The second way is called ROPEMAKER Matrix Exploit based on embedding the matrix of all ASCII characters for each letter in the email.
By the CSS display rules, an attacker can let each word appear and recreate the text he wants in the email anytime.
Use matrix for characters in email
E-mail scanning tools can't recognize these two types of attacks, but using matrices will create lots of cumbersome email because you have to embed the text matrix - numbers for each character, email security tools can be found.
Ribeiro said that the Mimecast has not detected any attacks using ROPEMAKER technology, but because of this vulnerability, email security tools cannot be recognized, so it does not exclude the case that it has already happened.
Although it sounds scary, in reality users don't have to worry much. Most email clients have a habit of extracting tags above (header tags) with HTML-formatted emails, including remote CSS file calling cards.
That is why most HTML email writing guidelines encourage web developers to only use inline CSS and avoid embedded CSS or remote CSS.
Mimecast tested ROPEMAKER with many email clients and said that the browser email interface is not affected when attacked by ROPEMAKER. Not surprisingly, these interfaces pull the tag header as carefully, avoiding interference with the normal header of the page.
In addition, a Reddit user also points out that 'this type of attack is very easy to filter' because the system administrator only needs to block the CSS source from when the email client requests it.