{"id":19002,"date":"2021-08-16T18:16:00","date_gmt":"2021-08-16T18:16:00","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=19002"},"modified":"2021-08-16T21:33:16","modified_gmt":"2021-08-16T21:33:16","slug":"phishing-campaign-used-morse-code-to-evade-detection","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/networks\/phishing-campaign-used-morse-code-to-evade-detection\/","title":{"rendered":"Phishing Campaign Used Morse Code to Evade Detection: Microsoft"},"content":{"rendered":"<p>A phishing campaign that Microsoft security researchers have been tracking for about a year highlights not only the ongoing success of <a href=\"https:\/\/www.esecurityplanet.com\/threats\/social-engineering-attacks\/\">social engineering<\/a> efforts by hackers to compromise systems, but also the extent to which the bad actors will go to cover their tracks while stealing user credentials.<\/p>\n<p>In a <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2021\/08\/12\/attackers-use-morse-code-other-encryption-methods-in-evasive-phishing-campaign\/\">blog post<\/a>, researchers with the Microsoft 365 Defender Threat Intelligence Team outlined how the cybercriminals changed tactics to evade detection, going so far as to change their obfuscation and <a href=\"https:\/\/www.esecurityplanet.com\/products\/best-encryption-software\/\">encryption<\/a> mechanisms an average of every 37 days \u2013 including using older encryption methods like Morse code.<\/p>\n<p>The hackers make these relatively rapid changes in hopes of ensuring that their phishing efforts will go undetected for as long as possible, the researchers said.<\/p>\n<p>\u201cThis campaign\u2019s primary goal is to harvest usernames, passwords, and \u2013 in its more recent iteration \u2013 other information like IP address and location, which attackers use as the initial entry point for later infiltration attempts,\u201d the researchers wrote, noting that in <a href=\"https:\/\/twitter.com\/MsftSecIntel\/status\/1310617564293201923\">previous comments<\/a> about the phishing campaign, the \u201ccomponents include information about the targets, such as their email address and company logo. Such details enhance a campaign\u2019s social engineering lure and suggest that a prior reconnaissance of a target recipient occurs.\u201d<\/p>\n<h2>Invoice-Themed Lures<\/h2>\n<p>The cybercriminals are using invoice themes with financial messages to lure people into clicking on the emails and the contained HTML files, like \u201cXLS.HTML\u201d to prepare the users to expect an Excel file. The attachments themselves contain several segments. There are JavaScript files that are used to steal passwords, which are then encoded. Over time, the hackers have moved from using plaintext HTML code to using other coding techniques \u2013 such as Morse code and other encryption methods \u2013 to hide the segments, the researchers wrote.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-large wp-image-19004\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2021\/08\/Microsoft-phishing-1024x610.png\" alt=\"Morse code phishing\" width=\"696\" height=\"415\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/Microsoft-phishing-1024x610.png 1024w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/Microsoft-phishing-300x179.png 300w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/Microsoft-phishing-768x458.png 768w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/Microsoft-phishing-150x89.png 150w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/Microsoft-phishing-696x415.png 696w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/Microsoft-phishing.png 1047w\" sizes=\"(max-width: 696px) 100vw, 696px\" \/><\/p>\n<p>Some of the code segments are housed in various open directories \u2013 rather than in the attachments themselves \u2013 and are called by encoded scripts.<\/p>\n<p>\u201cThis phishing campaign exemplifies the modern email threat: sophisticated, evasive, and relentlessly evolving,\u201d the Microsoft researchers wrote. \u201cIn effect, the attachment is comparable to a jigsaw puzzle: on their own, the individual segments of the HTML file may appear harmless at the code level and may thus slip past conventional security solutions. Only when these segments are put together and properly decoded does the malicious intent show.\u201d<\/p>\n<p>The emails mimic regular financial-related business transactions, in particular sending what appears to be vendor payment advice.<\/p>\n<p>Further reading: <a href=\"https:\/\/www.esecurityplanet.com\/endpoint\/microsoft-security-under-scrutiny-after-recent-incidents\/\">Microsoft Security Under Scrutiny After Recent Incidents<\/a><\/p>\n<h2>Multiple Segments to Campaign<\/h2>\n<p>The segments include the email address of the target and a logo of the targeted user\u2019s organization, giving the email the air of authenticity. (If a logo isn\u2019t available, the Microsoft Office 365 logo is used instead.) When the user opens the attachment, a script loads an image of a blurred account, suggesting that the sign-in for entering the account has timed out. A dialog box is shown prompting the user to enter their password. When the user types in the password, an error message is shown.<\/p>\n<p>While that is going on, the malware is stealing the user\u2019s data.<\/p>\n<p>Attackers have created 10 iterations of the phishing campaign since Microsoft security researchers first came across it in July 2020. The lures have included such phrases as \u201cpayment receipt,\u201d \u201cpayroll\u201d and \u201ccontract.\u201d The encoding evolved from plaintext HTML to other methods, such as Escape, Base64 and Morse code, which was used in February and May.<\/p>\n<p>In May, the hackers included a new module that was used to grab the user\u2019s IP address and country data, which were sent to a command-and-control server. This is the information that the bad actors could use in combination with usernames and passwords to their initial entry point in later attempts to get into systems.<\/p>\n<p>Last month, another new twist was introduced. Using the term \u201cpurchase order\u201d as the lure, <a href=\"https:\/\/www.esecurityplanet.com\/threats\/malware-types\/\">malware<\/a> no longer displayed a fake error message after the user typed their password, the researchers wrote. Instead, the phishing kit redirected the user to a legitimate Office 365 page.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-large wp-image-19003\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2021\/08\/Microsoft-encoding-1024x669.png\" alt=\"morse code phishing campaign\" width=\"696\" height=\"455\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/Microsoft-encoding-1024x669.png 1024w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/Microsoft-encoding-300x196.png 300w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/Microsoft-encoding-768x502.png 768w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/Microsoft-encoding-150x98.png 150w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/Microsoft-encoding-696x455.png 696w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/Microsoft-encoding.png 1059w\" sizes=\"(max-width: 696px) 100vw, 696px\" \/><\/p>\n<h2>Whitelisting vs. Blacklisting<\/h2>\n<p>The techniques used by the attackers highlight the ongoing debate between whitelisting and blacklisting, according to John Bambenek, threat intelligence advisor at IT and security operations company Netenrich.<\/p>\n<p>\u201cIf we rely on blacklisting techniques, there are near infinite ways to obfuscate and code away detection of malicious behavior,\u201d Bambenek told <em>eSecurity Planet<\/em>. \u201cIdeally we should focus on detecting what is benign and anything outside of that \u2013 such as the use of Morse code outside the Ham radio operator course \u2013 should be flagged and\/or blocked.\u201d<\/p>\n<h2>Social Engineering Still a Problem<\/h2>\n<p>The attack detailed by Microsoft shows again how social engineering is the driver for such phishing campaigns and that only a little bit of personalization is needed to convince the target to share login credentials to corporate resources or to download a malicious app, Hank Schless, senior manager of security solutions at cybersecurity firm Lookout, told <em>eSecurity Planet<\/em>.<\/p>\n<p>\u201cThis particular incident shows how attackers target individuals on particular cloud platforms, such as Microsoft Office, in order to steal corporate login credentials,\u201d Schless said. \u201cIt\u2019s not very complex for an attacker to build a web page that looks like a Microsoft login page and spoof the URL to appear legitimate at a quick glance.\u00a0As soon as the target enters their login credentials, the attacker can use them and log in from their own device and access corporate resources.\u201d<\/p>\n<p>Because login credentials are often the same for all work applications, the attacker can not only use them for Microsoft Office but for other software-as-a-service (SaaS) and infrastructure-as-a-service (IaaS) applications to get access to a company\u2019s most sensitive data, he said.<\/p>\n<p>Schless noted that phishing campaigns can be particularly effective on mobile devices like smartphones and tablets, which have \u201csimplified interfaces that hide many red flags indicative of phishing attacks.\u00a0They can also deliver phishing links through email, SMS, social media platforms, third-party messaging apps, gaming and even dating apps.&#8221;<\/p>\n<h2>A Multi-Layered Approach Needed<\/h2>\n<p>A key defense is using a <a href=\"https:\/\/www.esecurityplanet.com\/products\/casb-security-vendors\/\">cloud access security broker (CASB)<\/a> solution that can detect anomalous logins and activity, which could indicate an account has been compromised. If a user who normally logs in from New York suddenly does so from Moscow a few minutes later, the solution can revoke the employee\u2019s access and prevent attackers from stealing data or launching a <a href=\"https:\/\/www.esecurityplanet.com\/threats\/ransomware-protection\/\">ransomware<\/a> attack, he said.<\/p>\n<p>The Microsoft researchers also recommended a comprehensive approach given the highly evasive and fast-evolving nature of the threat. This would include multi-layered and cloud-based machine learning models and dynamic analysis to inspect emails and attachments and determine the reputation of both the message sender and recipient. Built-in <a href=\"https:\/\/www.esecurityplanet.com\/endpoint\/sandboxing-advanced-malware-analysis\/\">sandboxes<\/a> can examine files and URLs to determine if they\u2019re malicious.<\/p>\n<p>\u201cFor this phishing campaign, once the HTML attachment runs on the [Microsoft Defender for Office 365] sandbox, rules check which websites are opened, if the JavaScript files decoded are malicious or not, and even if the images used are spoofed or legitimate,\u201d they wrote.<\/p>\n\n\n<div id=\"ta-campaign-widget-66d6ecef7892e-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6ecef7892e\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6ecef7892e\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6ecef7892e\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6ecef7892e\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6ecef7892e\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6ecef7892e\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>A phishing campaign that Microsoft security researchers have been tracking for about a year highlights not only the ongoing success of social engineering efforts by hackers to compromise systems, but also the extent to which the bad actors will go to cover their tracks while stealing user credentials. In a blog post, researchers with the [&hellip;]<\/p>\n","protected":false},"author":256,"featured_media":19004,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[14],"tags":[5076,2736],"b2b_audience":[33],"b2b_industry":[],"b2b_product":[403,31789],"class_list":["post-19002","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-networks","tag-cybercrime","tag-phishing","b2b_audience-awareness-and-consideration","b2b_product-cyber-terrorists-and-cyber-crime","b2b_product-phishing-and-spear-phishing"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Phishing Campaign Used Morse Code to Evade Detection: Microsoft | eSecurity Planet<\/title>\n<meta name=\"description\" content=\"Cybercriminals change tactics often to evade detection - and can resort to some surprising techniques, Microsoft demonstrates.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/networks\/phishing-campaign-used-morse-code-to-evade-detection\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Phishing Campaign Used Morse Code to Evade Detection: Microsoft | eSecurity Planet\" \/>\n<meta property=\"og:description\" content=\"Cybercriminals change tactics often to evade detection - and can resort to some surprising techniques, Microsoft demonstrates.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/networks\/phishing-campaign-used-morse-code-to-evade-detection\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2021-08-16T18:16:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-08-16T21:33:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/Microsoft-phishing.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1047\" \/>\n\t<meta property=\"og:image:height\" content=\"624\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Jeff Burt\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jeff Burt\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/phishing-campaign-used-morse-code-to-evade-detection\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/phishing-campaign-used-morse-code-to-evade-detection\/\"},\"author\":{\"name\":\"Jeff Burt\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/62368dee45ce8f1ffc35abf9f8cc854e\"},\"headline\":\"Phishing Campaign Used Morse Code to Evade Detection: Microsoft\",\"datePublished\":\"2021-08-16T18:16:00+00:00\",\"dateModified\":\"2021-08-16T21:33:16+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/phishing-campaign-used-morse-code-to-evade-detection\/\"},\"wordCount\":1167,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/phishing-campaign-used-morse-code-to-evade-detection\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/Microsoft-phishing.png\",\"keywords\":[\"cybercrime\",\"phishing\"],\"articleSection\":[\"Networks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/phishing-campaign-used-morse-code-to-evade-detection\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/networks\/phishing-campaign-used-morse-code-to-evade-detection\/\",\"name\":\"Phishing Campaign Used Morse Code to Evade Detection: Microsoft | eSecurity Planet\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/phishing-campaign-used-morse-code-to-evade-detection\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/phishing-campaign-used-morse-code-to-evade-detection\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/Microsoft-phishing.png\",\"datePublished\":\"2021-08-16T18:16:00+00:00\",\"dateModified\":\"2021-08-16T21:33:16+00:00\",\"description\":\"Cybercriminals change tactics often to evade detection - and can resort to some surprising techniques, Microsoft demonstrates.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/phishing-campaign-used-morse-code-to-evade-detection\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/networks\/phishing-campaign-used-morse-code-to-evade-detection\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/phishing-campaign-used-morse-code-to-evade-detection\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/Microsoft-phishing.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/Microsoft-phishing.png\",\"width\":1047,\"height\":624,\"caption\":\"Morse code phishing\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/phishing-campaign-used-morse-code-to-evade-detection\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Phishing Campaign Used Morse Code to Evade Detection: Microsoft\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/62368dee45ce8f1ffc35abf9f8cc854e\",\"name\":\"Jeff Burt\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/Jeff-Burt-photo-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/Jeff-Burt-photo-150x150.jpg\",\"caption\":\"Jeff Burt\"},\"description\":\"Jeffrey Burt has been a journalist for more than three decades, the last 20-plus years covering technology. During more than 16 years with eWEEK, he covered everything from data center infrastructure and collaboration technology to AI, cloud, quantum computing and cybersecurity. A freelance journalist since 2017, his articles have appeared on such sites as eWEEK, eSecurity Planet, Enterprise Networking Planet, Enterprise Storage Forum, The Next Platform, ITPro Today, Channel Futures, Channelnomics, SecurityNow, and Data Breach Today.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/jburt\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Phishing Campaign Used Morse Code to Evade Detection: Microsoft | eSecurity Planet","description":"Cybercriminals change tactics often to evade detection - and can resort to some surprising techniques, Microsoft demonstrates.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/networks\/phishing-campaign-used-morse-code-to-evade-detection\/","og_locale":"en_US","og_type":"article","og_title":"Phishing Campaign Used Morse Code to Evade Detection: Microsoft | eSecurity Planet","og_description":"Cybercriminals change tactics often to evade detection - and can resort to some surprising techniques, Microsoft demonstrates.","og_url":"https:\/\/www.esecurityplanet.com\/networks\/phishing-campaign-used-morse-code-to-evade-detection\/","og_site_name":"eSecurity Planet","article_published_time":"2021-08-16T18:16:00+00:00","article_modified_time":"2021-08-16T21:33:16+00:00","og_image":[{"width":1047,"height":624,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/Microsoft-phishing.png","type":"image\/png"}],"author":"Jeff Burt","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Jeff Burt","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/networks\/phishing-campaign-used-morse-code-to-evade-detection\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/phishing-campaign-used-morse-code-to-evade-detection\/"},"author":{"name":"Jeff Burt","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/62368dee45ce8f1ffc35abf9f8cc854e"},"headline":"Phishing Campaign Used Morse Code to Evade Detection: Microsoft","datePublished":"2021-08-16T18:16:00+00:00","dateModified":"2021-08-16T21:33:16+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/phishing-campaign-used-morse-code-to-evade-detection\/"},"wordCount":1167,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/phishing-campaign-used-morse-code-to-evade-detection\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/Microsoft-phishing.png","keywords":["cybercrime","phishing"],"articleSection":["Networks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/networks\/phishing-campaign-used-morse-code-to-evade-detection\/","url":"https:\/\/www.esecurityplanet.com\/networks\/phishing-campaign-used-morse-code-to-evade-detection\/","name":"Phishing Campaign Used Morse Code to Evade Detection: Microsoft | eSecurity Planet","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/phishing-campaign-used-morse-code-to-evade-detection\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/phishing-campaign-used-morse-code-to-evade-detection\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/Microsoft-phishing.png","datePublished":"2021-08-16T18:16:00+00:00","dateModified":"2021-08-16T21:33:16+00:00","description":"Cybercriminals change tactics often to evade detection - and can resort to some surprising techniques, Microsoft demonstrates.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/phishing-campaign-used-morse-code-to-evade-detection\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/networks\/phishing-campaign-used-morse-code-to-evade-detection\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/networks\/phishing-campaign-used-morse-code-to-evade-detection\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/Microsoft-phishing.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/Microsoft-phishing.png","width":1047,"height":624,"caption":"Morse code phishing"},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/networks\/phishing-campaign-used-morse-code-to-evade-detection\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"Phishing Campaign Used Morse Code to Evade Detection: Microsoft"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/62368dee45ce8f1ffc35abf9f8cc854e","name":"Jeff Burt","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/Jeff-Burt-photo-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/Jeff-Burt-photo-150x150.jpg","caption":"Jeff Burt"},"description":"Jeffrey Burt has been a journalist for more than three decades, the last 20-plus years covering technology. During more than 16 years with eWEEK, he covered everything from data center infrastructure and collaboration technology to AI, cloud, quantum computing and cybersecurity. A freelance journalist since 2017, his articles have appeared on such sites as eWEEK, eSecurity Planet, Enterprise Networking Planet, Enterprise Storage Forum, The Next Platform, ITPro Today, Channel Futures, Channelnomics, SecurityNow, and Data Breach Today.","url":"https:\/\/www.esecurityplanet.com\/author\/jburt\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/19002"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/256"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=19002"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/19002\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/19004"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=19002"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=19002"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=19002"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=19002"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=19002"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=19002"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}