Phishing e-mails leveraged unique subjects and Office docs

Image: Stockfresh

29 April 2016

Phishing e-mails continued to evolve last year, according to a new report from PhishMe, with Microsoft Office documents and unique subject lines used to get past enterprise filters.

Malicious Office macros have been around since the 1990s, said David MacKinnon, director of research at PhishMe, because there is little that companies can do to block them.

“Office documents are part of everyday use,” he said.

And although many Office users do not take advantage of the macro functionality, if a company shuts off macros then the documents take the users through the process of turning them back on again.

“Inside these Word documents, there would just be a single image embedded, and the image just says, ‘Your security settings don’t allow you to view the document,’ and guide the user to enable the macros,” said MacKinnon.

One new take on Office documents is the use of PowerPoint files, he added. “This was new for us.”

PowerPoint attachments, instead of using macros, use embedded objects, he said.

“You can’t block it,” he said. “Most security controls will miss it.”

Attackers have also dramatically increased their use of unique subject lines to get past controls, he said. They have become clever in using recipient names, unique identifiers purporting to be invoice numbers or shipping codes, and templates with lists of words that can be recombined in various ways.

The latter look a little bit like the game Mad Libs, where, say, one of the words could be ‘advice,’ ‘memo,’ ‘note,’ ‘plan,’ ‘report,’ or ‘statement’. The result is an email that is both unique but still feels believable to the recipient. And it’s not just the subject lines that are changing, he added.

“Instead of 100,000 e-mails with the same attachment, you’ve got 100,000 emails with 100,000 different attachments,” he said.

And the message bodies are varied as well. For example, a fake invoice e-mail could contain a random dollar amount and different financial account codes.

PhishMe is a vendor that sends simulated phishing e-mails to enterprise employees as part of security awareness training.

According to MacKinnon, the likelihood that an employee will respond to a malicious phishing e-mail can be decreased significantly with training. However, the goal of anti-phishing training shouldn’t be to reach a particular low click rate, he said.

“It only takes a single click to open the door to attackers,” he said.

Instead, training should focus on teaching employees to report the phishing e-mails to security staff, so that they know when a company is being targeted by a phishing campaign and be prepared to respond.

After successful training, employees become the first line of defence against these kinds of attacks, instead of being the weakest links.

“We have more users reporting the phishing e-mails than clicking on them,” he said.

IDG News Service

Read More:

Leave a Reply

Back to Top ↑