Phishing hits a new level of quality

Hello community,

In recent weeks I’ve noticed that the quality of phishing e-mails I’m receiving (even to my personal account) have reached a new quality. They are getting better and better every day and even the latest spam filters let them through.

Why are they better?

stick_figure_fishing_pc_800_clr_3474

Let’s look at one currently being sent out to many e-mail addresses that appears to be from DHL about tracking orders on the way to your house. For the German speaking market the quality is very good. Previously, end users have easily detected this kind of phishing attack as they contained spelling errors or bad translations form Google translate. Today they no longer include spelling errors and even the graphics and the branding of the e-mail look genuine.

Take a look on your own and see what you think!

Which one is the phishing e-mail?

dhl_spear_phising

Which one do you think is original and which one fake? The sender address in both e-mails is not DHL.

I can tell you – the left one with the OXID7 logo is a valid DHL e-mail – I ordered some doorstops from Amazon (I’ve just moved house).

The hyperlink in the DHL phishing email is the malicious content linking to a *.org page to start delivering malware for download.

What can you do?

We will see more and more of these advanced and targeted attacks in the future and you can’t prevent them completely. Even if you can prevent 95% with up to date technology, letting 5% through is still a threat.

So it’s more and more important that organizations have visibility and the ability to create awareness once they identify that a phishing attack has succeeded.

In this example an organization needs to have the capability to ask the following questions:

who_has_the_answer_800_clr_5653

If organizations have the capability to get quickly answers to their questions they lower their risk and can respond with the right actions to prevent further damage.

Thanks for reading!

Matthias

Further Reading:

Preparing users for phishing attacks with Splunk

Identifying Phishing Sites in Your Events

Risk Analysis With Enterprise Security 3.1

Related Articles

Detecting Dubious Domains with Levenshtein, Shannon & URL Toolbox
Security
6 Minute Read

Detecting Dubious Domains with Levenshtein, Shannon & URL Toolbox

Got some parsed fields that you're ready to analyze... possibly for threat hunting? We'll use Levenshtein, Shannon & URL Toolbox to show you how!
What Keeps the CISO Awake at Night? Four Dreaded Security Headlines
Security
2 Minute Read

What Keeps the CISO Awake at Night? Four Dreaded Security Headlines

Would your organization's security team be prepared if these headlines appear in tomorrow's news?
Peeping Through Windows (Logs): Using Sysmon & Event Codes for Threat Hunting
Security
12 Minute Read

Peeping Through Windows (Logs): Using Sysmon & Event Codes for Threat Hunting

Windows and endpoints go together like threat hunting and Splunk. Let's look at the most valuable Sysmon event codes for threat hunting in Splunk.