Evasive Maneuvers: Trends in Phishing Evasion & Anti-Evasion
This talk demonstrates advanced phishing evasion techniques, including text obfuscation using Unicode, browser-in-the-browser attacks, and the abuse of legitimate services like Google Translate for hosting malicious content. It highlights how attackers bypass traditional email security filters by leveraging trusted domains and encoded HTML files to deliver payloads. The presentation provides actionable insights for security professionals to improve detection by monitoring for suspicious inbox rules and implementing in-browser security solutions. The speaker also details the mechanics of recursive phishing and phone-based social engineering scams.
Beyond the Filter: How Modern Phishing Bypasses Your Email Security
TLDR: Modern phishing campaigns are moving away from simple malicious links and toward sophisticated evasion techniques like Unicode obfuscation, browser-in-the-browser attacks, and the abuse of trusted services like Google Translate. These methods effectively bypass static email filters and trick users by leveraging the reputation of legitimate platforms. Security teams must shift from perimeter-based email filtering to in-browser security and behavioral monitoring to catch these threats.
Traditional email security is failing because it relies on static analysis of content that attackers have learned to manipulate. If your security stack is still looking for known bad domains or simple malicious attachments, you are missing the vast majority of current phishing activity. Attackers have moved to a model where they exploit the trust users place in legitimate services, turning your own infrastructure against you.
The Death of Static Filtering
Attackers are no longer just sending links to malicious domains. They are using text obfuscation to bypass static text filters that look for keywords like "password" or "expiry." By injecting Unicode characters, such as zero-width non-breaking spaces or Cyrillic lookalikes, they create strings that look perfectly normal to a human eye but appear as gibberish or broken code to a security filter.
When you copy and paste these strings into a terminal, the obfuscation becomes obvious. The underlying Unicode structure reveals that a four-letter word like "Keep" can be transformed into an eight-letter string that bypasses simple regex-based filters. If your email security solution is not normalizing text before analysis, it is effectively blind to these techniques.
Browser-in-the-Browser and Service Abuse
One of the most effective techniques currently in the wild is the "browser-in-the-browser" attack. Attackers use HTML and CSS to render a fake browser window inside the actual browser. This window mimics a legitimate login portal, complete with a spoofed URL bar. Because the window is rendered within the page, the user sees a valid HTTPS connection to a trusted domain, while the actual content is being served from a malicious source.
Even more concerning is the abuse of legitimate services like Google Translate. Attackers host phishing pages on Google Translate domains, which carry a high reputation and are rarely blocked by corporate firewalls. By appending a parameter to the URL, they can force the page to render a perfect clone of a target login portal. Because the traffic originates from a Google-owned domain, it bypasses many reputation-based filters.
The Mechanics of Recursive Phishing
Account takeover is the ultimate goal, and attackers have automated the process of turning a single compromised mailbox into a distribution engine for further attacks. Once an attacker gains access to a mailbox, they don't just steal data. They define new inbox rules that automatically move specific emails—those containing keywords like "phish," "compromised," or "out of office"—into a hidden folder.
This allows the attacker to maintain persistence without the user ever seeing the automated alerts or security notifications that would normally tip them off. They then use the compromised account to send malicious payloads to the user's known contacts. Because the emails come from a trusted, internal source, the success rate for these campaigns is significantly higher than traditional external phishing.
Moving Toward In-Browser Security
Defending against these threats requires a shift in strategy. Perimeter-based email security is no longer sufficient. You need to move detection closer to the user, specifically within the browser environment. Modern in-browser security solutions can monitor user actions in real-time, identifying when a user is interacting with a suspicious form or when a page is attempting to render a fake browser window.
For penetration testers and researchers, this means your engagement methodology must evolve. During a red team exercise, don't just test the email gateway. Test the user's ability to identify a browser-in-the-browser attack and evaluate whether your client's endpoint security can detect the execution of encoded HTML files.
Actionable Steps for Your Team
Start by auditing your organization's SPF and DMARC configurations. If you aren't strictly defining which IP addresses are allowed to send mail on your behalf, you are leaving the door open for spoofing.
Next, implement regular, simulation-based training that goes beyond simple link-clicking. Use templates that mimic the sophisticated techniques discussed here, such as QR code phishing or fake invoice scams that require a phone call. Finally, monitor your environment for suspicious inbox rules. If you see rules that automatically move or delete messages based on security-related keywords, you are likely already dealing with a compromised account.
The cat-and-mouse game of phishing has entered a new phase. Attackers are no longer relying on technical exploits alone; they are exploiting the fundamental trust we place in the tools we use every day. Your defense must be just as adaptive.
Vulnerability Classes
Tools Used
Target Technologies
Attack Techniques
OWASP Categories
Up Next From This Conference

Chained to Hit: Discovering New Vectors to Gain Remote and Root Access in SAP Enterprise Software

Zero-Touch-Pwn: Abusing Zoom's Zero Touch Provisioning for Remote Attacks on Desk Phones

ODDFuzz: Hunting Java Deserialization Gadget Chains via Structure-Aware Directed Greybox Fuzzing
Similar Talks

Kill List: Hacking an Assassination Site on the Dark Web

Counter Deception: Defending Yourself in a World Full of Lies

