Remote images are proving to be a major problem for email filters
Only computer vision can be used to detect remote images in phishing emails
Cybercriminals often include images in their phishing emails to make them appear more legitimate but new research from the email security firm Vade Secure has revealed a new method hackers are using to evade email filters.
Image spam has traditionally been a popular method to circumvent email filters due to the fact there is no textual content for them to analyze. Instead the textual content is in the image itself, making it harder to scan for possible scams or fraud.
Cryptographic hashing algorithms such as MD5 make it easy for email filters to detect identical images but detecting similar images requires complex and costly algorithms. For this reason, cybercriminals often manipulate images slightly by adjusting their compression level, colorimetry or geometry to bypass email filters.
- We've put together a list of the best email clients around
- These are the best email services on the market
- Also check out our roundup of the best malware removal software
The end goal of this manipulation is to make each image unique in order to circumvent signature-based technologies. As this technique has grown in popularity though, email security vendors have improved their ability to extract and analyze content from images.
Remote images
Now that email security companies have improved their ability to detect images, cybercriminals have begun using remote images to bypass email filters. Unlike embedded images, email filters are unable to analyze remote images in real time as they are hosted on the web and therefore need to be fetched before being analyzed.
According to Vade Secure, use of remote images in phishing emails surged last year and in November alone, the company analyzed 26.2m remote images and blocked 262m emails featuring malicious remote images.
Cybercriminals are well aware that email security firms have begun looking for remote images in phishing emails which is why they have begun using multiple redirections, cloaking techniques and abusing high-reputation domains to avoid detection.
Are you a pro? Subscribe to our newsletter
Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!
Chief science officer at Vade Secure, Sébastien Goutal provided further insight on the tactics cybercriminals use to ensure their phishing emails reach their targets in a blog post, saying:
“As AI and Computer Vision become more prominent in email security, cybercriminals are being forced to innovate, and they are answering that call. For every detection method that is developed, cybercriminals are following closely behind and developing new phishing techniques to evade detection. Image manipulation and remote images will grow in both prominence and sophistication due to the limited ability of most solutions to analyze images. Cybercriminals are known for researching their targets—a quick search for a business’s MX record will reveal the email security solution protecting the business’s email. With this information in hand, they will learn to break through.”
- We've also highlighted the best antivirus
After working with the TechRadar Pro team for the last several years, Anthony is now the security and networking editor at Tom’s Guide where he covers everything from data breaches and ransomware gangs to the best way to cover your whole home or business with Wi-Fi. When not writing, you can find him tinkering with PCs and game consoles, managing cables and upgrading his smart home.