Visual obfuscation

Summary

Sandbox analysis tools often screenshot the browser window and run the rendered page through a computer vision model to compare to known, legitimate login pages.

Subtle changes to the page can often defeat these kinds of detection, such asapplying an overlay blur, or a subtle color shift that is not noticeable by a human, but enough to throw off an automated comparison.

To get around this, attackers are dynamically generating visual elements on the page using phishing kits with a customizable frontend. This means they can modify the layout, backgrounds, logos, and colors almost infinitely so as not to trigger detections based on real page matching.

Examples