Bypassing Spam Filtering Mechanism in Outlook

Karol Mazurek

In my previous article, I demonstrated how attackers could bypass Microsoft Defender SmartScreen using ISO files, allowing malicious executables to run without triggering security warnings.

That technique focused on post-download execution, where an attacker instructs the victim to extract and run malware. Still, attackers need a reliable method to deliver these malicious files without being flagged by email security systems.

This short blog post examines a newly discovered Outlook spam filter bypass that enables attackers to distribute malicious ISO files through emails without being quarantined by spam filters.

Technical Details

Outlook’s spam filtering mechanism is designed to detect and quarantine emails containing direct links to files with known malicious extensions (e.g., .iso, .exe). For instance, an email containing a visible link like https://afine.com/update.iso would typically be flagged and sent to the junk folder to prevent users from downloading potentially harmful content:

However, attackers can evade this detection using hyperlink obfuscation. By embedding a malicious URL under a benign-looking link, Outlook fails to detect the true destination of the hyperlink. For example:

<a href="https://afine.com/update.iso">https://afine.com/update</a>Code language: HTML, XML (xml)

As we can see below, the Spam Filtering Mechanism in Outlook did not block such links:

In this case, the recipient sees https://afine.com/update, which appears safe, but clicking the link initiates a download of update.iso, a potentially malicious file.

Impact

This vulnerability significantly reduces the effectiveness of Outlook’s spam filtering mechanism, allowing attackers to bypass security measures and distribute malicious files. Users who click the disguised links may unknowingly download and execute malware, leading to other cyberattacks.

Organizations relying on Outlook’s built-in security measures are at risk of phishing and malware attacks.

Recommendation

To mitigate this vulnerability, it is recommended that Outlook’s spam filtering mechanism be enhanced to analyze hyperlinks’ underlying URLs in addition to their visible text. Moreover, another technique using redirections can also bypass such filtering systems, so it is crucial also for spam filters to follow the links and analyze the final destination. Implementing URL inspection techniques to detect disguised links leading to harmful files will reduce the risk of phishing attacks.

Microsoft decided not to patch it, so it is advisable always to check underlying URLs and be cautious.

Final Words

This vulnerability in Outlook’s spam filtering highlights a fundamental weakness in how email security mechanisms analyze links and, based on it, make a spam decision.

Attackers can easily exploit this flaw to distribute malware using deceptive hyperlinks. Users and organizations should adopt proactive security measures to mitigate the risks of disguised links.

Microsoft has closed it as a Low-risk issue. There will be no CVE for that, and the bug will be patched later rather than sooner. Because of that, I thought it would be better to disclose it publicly rather than wait for the patch so the user can be aware of this issue from now on.

If you found this post helpful, check out my previous article on Microsoft Defender SmartScreen bypasses using ISO files. Understanding these techniques gives a full attack chain perspective.

Karol Mazurek
Head of Research

Is your company secure online?

Join our list of satisfied customers and safeguard your company’s data!

Trust us and leave your contact details. Our team will contact you to discuss the details and prepare a tailor-made offer for you. Full discretion and confidentiality of your data are guaranteed.

Willing to ask a question immediately? Visit our Contact page.