Think Like A Criminal: How To Write A Phishing Email
- by Brittany Day
With an alarming 65 percent increase in phishing attempts this past year, chances are you’ve been targeted in a phishing campaign. Hopefully you recognized signs of fraud and quickly deleted the malicious email; however, if you did get fooled, you’re not alone. Seventy-six percent of businesses fell victim to a phishing attack in 2019.
To defend against this dangerous and highly prevalent exploit, it helps to view phishing from the eyes of an attacker. In this article, we will teach you how to think like a criminal to gain a deeper understanding of phishing and email account compromise (EAC) - but only for educational purposes!
What Is Phishing and How Does It Work?
Phishing is an email-borne attack that involves fraudulent communications which appear to come from a reputable source. The goal of a phishing campaign is either to steal sensitive credentials or to install malware on the victim’s machine. When a user clicks on a malicious link within a phishing email, he or she is usually directed to a phony website login page. When the unsuspecting user logs in to this fraudulent page, his or her credentials are harvested by the attacker and can be used to compromise email accounts, obtain sensitive financial information or steal money. If a victim downloads a malicious attachment included in a phishing email, his or her computer can be infected with destructive malware.
Cyber criminals employ advanced social engineering techniques to manipulate psychology - encouraging recipients to act rapidly without stopping to think. Successful scams leverage trust - from the use of a familiar email address, to a familiar message in the body of the email, to the inclusion of a normal signature.
Recent phishing scams are exploiting email users’ heightened anxiety surrounding COVID-19, utilizing tactics such as impersonating government agencies, advertising fraudulent test kits and asking for donations. One notorious COVID-related phishing campaign claims to provide a list of “local active COVID-19 infections”. It includes the logo of the Center for Disease Control Health Alert Newark. When recipients click on a link within the email, they are asked to enter their email login credentials - which then end up in the hands of the attackers and can be used in account takeovers and dangerous future attacks.
How To Write A Phishing Email
Now it’s time to get cynical and think like a phisher! To demonstrate how to craft a phishing campaign, I will be using a phishing email recently identified and quarantined by Guardian Digital EnGarde Cloud Email Security.
1. Compromise an email account that can be used to launch a phishing campaign.
In a phishing campaign, fraudulent emails are either sent from an account that has been compromised in a previous attack carried out using another compromised account or from a spoofed email address that the attacker creates. This one really hits close to home, as the above email came from a Berkshire Hathaway employee’s compromised local desktop Outlook account (vtaig.com is actually Berkshire Hathaway Automotive). Even the identity of the user’s Outlook email signature was kept to leverage the trust that occurs with an existing profile.
Whereas phishing emails sent from spoofed email addresses which often contain misspelled words or additional characters can be relatively easy to identify as fraud, malicious emails like this one are highly deceptive and often go undetected because they are sent from a legitimate email account that has been hijacked by an attacker. This particular email passed through a Message Labs (now Symantec.cloud) antispam system undetected.
Received: from [100.112.1.169] (using TLSv1.2 with cipher
DHE-RSA-AES256-GCM-SHA384 (256 bits))
by server-3.bemta.az-b.us-east-1.aws.symcld.net id
27/82-39809-D39E3CE5; Tue, 19 May 2020 14:12:13 +0000
Received: from ptr1.vtaig.com (HELO mail.vtaig.com) (188.8.131.52)
by server-3.tower-381.messagelabs.com with ECDHE-RSA-AES256-SHA384
encrypted SMTP; 19 May 2020 14:12:10 -0000
Identifying and blocking sophisticated phishing attempts that originate from compromised email accounts requires superior protection than traditional antispam software provides. To safeguard the inbox against these dangerous attacks which can result in steep financial loss, significant downtime and reputation damage, it is critical that businesses implement an advanced cloud email security solution comprised of multiple layers of detection engines and spam filtration technology. Combating phishing requires a solution that is capable of learning and updating in real-time to remain ahead of emerging exploits.
2. Convince the recipient to give up credentials.
Phishing emails often contain malicious links or attachments designed to either harvest victims’ credentials or download malware on a victim’s device. This particular phishing email contains a malicious PDF attachment that requires the victim to login to a fake Microsoft SharePoint account where the attacker would then have access to the login credentials of the Berkshire Hathaway employee targeted in this attack.
It can be very difficult to discern whether an embedded link or attachment is legitimate or fraudulent, and one mistake can have devastating consequences - shaking a company to its core. To protect against email attacks involving malicious attachments or links, organizations should implement a solution that offers complete defense against ALL malicious links and attachments with real-time URL scanning and broad-type file analysis.
3. Evade spam filters with the use of nonspecific language.
Phishers typically use vague, nonspecific language in their campaigns. In this particular case, both the subject and the body text of the email are general - conveying a cold, unfriendly tone. As opposed to including details on the contract payment, the attacker simply chose to use “Doc” as the subject. Instead of including the recipient’s name in the greeting, the phisher initiates this email with a simple “Fyi”.
In their scams, threat actors often avoid using words such as “IRS” that are commonly picked up by spam filters in an effort to remain undetected for as long as possible. Regardless of this tricky tactic, a comprehensive, multi-layered email security solution will identify and quarantine these dangerous emails, preventing the serious harm that can result from a phishing attempt reaching the inbox.
4. Compromise other email accounts, which can be used to launch future attacks.
If you carefully examined the above image, you may have picked up on the fact that this email does not contain the recipient’s email address. This is related to how criminals launch their attacks. Phishers either run through the address book of the compromised email account they are sending messages from, or define a list of victims that they plan to target. In many cases, phishers will “trickle” out these malicious emails slowly in an effort to fly under the radar for as long as possible.
Phishing is a vicious cycle: successful attempts result in the compromise of other accounts which can be used to launch future phishing attacks, compromising yet more email accounts. Breaking this cycle and winning the fight against cyber crime requires protection that is able to rapidly and accurately detect phishing and impersonation attacks, preventing EAC and the perpetuation of phishing campaigns.
Interested in learning more about how you can safeguard your business, your data and your users from phishing attacks? We can help! Speak with a security representative today.
- Effectively Securing Business Email Accounts: Are Employees the Weakest Link?
- Encryption: An Essential Yet Highly Controversial Component of Digital Security
- Business Email Security Redefined: Key Benefits of Securing Your Business Email with Guardian Digital
- 8 Business Email Security Best Practices
- Demystifying Email Encryption: Stop Sender Fraud
- Demystifying Phishing Attacks: How to Protect Yourself Now
- Demystifying Tax Fraud: How to Avoid Falling Victim to Deceptive, Costly Scams This Tax Season
- Coronavirus Phishing Scams are On the Rise - Is Your Business Email at Risk of Infection?
- Dave Wreski: Founder of Guardian Digital – Open Source Cloud Email Security
- New Ransomware Warnings: Is Your Business Safe from This Silent Threat?
- FBI: Existing Cloud Email Protection Inadequate Against Phishing, Ransomware
- Email Risk is Universal: Securing Business Email in Every Industry Sector
- How To Safely Navigate Office 365 While Working Remotely
- Tips and Advice for Staying Safe Online During COVID-19
- Why Your Business Needs Better Email Security
- Defending Against COVID Email Spoofing Attacks with DMARC
- You’ve Got Mail: How To Tell If It’s Fraud
- Open-Source Security Is Opening Eyes
- Think Like A Criminal: How To Write A Phishing Email
- The Four Biggest Email Threats Your Business Faces Today
- Everything On DocuSign Phishing Attacks in 3 Minutes
- Understanding Payload-Less Email Attacks in Under 3 Minutes
- Demystifying Fileless Malware in Less than 3 Minutes
- How to Protect Sensitive Data & Maintain Client Trust in Financial Services Industry
- Exchange Servers Are Vulnerable - Learn How To Secure Your Email Server Now
- Apache SpamAssassin Leads A Growing List of Open-Source Projects Taking Steps to Correct Instances of Racism and White Privilege
- Cyber Risk Is Greater than Ever in the Legal Industry
- Understanding Malicious URL Protection - And Why You Need It to Secure Your Email
- Email Security for SMBs Beyond COVID-19
- Email Risk Is BIG for SMBs - How To Protect Your Business Now
- Email Threats By The Numbers: How Big Is My Risk?
- The Modern Email Threat Landscape: Where Traditional Defenses Fall Short
- Why Email Security Is More Important Than Ever in This 'New Reality'
- The Threat of CEO Fraud Extends Beyond the C-Suite
- Top Email Security Trends Putting Your Business at Risk of Attack
- Think Like A Criminal: What You Need to Know About Social Engineering Attacks in 2020
- Managed Services: A Key Element of Effective Email Security that Even Modern Solutions Lack
- How To Secure Your Remote Workforce: Advice from Leading Security Experts
- FBI: The 2020 Presidential Election Is Under Attack by Email Scammers
- AT&T Security Researchers Identify a Correlation between Strong Cybersecurity and Business Success
- The Aftermath of a Cyberattack Pt. 1: Phishing Recovery Basics
- It Pays to be Prepared! Ransomware Preparedness & Recovery Basics
- Breaking Down Fileless Malware: Anatomy of an Attack
- Office 365 Email Is Vulnerable to Attack Without These Critical Supplementary Defenses in Place
- Your Current Approach to Email Security May Not Be Enough
- Ways to Prevent Email Account being compromised in a Breach
- Celebrating 20 Years of Revolutionizing Digital Security
- IBM Closes its $34 Billion Acquisition of Red Hat
- Interview with Security Expert and Author Ira Winkler
- What is Phishing Email? How to prevent Phishing email scams?
- Ways Our Business Email Exceed Your Expectations
- Spear Phishing Protection - Definition & How To Recognize Spear Phishing Email
- What is Whaling (Whaling Phishing)? & How to Prevent Whaling attacks?
- Ransomware Attack Explained - Best Practices For Ransomware Protection
- Business Email Compromise (BEC) - Definition & Prevention From BEC Attacks
- Wire Transfer Scams Involving Real Estate Transactions: How to Prevent Fraud with Effective Email Security
- Guardian Digital and Mautic: A Dynamic Open-Source Duo
- Email Malware - How to Recognize & Prevent Malware Email Attack
- An Open-Source Success Story: Apache SpamAssassin Celebrates 18 Years of Effectively Combating Spam Email
- What is Spam Email - Types & How to Prevent Spam Emails?
- Email Virus - Complete Guide to Email Viruses Plus Best Practices
- What Is A Zero-Day Attack & How To Prevent Zero Day Exploit?
- 2020: A New Decade of Digital Threats - Is Your Business Email Secure?
- Linux: An OS Capable of Effectively Meeting the US Government’s Security Needs Heading into 2020
- Email Security: Complete Guide on Email Protection & Types of Email Threats
- Guardian Digital Keeps its Customers Protected from Intel Design Flaw
- Security Spotlight: Open Source Email Security Solutions
- Top Six Advantages of Open Source Development/Products
- Python and Bash - Contenders for the most used scripting language
- Guardian Digital Outlines Top 4 Benefits of Choosing Cloud
- Unrivaled Protection Against Today’s Most Dangerous Threats
- Guard Your Email Accounts Against Today’s Most Dangerous Threats
- Security Highlights from Defcon 26
- Linux / Open Source FAQs: Common Myths / Misconceptions
- Email Security FAQs Answered by Guardian Digital
- Guardian Digital Mail Systems: Designed to be Secure Without Fail