CyberFlame Lessons

Phishing Awareness Essentials

Published on February 24, 2024 | Author: S.Luis@CyberFlame

The term "Phishing" is a playful misspelling of the word fishing. It's named that way for very good reason! To understand Phishing it's useful to understand the analogy behind it.

Just as a fisherman uses bait to catch fish. Criminals will use bait to catch you.

The bait can come in many forms - all of which designed to pull you in and potentially divulge credentials, click malicious links or engage you in a social engineering scam

We'll start by inspecting a Malicious phishing website, then we'll take a look at some more advanced methods like how these attackers deliver malicious payloads e.g. Malware (malicious software), to your machine

🔑 Here are some Key methods to look out for:

Drive by Downloads and Malware:

A "Drive by download" refers to a malicious download that doesn't require you to do anything other than visit a particular URL

Take a look at the following URL:

https://dodgydomain/download?Dodgydownload="a7bce3f6d"

A brief explanation. This URL triggers an http "GET" request, the link queries the server's database for the malware to download

You'll see the "https://Dodgydomain" structure that you may be familiar with - the "/download" portion refers to a path on the website (A particular page hosted on the address you're searching for).

The "?Dodgydownload="a7bce3f6d"" section is the part that asks the server "Hey, could you find this particular file and download it for me? (when a server is set up to do this)

It's not a very sophisticated technique for this, however it is very common. If you wanted to, you can capture these requests and analyse them before they're sent in Security tools like "BurpSuite".

Typically, the more advanced kind of this would be to use tailored java script or methods for detecting the browser you're using and exploiting known vulnerabilities for it vesrion

There is plenty of security features in place to protect against this on the browser level.

  • However, to effectively take advantage of these, keep your Browser up to date
  • Business Email Compromise:

    This is a phishing technique that is growing in popularity exponentially.

    BEC comes in two forms

  • 1. An attacker gains access to an employees email address. This allows them to phish further internally with greater effect and abuses the immediate trust colleagues may have for another.
  • 2. An attacker poses as an employee by either spoofing their address or using an email address that may loosely look like the original address to an unsuspecting eye.
  • The second method is easier to mitigate. Email spoofing is very hard with modern security features, and spotting a typo in an address is certainly possible if you take the time to check them.

    The First however - is a little more tricky to spot. Consider the following email:

    Jimmy_CEO: "Hi jane, could you do me a favour? I need you to give me your password for the company finances sharepoint ASAP, I can't log in and I need those figures for this meeting in 5 minutes. Really sorry, thanks."

    Simply reading this here, you may think - "I'd never fall for that!".

    But really think about it... You receive an email. From your boss. On your boss' email. With absolute urgency. What are the consequences if you don't?

    It's a very serious issue with ever growing prominence. However here are some basic points to think about:

  • Does this email feel out of character?
  • Do I have a bad/off feeling about this?
  • Could I quickly pick up the phone or pop into their office to speak to them in person?
  • When it comes to true BEC, you have to trust your gut - and wherever possible, if sensitive information is being exchanged, verify the request in person.

    In essence, it all boils down to how YOU manage YOUR cybersecurity practises.

    Sure, you may have an IT team to secure the devices and networks, you may have windows defender, you may be sitting safely behind a firewall - but the rest is up to you.

    Thousands of people are victims of Cyber Crime everyday. Hundreds of thousands of people a year. That's hundreds of thousands of people that think "It'll never happen to me".

    Here at CyberFlame, we'll keep you right. Stay tuned!