\n\n\n\n<p class=\"has-text-align-center has-background\" style=\"background:linear-gradient(135deg,rgb(238,238,238) 100%,rgb(169,184,195) 100%)\"><strong>Follow us on\u00a0<a href=\"https:\/\/news.google.com\/publications\/CAAqKAgKIiJDQklTRXdnTWFnOEtEV2RpYUdGamEyVnljeTVqYjIwb0FBUAE?hl=en-IN&amp;gl=IN&amp;ceid=IN%3Aen\" target=\"_blank\" rel=\"noreferrer noopener\">Google News<\/a>,\u00a0<a href=\"https:\/\/www.linkedin.com\/company\/cyber-threat-intel\/\" target=\"_blank\" rel=\"noreferrer noopener\">LinkedIn<\/a>, and\u00a0<a href=\"https:\/\/x.com\/The_Cyber_News\" target=\"_blank\" rel=\"noreferrer noopener\">X<\/a>\u00a0to Get Instant Updates and Set GBH as a Preferred Source in\u00a0<a href=\"https:\/\/www.google.com\/preferences\/source?q=https:\/\/gbhackers.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Google<\/a>.<\/strong><\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In a sophisticated evolution of email-based attacks, adversaries have begun leveraging Cascading Style Sheets (CSS) to inject hidden \u201csalt\u201d \u2014 irrelevant content used to confuse detection systems \u2014 deep within HTML emails. Cisco Talos\u2019s year-long monitoring (March 1, 2024 \u2013 July 31, 2025) reveals a marked increase in the abuse of CSS properties to conceal [&hellip;]<\/p>\n","protected":false},"author":52,"featured_media":165463,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgp3-1dyGVgss-KuEVxrJEWhBUikHTnyQRq-8GukZyv3w6pgVw-OTqqYK8G7kcPZ11KNJPHIUbUqT36j36g5xa4J0Dj70IAavOrNSJ6_CWISBpUq8KUxzIYmQ9mQ_gBD7wsNZOqSBebtD7O8RIZwwJwmugVW0TQyDezIiEuWFJHwzGYKdzQhB_PKJ4efGKx\/s16000\/Untitled%20design%20-%202025-10-08T141628.406.webp","fifu_image_alt":"Hackers Exploit CSS Properties to Conceal Malicious Code in Hidden Text Salting Attacks","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[3710,1931],"tags":[1267,1621,1939],"class_list":{"0":"post-165430","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-security","8":"category-cyber-security-news","9":"tag-css","10":"tag-cyber-security","11":"tag-cyber-security-news"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.6 (Yoast SEO v27.1.1) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Hackers Exploit CSS Properties to Conceal Malicious Code in Hidden Text Salting Attacks<\/title>\n<meta name=\"description\" content=\"In a sophisticated evolution of email-based attacks, adversaries have begun leveraging Cascading Style Sheets (CSS).\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/gbhackers.com\/css-properties\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hackers Exploit CSS Properties to Conceal Malicious Code in Hidden Text Salting Attacks\" \/>\n<meta property=\"og:description\" content=\"In a sophisticated evolution of email-based attacks, adversaries have begun leveraging Cascading Style Sheets (CSS).\" \/>\n<meta property=\"og:url\" content=\"https:\/\/gbhackers.com\/css-properties\/\" \/>\n<meta property=\"og:site_name\" content=\"GBHackers Security | #1 Globally Trusted Cyber Security News Platform\" \/>\n<meta property=\"article:published_time\" content=\"2025-10-08T08:48:57+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-08T08:49:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgp3-1dyGVgss-KuEVxrJEWhBUikHTnyQRq-8GukZyv3w6pgVw-OTqqYK8G7kcPZ11KNJPHIUbUqT36j36g5xa4J0Dj70IAavOrNSJ6_CWISBpUq8KUxzIYmQ9mQ_gBD7wsNZOqSBebtD7O8RIZwwJwmugVW0TQyDezIiEuWFJHwzGYKdzQhB_PKJ4efGKx\/s16000\/Untitled%20design%20-%202025-10-08T141628.406.webp\" \/><meta property=\"og:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgp3-1dyGVgss-KuEVxrJEWhBUikHTnyQRq-8GukZyv3w6pgVw-OTqqYK8G7kcPZ11KNJPHIUbUqT36j36g5xa4J0Dj70IAavOrNSJ6_CWISBpUq8KUxzIYmQ9mQ_gBD7wsNZOqSBebtD7O8RIZwwJwmugVW0TQyDezIiEuWFJHwzGYKdzQhB_PKJ4efGKx\/s16000\/Untitled%20design%20-%202025-10-08T141628.406.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"900\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Mayura Kathir\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgp3-1dyGVgss-KuEVxrJEWhBUikHTnyQRq-8GukZyv3w6pgVw-OTqqYK8G7kcPZ11KNJPHIUbUqT36j36g5xa4J0Dj70IAavOrNSJ6_CWISBpUq8KUxzIYmQ9mQ_gBD7wsNZOqSBebtD7O8RIZwwJwmugVW0TQyDezIiEuWFJHwzGYKdzQhB_PKJ4efGKx\/s16000\/Untitled%20design%20-%202025-10-08T141628.406.webp\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mayura Kathir\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/gbhackers.com\/css-properties\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/gbhackers.com\/css-properties\/\"},\"author\":{\"name\":\"Mayura Kathir\",\"@id\":\"https:\/\/gbhackers.com\/#\/schema\/person\/a4af1382fc74bb74e535a4cee4f1b428\"},\"headline\":\"Hackers Exploit CSS Properties to Conceal Malicious Code in Hidden Text Salting Attacks\",\"datePublished\":\"2025-10-08T08:48:57+00:00\",\"dateModified\":\"2025-10-08T08:49:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/gbhackers.com\/css-properties\/\"},\"wordCount\":727,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/gbhackers.com\/css-properties\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/i2.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgp3-1dyGVgss-KuEVxrJEWhBUikHTnyQRq-8GukZyv3w6pgVw-OTqqYK8G7kcPZ11KNJPHIUbUqT36j36g5xa4J0Dj70IAavOrNSJ6_CWISBpUq8KUxzIYmQ9mQ_gBD7wsNZOqSBebtD7O8RIZwwJwmugVW0TQyDezIiEuWFJHwzGYKdzQhB_PKJ4efGKx\/s16000\/Untitled%20design%20-%202025-10-08T141628.406.webp?w=1600&resize=1600,900&ssl=1\",\"keywords\":[\"CSS\",\"cyber security\",\"Cyber Security News\"],\"articleSection\":[\"cyber security\",\"Cyber Security News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/gbhackers.com\/css-properties\/#respond\"]}],\"copyrightYear\":\"2025\",\"copyrightHolder\":{\"@id\":\"https:\/\/gbhackers.com\/#organization\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/gbhackers.com\/css-properties\/\",\"url\":\"https:\/\/gbhackers.com\/css-properties\/\",\"name\":\"Hackers Exploit CSS Properties to Conceal Malicious Code in Hidden Text Salting Attacks\",\"isPartOf\":{\"@id\":\"https:\/\/gbhackers.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/gbhackers.com\/css-properties\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/gbhackers.com\/css-properties\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/i2.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgp3-1dyGVgss-KuEVxrJEWhBUikHTnyQRq-8GukZyv3w6pgVw-OTqqYK8G7kcPZ11KNJPHIUbUqT36j36g5xa4J0Dj70IAavOrNSJ6_CWISBpUq8KUxzIYmQ9mQ_gBD7wsNZOqSBebtD7O8RIZwwJwmugVW0TQyDezIiEuWFJHwzGYKdzQhB_PKJ4efGKx\/s16000\/Untitled%20design%20-%202025-10-08T141628.406.webp?w=1600&resize=1600,900&ssl=1\",\"datePublished\":\"2025-10-08T08:48:57+00:00\",\"dateModified\":\"2025-10-08T08:49:02+00:00\",\"author\":{\"@id\":\"https:\/\/gbhackers.com\/#\/schema\/person\/a4af1382fc74bb74e535a4cee4f1b428\"},\"description\":\"In a sophisticated evolution of email-based attacks, adversaries have begun leveraging Cascading Style Sheets (CSS).\",\"breadcrumb\":{\"@id\":\"https:\/\/gbhackers.com\/css-properties\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/gbhackers.com\/css-properties\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/gbhackers.com\/css-properties\/#primaryimage\",\"url\":\"https:\/\/i2.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgp3-1dyGVgss-KuEVxrJEWhBUikHTnyQRq-8GukZyv3w6pgVw-OTqqYK8G7kcPZ11KNJPHIUbUqT36j36g5xa4J0Dj70IAavOrNSJ6_CWISBpUq8KUxzIYmQ9mQ_gBD7wsNZOqSBebtD7O8RIZwwJwmugVW0TQyDezIiEuWFJHwzGYKdzQhB_PKJ4efGKx\/s16000\/Untitled%20design%20-%202025-10-08T141628.406.webp?w=1600&resize=1600,900&ssl=1\",\"contentUrl\":\"https:\/\/i2.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgp3-1dyGVgss-KuEVxrJEWhBUikHTnyQRq-8GukZyv3w6pgVw-OTqqYK8G7kcPZ11KNJPHIUbUqT36j36g5xa4J0Dj70IAavOrNSJ6_CWISBpUq8KUxzIYmQ9mQ_gBD7wsNZOqSBebtD7O8RIZwwJwmugVW0TQyDezIiEuWFJHwzGYKdzQhB_PKJ4efGKx\/s16000\/Untitled%20design%20-%202025-10-08T141628.406.webp?w=1600&resize=1600,900&ssl=1\",\"width\":\"1600\",\"height\":\"900\",\"caption\":\"Hackers Exploit CSS Properties to Conceal Malicious Code in Hidden Text Salting Attacks\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/gbhackers.com\/css-properties\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/gbhackers.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Hackers Exploit CSS Properties to Conceal Malicious Code in Hidden Text Salting Attacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/gbhackers.com\/#website\",\"url\":\"https:\/\/gbhackers.com\/\",\"name\":\"GBHackers Security | #1 Globally Trusted Cyber Security News Platform\",\"description\":\"GBhackers Offering Exclusive Cyber Security News Coverage, New Research papers &amp; Technology Updates.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/gbhackers.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/gbhackers.com\/#\/schema\/person\/a4af1382fc74bb74e535a4cee4f1b428\",\"name\":\"Mayura Kathir\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/gbhackers.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/fb526fdee24265698b1b6c6a44de0e17df52aab45a9582f55fab5b8a5928c4cf?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/fb526fdee24265698b1b6c6a44de0e17df52aab45a9582f55fab5b8a5928c4cf?s=96&d=mm&r=g\",\"caption\":\"Mayura Kathir\"},\"description\":\"Mayura Kathir is a cybersecurity reporter at GBHackers News, covering daily incidents including data breaches, malware attacks, cybercrime, vulnerabilities, zero-day exploits, and more.\",\"sameAs\":[\"https:\/\/gbhackers.com\/\"],\"url\":\"https:\/\/gbhackers.com\/author\/mayura\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Hackers Exploit CSS Properties to Conceal Malicious Code in Hidden Text Salting Attacks","description":"In a sophisticated evolution of email-based attacks, adversaries have begun leveraging Cascading Style Sheets (CSS).","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/gbhackers.com\/css-properties\/","og_locale":"en_US","og_type":"article","og_title":"Hackers Exploit CSS Properties to Conceal Malicious Code in Hidden Text Salting Attacks","og_description":"In a sophisticated evolution of email-based attacks, adversaries have begun leveraging Cascading Style Sheets (CSS).","og_url":"https:\/\/gbhackers.com\/css-properties\/","og_site_name":"GBHackers Security | #1 Globally Trusted Cyber Security News Platform","article_published_time":"2025-10-08T08:48:57+00:00","article_modified_time":"2025-10-08T08:49:02+00:00","og_image":[{"url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgp3-1dyGVgss-KuEVxrJEWhBUikHTnyQRq-8GukZyv3w6pgVw-OTqqYK8G7kcPZ11KNJPHIUbUqT36j36g5xa4J0Dj70IAavOrNSJ6_CWISBpUq8KUxzIYmQ9mQ_gBD7wsNZOqSBebtD7O8RIZwwJwmugVW0TQyDezIiEuWFJHwzGYKdzQhB_PKJ4efGKx\/s16000\/Untitled%20design%20-%202025-10-08T141628.406.webp","type":"","width":"","height":""},{"width":1600,"height":900,"url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgp3-1dyGVgss-KuEVxrJEWhBUikHTnyQRq-8GukZyv3w6pgVw-OTqqYK8G7kcPZ11KNJPHIUbUqT36j36g5xa4J0Dj70IAavOrNSJ6_CWISBpUq8KUxzIYmQ9mQ_gBD7wsNZOqSBebtD7O8RIZwwJwmugVW0TQyDezIiEuWFJHwzGYKdzQhB_PKJ4efGKx\/s16000\/Untitled%20design%20-%202025-10-08T141628.406.webp","type":"image\/jpeg"}],"author":"Mayura Kathir","twitter_card":"summary_large_image","twitter_image":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgp3-1dyGVgss-KuEVxrJEWhBUikHTnyQRq-8GukZyv3w6pgVw-OTqqYK8G7kcPZ11KNJPHIUbUqT36j36g5xa4J0Dj70IAavOrNSJ6_CWISBpUq8KUxzIYmQ9mQ_gBD7wsNZOqSBebtD7O8RIZwwJwmugVW0TQyDezIiEuWFJHwzGYKdzQhB_PKJ4efGKx\/s16000\/Untitled%20design%20-%202025-10-08T141628.406.webp","twitter_misc":{"Written by":"Mayura Kathir","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/gbhackers.com\/css-properties\/#article","isPartOf":{"@id":"https:\/\/gbhackers.com\/css-properties\/"},"author":{"name":"Mayura Kathir","@id":"https:\/\/gbhackers.com\/#\/schema\/person\/a4af1382fc74bb74e535a4cee4f1b428"},"headline":"Hackers Exploit CSS Properties to Conceal Malicious Code in Hidden Text Salting Attacks","datePublished":"2025-10-08T08:48:57+00:00","dateModified":"2025-10-08T08:49:02+00:00","mainEntityOfPage":{"@id":"https:\/\/gbhackers.com\/css-properties\/"},"wordCount":727,"commentCount":0,"image":{"@id":"https:\/\/gbhackers.com\/css-properties\/#primaryimage"},"thumbnailUrl":"https:\/\/i2.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgp3-1dyGVgss-KuEVxrJEWhBUikHTnyQRq-8GukZyv3w6pgVw-OTqqYK8G7kcPZ11KNJPHIUbUqT36j36g5xa4J0Dj70IAavOrNSJ6_CWISBpUq8KUxzIYmQ9mQ_gBD7wsNZOqSBebtD7O8RIZwwJwmugVW0TQyDezIiEuWFJHwzGYKdzQhB_PKJ4efGKx\/s16000\/Untitled%20design%20-%202025-10-08T141628.406.webp?w=1600&resize=1600,900&ssl=1","keywords":["CSS","cyber security","Cyber Security News"],"articleSection":["cyber security","Cyber Security News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/gbhackers.com\/css-properties\/#respond"]}],"copyrightYear":"2025","copyrightHolder":{"@id":"https:\/\/gbhackers.com\/#organization"}},{"@type":"WebPage","@id":"https:\/\/gbhackers.com\/css-properties\/","url":"https:\/\/gbhackers.com\/css-properties\/","name":"Hackers Exploit CSS Properties to Conceal Malicious Code in Hidden Text Salting Attacks","isPartOf":{"@id":"https:\/\/gbhackers.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/gbhackers.com\/css-properties\/#primaryimage"},"image":{"@id":"https:\/\/gbhackers.com\/css-properties\/#primaryimage"},"thumbnailUrl":"https:\/\/i2.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgp3-1dyGVgss-KuEVxrJEWhBUikHTnyQRq-8GukZyv3w6pgVw-OTqqYK8G7kcPZ11KNJPHIUbUqT36j36g5xa4J0Dj70IAavOrNSJ6_CWISBpUq8KUxzIYmQ9mQ_gBD7wsNZOqSBebtD7O8RIZwwJwmugVW0TQyDezIiEuWFJHwzGYKdzQhB_PKJ4efGKx\/s16000\/Untitled%20design%20-%202025-10-08T141628.406.webp?w=1600&resize=1600,900&ssl=1","datePublished":"2025-10-08T08:48:57+00:00","dateModified":"2025-10-08T08:49:02+00:00","author":{"@id":"https:\/\/gbhackers.com\/#\/schema\/person\/a4af1382fc74bb74e535a4cee4f1b428"},"description":"In a sophisticated evolution of email-based attacks, adversaries have begun leveraging Cascading Style Sheets (CSS).","breadcrumb":{"@id":"https:\/\/gbhackers.com\/css-properties\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/gbhackers.com\/css-properties\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/gbhackers.com\/css-properties\/#primaryimage","url":"https:\/\/i2.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgp3-1dyGVgss-KuEVxrJEWhBUikHTnyQRq-8GukZyv3w6pgVw-OTqqYK8G7kcPZ11KNJPHIUbUqT36j36g5xa4J0Dj70IAavOrNSJ6_CWISBpUq8KUxzIYmQ9mQ_gBD7wsNZOqSBebtD7O8RIZwwJwmugVW0TQyDezIiEuWFJHwzGYKdzQhB_PKJ4efGKx\/s16000\/Untitled%20design%20-%202025-10-08T141628.406.webp?w=1600&resize=1600,900&ssl=1","contentUrl":"https:\/\/i2.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgp3-1dyGVgss-KuEVxrJEWhBUikHTnyQRq-8GukZyv3w6pgVw-OTqqYK8G7kcPZ11KNJPHIUbUqT36j36g5xa4J0Dj70IAavOrNSJ6_CWISBpUq8KUxzIYmQ9mQ_gBD7wsNZOqSBebtD7O8RIZwwJwmugVW0TQyDezIiEuWFJHwzGYKdzQhB_PKJ4efGKx\/s16000\/Untitled%20design%20-%202025-10-08T141628.406.webp?w=1600&resize=1600,900&ssl=1","width":"1600","height":"900","caption":"Hackers Exploit CSS Properties to Conceal Malicious Code in Hidden Text Salting Attacks"},{"@type":"BreadcrumbList","@id":"https:\/\/gbhackers.com\/css-properties\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/gbhackers.com\/"},{"@type":"ListItem","position":2,"name":"Hackers Exploit CSS Properties to Conceal Malicious Code in Hidden Text Salting Attacks"}]},{"@type":"WebSite","@id":"https:\/\/gbhackers.com\/#website","url":"https:\/\/gbhackers.com\/","name":"GBHackers Security | #1 Globally Trusted Cyber Security News Platform","description":"GBhackers Offering Exclusive Cyber Security News Coverage, New Research papers &amp; Technology Updates.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/gbhackers.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/gbhackers.com\/#\/schema\/person\/a4af1382fc74bb74e535a4cee4f1b428","name":"Mayura Kathir","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/gbhackers.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/fb526fdee24265698b1b6c6a44de0e17df52aab45a9582f55fab5b8a5928c4cf?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fb526fdee24265698b1b6c6a44de0e17df52aab45a9582f55fab5b8a5928c4cf?s=96&d=mm&r=g","caption":"Mayura Kathir"},"description":"Mayura Kathir is a cybersecurity reporter at GBHackers News, covering daily incidents including data breaches, malware attacks, cybercrime, vulnerabilities, zero-day exploits, and more.","sameAs":["https:\/\/gbhackers.com\/"],"url":"https:\/\/gbhackers.com\/author\/mayura\/"}]}},"jetpack_featured_media_url":"https:\/\/i2.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgp3-1dyGVgss-KuEVxrJEWhBUikHTnyQRq-8GukZyv3w6pgVw-OTqqYK8G7kcPZ11KNJPHIUbUqT36j36g5xa4J0Dj70IAavOrNSJ6_CWISBpUq8KUxzIYmQ9mQ_gBD7wsNZOqSBebtD7O8RIZwwJwmugVW0TQyDezIiEuWFJHwzGYKdzQhB_PKJ4efGKx\/s16000\/Untitled%20design%20-%202025-10-08T141628.406.webp?w=1600&resize=1600,900&ssl=1","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/gbhackers.com\/wp-json\/wp\/v2\/posts\/165430","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gbhackers.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/gbhackers.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/gbhackers.com\/wp-json\/wp\/v2\/users\/52"}],"replies":[{"embeddable":true,"href":"https:\/\/gbhackers.com\/wp-json\/wp\/v2\/comments?post=165430"}],"version-history":[{"count":7,"href":"https:\/\/gbhackers.com\/wp-json\/wp\/v2\/posts\/165430\/revisions"}],"predecessor-version":[{"id":165444,"href":"https:\/\/gbhackers.com\/wp-json\/wp\/v2\/posts\/165430\/revisions\/165444"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/gbhackers.com\/wp-json\/wp\/v2\/media\/165463"}],"wp:attachment":[{"href":"https:\/\/gbhackers.com\/wp-json\/wp\/v2\/media?parent=165430"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/gbhackers.com\/wp-json\/wp\/v2\/categories?post=165430"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/gbhackers.com\/wp-json\/wp\/v2\/tags?post=165430"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}