Types of Phishing
Reconnaissance
- Attacker is trying to find if the email is active.
- Can tell this without the recipient replying to the email.
- Recon emails can either contain random letters in the header (check for error codes being sent back)
- Use social engineering to get the recipient to respond
- Use tracking pixels to see if the email has been viewed
<img style="position: absolute;" src="Tracking"> <img style="display:none";"src="Tracking"> <img src="Tracking" width="0" height="0">
The following data can potentially be acquired and analysed using a tracking pixel.
- The operating system used (gives information on the use of mobile devices).
- Type of website or email used, for example on mobile or desktop.
- Type of client used, for example, a browser (webmail) or mail program (email client).
- Client’s screen resolution.
- Date and time the email was read.
- IP address (gives information on the Internet Service Provider and location).
Spam
- Often harmless
- Signed up to mailing lists without permission or hidden in terms and conditions when signing up to a website
- Be careful it’s not malspam (malicious emails sent to a lot of recipients)
Credential harvester
Malicious URL in email, taking victim to a webpage (often designed to look like a legitimate company) and prompted to enter login information.
- Imitates commonly-used websites and services (such as Outlook, Amazon, HMRC, DHL, FedEx, and many more).
- Entices the recipient to enter credentials into a fake login portal.
- Uses social-engineering tactics including; creating a sense of urgency, and using false authority.
- URLs may be completely random or attempt to copy the legitimate domain name of the organisation they are masquerading as.
- Often have small spelling or styling mistakes, something that is extremely rare with legitimate emails coming from big brands and organisations.
Social Engineering
- Manipulating people to think the email is from someone they know
- Making people think there’s a sense of urgency, this is to make them panic and do something without thinking too much into it, or checking if it’s true.
- Convincing the recipient to reply to an attacker’s initial email (recon emails).
- Convincing the recipient to transfer money by posing as the CEO, CTO, CFO, or another employee on the executive board.
- Convincing the recipient to provide the attackers with information that is confidential or private by posing as the data subject or someone in a higher position within the company.
Microsoft macro attacks
- Make sure macros are disabled in your Microsoft Office applications. In enterprises, IT admins set the default setting for macros: Enable or disable macros in Office documents
- Don’t open suspicious emails or suspicious attachments.
- Delete any emails from unknown people or with suspicious content. Spam emails are the main way macro malware spreads.
- Enterprises can prevent macro malware from running executable content using ASR rules.