{"id":28035,"date":"2024-09-19T22:23:19","date_gmt":"2024-09-19T16:53:19","guid":{"rendered":"https:\/\/www.kaspersky.co.in\/blog\/mass-phishing-with-spear-tricks\/28035\/"},"modified":"2024-09-19T22:23:23","modified_gmt":"2024-09-19T16:53:23","slug":"mass-phishing-with-spear-tricks","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.in\/blog\/mass-phishing-with-spear-tricks\/28035\/","title":{"rendered":"Overcooking the phish"},"content":{"rendered":"<p>The trend of using <a href=\"https:\/\/securelist.com\/spear-phishing-meets-mass\/113125\/\" target=\"_blank\" rel=\"noopener\">spearphishing<\/a> techniques in mass emails continues to gain momentum. We recently came across a sample email in which attackers used a whole box of relatively sophisticated spearphishing tricks. Now, one might think that use of such tactics for a \u201cmere\u201d mass phishing attack would be somewhat OTT in terms of effort on the attackers\u2019 side; not so \u2013 it transpired in this case: the attackers still gave it a shot (though detailed analysis reveals the attack was doomed from the start). In any case, it presented us with an excellent opportunity to take a dive into the techniques employed by phishers.<\/p>\n<h2>Email mimicking update of corporate guidelines<\/h2>\n<p>\nAlmost everything about the email is spot on. It\u2019s addressed to a specific individual within a specific organization, and uses ghost spoofing for the sender\u2019s name \u2014 that is, the \u201cFrom\u201d field displays a forgery of the legitimate address of the target company (which, of course, has no relation to the <a href=\"https:\/\/www.kaspersky.com\/blog\/from-reply-to-check\/51859\/\" target=\"_blank\" rel=\"noopener nofollow\">address in the \u201cReply To\u201d field<\/a>).<\/p>\n<p>The email is sent through the infrastructure of a reputable marketing company, raising no red flags with email filters. What\u2019s more, the name of this company and the top-level domain hosting its website are deliberately chosen to lull the recipient\u2019s vigilance \u2014 the website\u2019s based in Indonesia, and the victim may well perceive the \u201c.id\u201d domain as an abbreviation for \u201cidentifier\u201d rather than a country code. Alongside the spoofed address in the \u201cFrom\u201d field, it looks convincing enough:<\/p>\n<div id=\"attachment_52192\" style=\"width: 1608px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2024\/09\/19222212\/mass-phishing-with-spear-tricks-letter.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-52192\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2024\/09\/19222212\/mass-phishing-with-spear-tricks-letter.jpg\" alt=\"Email mimicking update of corporate guidelines\" width=\"1598\" height=\"662\" class=\"size-full wp-image-52192\"><\/a><p id=\"caption-attachment-52192\" class=\"wp-caption-text\">Email mimicking update of corporate guidelines.<\/p><\/div>\n<p>But that\u2019s not all. In the email body there\u2019s practically zero text \u2014 only a copyright line and an unsubscribe link (both of which, as it happens, are inserted by the mail engine of the legitimate company used to send the message). Everything else, including the recipient\u2019s name, is an image. This is to prevent anti-phishing mechanisms from applying text-based filtering rules.<\/p>\n<p>An attached PDF file is used instead of a direct phishing link for the same reason. Websites can easily be blacklisted and blocked at the mail-server level. A PDF file, on the other hand, appears as a completely legitimate attachment.<\/p>\n<h2>PDF attachment<\/h2>\n<p>\nIn actual fact, attackers have long been concealing links in PDF files. Thus, in theory, security software should be able to analyze a PDF \u2014 including any text and links within. But the creators of this phishing campaign were wise to that as well. Their PDF technically has no text or links in it whatsoever. Instead, it presents another image featuring a QR code and embedded accompanying text.<\/p>\n<div id=\"attachment_52193\" style=\"width: 1605px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2024\/09\/19222243\/mass-phishing-with-spear-tricks-pdf-2.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-52193\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2024\/09\/19222243\/mass-phishing-with-spear-tricks-pdf-2.jpg\" alt=\"Contents of the attached PDF file: the QR code contains a malicious link\" width=\"1595\" height=\"843\" class=\"size-full wp-image-52193\"><\/a><p id=\"caption-attachment-52193\" class=\"wp-caption-text\">Contents of the attached PDF file: the QR code contains a malicious link.<\/p><\/div>\n<p>In addition, the PDF mimics the interface of DocuSign, a well-known service used for electronic document management. DocuSign does indeed allow you to send documents for signing, and to track their status. But, of course, it has nothing to do with PDF files housing a QR code.<\/p>\n<p>At this point, it becomes painfully obvious that the attackers overcooked the attack. The victim receives what seems to be confidential corporate guidelines by email, but to read them they need to scan a QR code with a mobile phone\u2026 \u2014 not exactly realistic. Most employees won\u2019t bother \u2014 especially if they use their own (non-corporate) phone.\n<\/p>\n<h2>Epic fail: the phishing website<\/h2>\n<p>\nSo what happens if the victim does pull out their phone and scan the code? Well, for starters, they\u2019ll be greeted by Cloudflare\u2019s verification system and asked to prove they\u2019re human. Cloudflare is a legitimate service to guard against DDoS attacks, and cybercriminals like to put their phishing pages behind it to add plausibility.<\/p>\n<p>But after that it\u2019s a disaster. The website plays an animation of an envelope opening, then crashes with an error message.<\/p>\n<div id=\"attachment_52194\" style=\"width: 1214px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2024\/09\/19222310\/mass-phishing-with-spear-tricks-web.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-52194\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2024\/09\/19222310\/mass-phishing-with-spear-tricks-web.jpg\" alt=\"Phishing site that appears to have an overdue bill\" width=\"1204\" height=\"1294\" class=\"size-full wp-image-52194\"><\/a><p id=\"caption-attachment-52194\" class=\"wp-caption-text\">Phishing site that appears to have an overdue bill,<\/p><\/div>\n<p>It appears the attackers forgot to renew their subscription to the hosting services. Maybe the site had some more kooky tricks in store for the victim, but by the time the phishing emails were being pumped out, it was already defunct.<\/p>\n<h2>How to stay safe<\/h2>\n<p>\nTo protect company employees from phishing:\n<\/p>\n<ul>\n<li>Secure corporate email <a href=\"https:\/\/www.kaspersky.com\/small-to-medium-business-security\/mail-server?icid=in_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder____ksms___\" target=\"_blank\" rel=\"noopener nofollow\">at the mail-gateway level<\/a>.<\/li>\n<li>Use <a href=\"https:\/\/www.kaspersky.co.in\/small-to-medium-business-security?icid=in_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener\">local security solutions<\/a> with anti-phishing technologies on all work devices (including mobile ones).<\/li>\n<li>Inform employees of the latest phishing tricks (for example, by pointing them toward our posts regarding <a href=\"https:\/\/www.kaspersky.com\/blog\/tag\/signs-of-phishing\/\" target=\"_blank\" rel=\"noopener nofollow\">signs of phishing<\/a>).<\/li>\n<li>Hold regular <a href=\"https:\/\/k-asap.com\/en\/?icid=in_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder____kasap___\" target=\"_blank\" rel=\"noopener\">cybersecurity awareness training for staff<\/a>.<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kesb-trial\"><input type=\"hidden\" class=\"placeholder_for_banner\" data-cat_id=\"kesb-trial\" value=\"18465\">\n","protected":false},"excerpt":{"rendered":"<p>This phishing campaign incorporates ghost spoofing, embedded text in images, a PDF file, a QR code, DocuSign imitation, and Cloudflare verification \u2014 yet it still completely misses the mark. <\/p>\n","protected":false},"author":2598,"featured_media":28037,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2036,2609],"tags":[19,76,3280],"class_list":{"0":"post-28035","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-enterprise","9":"tag-email","10":"tag-phishing","11":"tag-signs-of-phishing"},"hreflang":[{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/mass-phishing-with-spear-tricks\/28035\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/mass-phishing-with-spear-tricks\/23303\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/mass-phishing-with-spear-tricks\/28192\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/mass-phishing-with-spear-tricks\/38259\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/mass-phishing-with-spear-tricks\/52191\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/mass-phishing-with-spear-tricks\/37221\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/mass-phishing-with-spear-tricks\/28301\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/mass-phishing-with-spear-tricks\/34123\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/mass-phishing-with-spear-tricks\/33778\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.in\/blog\/tag\/signs-of-phishing\/","name":"signs of phishing"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts\/28035","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/users\/2598"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/comments?post=28035"}],"version-history":[{"count":1,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts\/28035\/revisions"}],"predecessor-version":[{"id":28036,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts\/28035\/revisions\/28036"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/media\/28037"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/media?parent=28035"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/categories?post=28035"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/tags?post=28035"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}