What is Right-to-Left Override (RTLO)?
Right-to-Left Override (RTLO) is a Unicode control character (U+202E) originally designed to support languages like Arabic and Hebrew that read from right to left. When inserted into text, RTLO reverses the display order of subsequent characters, making text appear reversed in file names or messages.
While this feature is useful for multilingual text rendering, cybercriminals have weaponized RTLO for phishing attacks, malware delivery, and file extension spoofing.
How RTLO is Exploited in Cyber Attacks
Attackers use RTLO to disguise file extensions, tricking users into opening malicious files. For example:
invoice[U+202E]gnp.js
This appears as:
invoicejs.png
to the user, hiding the fact that it’s a JavaScript file, not an image. Similarly, an executable like report[U+202E]cod.scr will display as reportrcs.docx, making it look like a harmless Word document.
Common Attack Scenarios
- Phishing Emails: Attachments disguised as images or documents.
- Malware Delivery: Executable payloads hidden behind fake extensions.
- Credential Theft: HTML files masquerading as
.wavor.mp4.
Why RTLO Attacks Are Dangerous
- Bypasses Visual Inspection: Users trust what they see in file explorers.
- Evades Security Filters: Signature-based detection often fails because filenames appear benign.
- Used by Advanced Persistent Threats (APTs): Nation-state actors and cybercriminal groups leverage RTLO in targeted campaigns.
Indicators of Compromise (IOCs)
- Filenames containing U+202E character.
- Files that appear as
.jpg,.mp4, or.docxbut execute as.exeor.scr. - Unexpected behavior after opening attachments.
How to Detect and Prevent RTLO Attacks
- Disable Macros and Auto-Execution in Microsoft Office.
- Use Endpoint Detection & Response (EDR) tools to flag Unicode anomalies.
- Educate Users about suspicious file naming tricks.
- Search for U+202E in Filenames during forensic analysis.
- Apply Heuristic Analysis to detect mismatched file extensions.
SEO Keywords to Target
- Right-to-Left Override attack
- RTLO Unicode vulnerability
- RTLO phishing technique
- Unicode security threats
- File extension spoofing
- Cybersecurity best practices
Conclusion
RTLO attacks exploit a simple Unicode feature to create highly deceptive phishing and malware campaigns. As these attacks resurface in modern threat landscapes, organizations must combine technical defenses with user awareness training to stay protected.