WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home Community Partnerships ZeroFont Phishing Technique Targets Automated Email Security Platforms
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Directory
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

ZeroFont Phishing Technique Targets Automated Email Security Platforms

Author: April Zupan

Created: Thursday, September 28, 2023 - 18:07

Categories: Cybersecurity, Intelligence

Bleeping Computer has written an article discussing the ZeroFont phishing technique and its implications for network defense.

The technique was first documented in 2018, though threat actors have been observed utilizing new variations of it even now. The ZeroFont technique exploits flaws in the automated language processing systems that email security platforms use. Additional words and characters can be hidden in an email by setting their font size to zero, so humans don’t read them. However, automated systems will and the right combination of benign hidden words counteracting malicious words can confuse a platform. The latest variation instead utilizes zero-font words to exploit Outlook and manipulate previewed text to gain a sense of legitimacy. Members should be aware of this technique and consider adding it to phishing security courses for staff. Read more at Bleeping Computer.

Related Resources

(TLP:CLEAR) FIRESTARTER Backdoor and Updated Emergency Directive for CISCO Firepower and Secure Firewall Devices

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness
Members Only

(TLP:GREEN) FBI FLASH – Newly Observed Ransomware Variant Black Shrantac Threat to U.S. Entities

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness
Members Only

(TLP:AMBER+STRICT) Likely PRC State-Sponsored Activity Observed in the Water Sector – DocuSign Phishing Tactics Identified

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar