Common Information
Type | Value |
---|---|
Value |
Right-to-Left Override - T1036.002 |
Category | Attack-Pattern |
Type | Mitre-Attack-Pattern |
Misp Type | Cluster |
Description | Adversaries may abuse the right-to-left override (RTLO or RLO) character (U+202E) to disguise a string and/or file name to make it appear benign. RTLO is a non-printing Unicode character that causes the text that follows it to be displayed in reverse. For example, a Windows screensaver executable named <code>March 25 \u202Excod.scr</code> will display as <code>March 25 rcs.docx</code>. A JavaScript file named <code>photo_high_re\u202Egnp.js</code> will be displayed as <code>photo_high_resj.png</code>.(Citation: Infosecinstitute RTLO Technique) Adversaries may abuse the RTLO character as a means of tricking a user into executing what they think is a benign file type. A common use of this technique is with [Spearphishing Attachment](https://attack.mitre.org/techniques/T1566/001)/[Malicious File](https://attack.mitre.org/techniques/T1204/002) since it can trick both end users and defenders if they are not aware of how their tools display and render the RTLO character. Use of the RTLO character has been seen in many targeted intrusion attempts and criminal activity.(Citation: Trend Micro PLEAD RTLO)(Citation: Kaspersky RTLO Cyber Crime) RTLO can be used in the Windows Registry as well, where regedit.exe displays the reversed characters but the command line tool reg.exe does not by default. |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2023-11-03 | 3 | Detect Phishing Emails by Inspecting Email Headers, Attachments, and URLs | ||
Details | Website | 2023-10-11 | 99 | Qakbot evolves to OneNote Malware Distribution | ||
Details | Website | 2023-08-04 | 4 | Teach a Man to Phish and He’s Set for Life – Krebs on Security | ||
Details | Website | 2023-06-05 | 102 | Vulnerability Summary for the Week of May 29, 2023 | CISA | ||
Details | Website | 2023-05-30 | 3 | NVD - CVE-2023-33955 | ||
Details | Website | 2023-03-09 | 2 | Hackers using OneNote instead of macros to deliver malware: Report | IT World Canada News | ||
Details | Website | 2023-03-08 | 18 | A Noteworthy Threat: How Cybercriminals are Abusing OneNote – Part 1 | ||
Details | Website | 2022-12-08 | 10 | Trojanized OneNote Document Leads to Formbook Malware | ||
Details | Website | 2022-12-07 | 11 | Malware Distributed with Disguised Filenames (RIGHT-TO-LEFT OVERRIDE) - ASEC BLOG | ||
Details | Website | 2022-11-30 | 11 | 위장 파일명으로 유포되는 악성코드(RIGHT-TO-LEFT OVERRIDE) - ASEC BLOG | ||
Details | Website | 2022-11-21 | 10 | [ Malware Analysis #5] — Eternity Project — Eternity Worm | ||
Details | Website | 2022-09-01 | 21 | RAT Tool Disguised as Solution File (*.sln) Being Distributed on Github - ASEC BLOG | ||
Details | Website | 2021-06-16 | 85 | Ferocious Kitten: 6 years of covert surveillance in Iran | ||
Details | Website | 2020-02-10 | 47 | Suspected Sapphire Mushroom (APT-C-12) malicious LNK files | ||
Details | Website | 2018-02-13 | 56 | Zero-day vulnerability in Telegram | ||
Details | Website | 2017-12-08 | 2 | Interesting disguise employed by new Mac malware HiddenLotus | Malwarebytes Labs | ||
Details | Website | 2016-01-24 | 196 | Scarlet Mimic: Years-Long Espionage Campaign Targets Minority Activists | ||
Details | Website | 2013-08-01 | 1 | Sophos Discovers ZeroAccess Using RLO | Malwarebytes Labs | ||
Details | Website | 2013-07-22 | 14 | — |