Phishing – It’s Not About Malware (Or Even Email)

Phishing has been and continues to be one of the most common attack methods (often called TTPs) cyber attackers use because it is so effective.

Phishing is a simple attack vector that enables cyber attackers to bypass most security controls.

Reports like the Verizon DBIR or the Microsoft Digital Defense report continue to identify phishing as a top risk.    

Several Trends We Are Seeing

Over the past several years phishing has continued to evolve.  While many of the emotional lures used to get people to fall victim remain the same (covered in more detail below), we have seen changes in both cyber attacker modalities and goals.

1.    Modalities:    Traditionally phishing was done through email.  However, we have seen a shift where messaging technologies are also being used, to include Apple’s iMessage, WhatsApp and standard SMS functionality.  Texting phishing attacks have become increasingly popular as many phones lack any type of filtering capability, which means scams and attacks are far more likely to get through.  Also, since text messages tend to be much shorter with little context, it’s much harder to confirm what is legitimate versus what is an attack.  As such, when training your workforce emphasise that phishing attacks no longer just happen over email, but via any messaging technology.

2.    Goal:     Traditionally the goal of cyber attackers with phishing attacks was to install malware on the victim’s computer. However, malware infections are becoming easier and easier for security teams to detect, so that approach has radically changed.  In today’s world we are seeing three other goals of phishing attacks. 

a.    Gaining Passwords: Phishing is used to get victims to click on a link that takes them to a website that harvests their passwords.  Once an individual’s credentials are stolen, cyber attackers can cause a great deal of damage while operating undetected.  For example, cyber attackers will send out emails pretending to come from peoples banks so they can reuse those credentials to access and steal money from peoples personal financial accounts.  Another common phishing lure is sending emails out pretending to come from Microsoft so attackers can steal peoples login credentials for their work related Microsoft 365 cloud accounts.    

b.    Getting People on the Phone: An increasing number of phishing attacks have no link or attachment, only a phone number as their point of attack.  The cyber attacker’s goal is to get the victim to call a phone number.  Once the victim is on the phone, cyber attackers will use stories and emotion to pressure people into taking actions, such as giving up their passwords, purchasing gift cards or transferring money from their bank accounts to accounts controlled by the attacker.  Attackers have learned that while these attacks usually require far more work as they are not automated, they are often more successful and profitable as they can fool people out of their checking, savings or retirement accounts, stealing their entire life savings. 

c.    Scams: Many phishing emails have no link or attachment, instead the messages are often very short and impersonate someone that the victim knows or trusts, such as their boss, a co-worker or a vendor they work or shop with.  BEC (Business Email Compromise) or CEO Fraud attacks are a common example, when cyber attackers send an urgent email to a specific individual in accounts payable pretending to be a very senior executive, pressuring the individual to approve an invoice or payment. The accounts payable person believes they are doing the right thing, not realising they are approving a payment to cyber criminals.

One way you can determine what type of phishing attacks your organisation is seeing is check with your Cyber Threat Intelligence team, your Email Support team or anyone responsible for your email filtering or perimeter defenses.  If you have some type of anti-phishing solutions (such as Proofpoint) your security team can log and categorise the type of phishing attacks your organisation is seeing.  

Below is an example of a real report for a real company, this was generated by Proofpoint.  In this chart we see the following. 

  •  69% of all phishing emails attempt to take the victim to a website to gather information.  This is primarily password harvesting but may also include sites that include “surveys”.
  •  14% are imposter based attacks, this would include scams such as BEC attacks, gift card, or billing / invoice scams.
  •  8% are Telephone Oriented Attack Delivery (TOAD) attacks.  This is a new category that Proofpoint added in 2023 due to the increase of these type of phishing attacks. The goal is for the victim to call a phone number.
  • Only 9% of all phishing emails are attempting to infect the victim with malware (via clicking on a URL or opening an email attachment).

The key takeaway here?  Phishing is no longer about infecting your computer.  The primary goal of phishing is to steal peoples credentials (logins and passwords) so they can then login as their victims.  

In addition, we see both Imposter based (like BEC) and Telephone based phishing attacks continue to rise.  Who needs to steal money or passwords when you can literally just ask for it.  If you can pull reports like the one above, you can track who cyber attacker phishing TTPs change over time.  

Most Common Phishing Indicators

What should we teach people so they can easily detect these ever-evolving attacks? We do not recommend that you try to teach people about every different type of phishing attack and every lure possible.  Not only is this most likely overwhelming your workforce but cyber attackers are constantly changing their lures and techniques.  Instead, focus on the most commonly shared indicators and clues of an attack. This way your workforce will be trained and enabled regardless of the method or lures cyber attackers use.  In addition, emphasise that phishing attacks are no longer just about email but use different messaging technologies.   That is why the indicators below are so effective, they are common in almost every phishing attack, regardless of the goal and if its via email or messaging.  

  • Urgency:   Any email or message that creates a tremendous sense of urgency, trying to rush the victim into making a mistake.  An example is a message from the government stating your taxes are overdue and if you don’t pay right away you will end up in jail.  The greater the sense of urgency the more likely it is an attack.
  •  Pressure:   Any email or message that pressures an employee to ignore or bypass company policies and procedures.  BEC / CEO Fraud attacks are a common example.
  • Curiosity:   Any email or message that generates a tremendous amount of curiosity or too good to be true, such as an undelivered UPS package or you are receiving an Amazon refund.
  • Tone:   An email or message that appears to be coming from a co-worker, but the wording does not sound like them, or the overall tone or signature is wrong.
  • Generic:   An email coming from a trusted organisation but uses a generic salutation such as “Dear Customer”.  If FedEx or Apple has a package for you, they should know your name.
  • Personal Email Address:   Any email that appears to come from a legitimate organisation, vendor or co-worker, but is using a personal email address like @gmail.com.  

Phishing Indicators We No Longer Recommend

These are typical indicators that have been recommended in the past but we no longer recommend them.

  • Misspellings:   Avoid using misspellings or poor grammar as an indicator, in today’s world you are more likely to receive a legitimate email with bad spelling than a crafted phishing attack.  Misspellings will most likely become even less common as cyber attackers use AI (Artificial Intelligence) solutions to craft and review their phishing emails and correct any spelling or grammar issues.
  • Hovering:   One method commonly taught is to hover over the link to determine if its legitimate.  We no longer recommend this method except for highly technical audiences.  Problems with this method include you have to teach people how to decode a URL, a confusing, time consuming and technical skill.

In addition, many of today’s links are hard to decode as they are re-written by phishing security solutions such as Proofpoint. Also, it can be difficult to hover over links with mobile devices, one of the most common ways people read email.  Finally, if you train every employee in your organisation to hover over and analyse every link in every email, that is an extremely high-cost behavior to your organisation.

To help your workforce better understand and defend against these type of attacks, here are several OUCH newsletters you can share with your workforce.  OUCH is a free, monthly security awareness newsletter published every month by SANS, with each edition translated into over 20 languages.  

  • Emotional Triggers – How Cyber Attackers Trick You
  • Charity and Disaster Scams
  • Phishing Attacks are Getting Trickier
  • Vishing – Phone Call Attacks and Scams
  • Social Engineering Attacks

To learn more about leveraging Cyber Threat Intelligence, how to more effectively manage human risk, and earn the SSAP consider the three day SANS MGT433 Managing Human Risk course.

Lance Spitzner is Director of SANS Security Awareness                       Image: iStock

You Might Also Read: 

Cyber Security Awareness Training For Management & Employees:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Innovation In Cyber Security: NDR Meets XDR
Browser-Based Social Engineering Trends »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Tech Industry Forum (TIF)

Tech Industry Forum (TIF)

Tech Industry Forum is a not-for-profit, membership driven trade body. We bring together end users and some of the UK’s leading cloud, software, platform, infrastructure, and service providers.

Perkins Coie LLP

Perkins Coie LLP

Perkins Coie LLP is an internationalk law firm with offices across the USA and Asia. Practice areas include Privacy and Data Security.

Trust in Digital Life (TDL)

Trust in Digital Life (TDL)

TDL is a membership association comprising companies, SMEs, universities and research institutes who exchange experience and insights to make digital services in Europe trustworthy and safe.

Hedgehog Security

Hedgehog Security

The key objective of Hedgehog is to provide simple, effective and affordable information security improvements that support your drive to increase productivity and profitability.

Penacity

Penacity

Penacity, LLC provides strategic consulting technology services and Information Security Services to commercial and government organizations.

Cyber Police of Ukraine

Cyber Police of Ukraine

Cyber Police of Ukraine is a law enforcement agency within the the Ministry of Internal Affairs of Ukraine dedicated to combating cyber crime.

Kiuwan

Kiuwan

Kiuwan provide software security solutions with SAST and SCA source-code analysis that fit into your DevOps process.

Syber Technology

Syber Technology

Syber Technology is an IT project implementer empowering IT systems of Small to Medium Enterprises in the Middle East.

Keeper Security

Keeper Security

Keeper is a leading enterprise password manager and cybersecurity platform for preventing password-related data breaches and cyberthreats.

link22

link22

link22 offers a high level of expertise within IT security and system solutions. We help public and private actors with highly secure IT-solutions.

AutoRABIT

AutoRABIT

AutoRABIT provides DevSecOps tools built specifically for Salesforce developers to increase release velocity, produce consistently high-quality code, and enhance data security.

Flat6Labs

Flat6Labs

Flat6Labs is the MENA region’s leading seed and early stage venture capital firm, currently running the most renowned startup programs in the region.

ResilientX

ResilientX

ResilientX is an All-In-One Security Testing Platform designed to help MSPs and SMBs to perform their security testing and assessments without having to outsource IT.

Cloud Software Group

Cloud Software Group

Cloud Software Group provides mission-critical software to enterprises at scale.

JustunSecure

JustunSecure

JustunSecure is dedicated to promoting information technology and cybersecurity in Africa.

XeneX

XeneX

XeneX Cloud Security Services address enterprise-class security challenges by enabling DevOps and Security teams to access a shared source of truth.