Categories: Cyber Crime

The marketing approach of cybercrime to phishing emails

Mark Sparshott, director at Proofpoint, explained that cybercrime manages phishing emails using techniques similar to those used by the marketing industry.

Phishing is still considerable on of principal cyber threats for Internet users, it is even more used to spread malware and link to compromised websites, for this reason cybercriminals are adopting new and innovative techniques to make this distribution channel more efficient.

Cyber criminals evaluate with great attention phishing emails, trying to evaluate their level of penetration on target side, as explained by Mark Sparshott, executive director at email security firm Proofpoint, they ‘manage’ phishing emails using techniques similar to those used by the marketing industry. Sparshott referred that cyber criminals behind phishing campaigns perform ‘test audiences’ on the phishing emails to evaluate their effectiveness.

An effective strategy must be able to convince victims to open emails and click on the links they include, the attackers try to profile the audience sending out small bursts of traffic to samples of their desired audience using different templates with different content. They then evaluate the success rate for the different templates, choosing the most successful version for the main email burst.

“Cyber criminals manage the content of their emails to entice clicks,”  “It’s the same technique you might find a leading marketing agency using.”said Sparshott.

Which are the most successful form of email-borne attack?

According Sparshott, fake LinkedIn invitations have a click rate double respect phishing email based on banking communications and fake order confirmations.

“The top three which achieve most success are social network communication, financial account warnings and order confirmation. That preys on human curiosity and desire to broaden one’s network, or to not lose money, or to check something you feel you didn’t order.”

“The LinkedIn lure is particularly effective, because it can look exactly as if it has come from LinkedIn itself. LinkedIn lures are twice as successful as others, and the most successful is the LinkedIn invitation.”

 

 

The goal for cyber criminals is to deceive the highest possible number of victims to click on the link in malicious emails, avoiding human suspicious and of course defense measures including gateway filtering.

“Filtering so much email gives us great visibility of the types of attack out there. We see spear phishing [emails targeting specific individuals, with information about them enticing users to open messages], long lining [a handful of emails targeting a specific organisation, with advanced obfuscation techniques], watering hole [where a website commonly used by the target group is infected with malware] and malvertising [where malware-laden adverts are injected into reputable websites],” is the description of scenario presented by Mark Sparshott speaking at recent Computing‘s IT Leaders’ Forum event in London.

“All these attacks leverage clever techniques to bypass traditional reputation and content-based checking at the time of delivery. Once in the inbox, they leverage an understanding of how humans work to make them click the link, where the payloads that attack the system flaws on the device the user is browsing from occur,” he added.

Traditional security systems scan email content searching for malicious content, advanced solutions are also able to scan the links and the sites those links direct users to for anything suspicious. This approach could not be sufficient because at the time the email was delivered, the email, and the sites it links to can all be free of malicious code. In a second phase, once the email passed the checks at “inboxes” side, the cyber criminals add the malware payload to their landing websites.

The analysis proposed by Proofpoint reveals that 10 per cent of users click these links on average, this percentage is alarming and let’s consider that messages succeed to by-pass anti-virus and spam filters.

The rates varied widely between companies, with some firms having a click rate of up to 50%, as a result not all organizations are equally targeted, large entities are hit slightly more than smaller. The experts discovered that  membership of an industry is more influential than the size of the victim company.

“The top three which achieve most success are social network communication, financial account warnings and order confirmation. That preys on human curiosity and desire to broaden one’s network, or to not lose money, or to check something you feel you didn’t order.”

As suggested by Sparshott, when you receive invitations in InBox don’t click accept or view it, manage it from the LinkedIn page from a new browser.

Pierluigi Paganini

(Security Affairs –  Phishing Email, Cybercrime)

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

A renewed espionage campaign targets South Asia with iOS spyware LightSpy

Researchers warn of a renewed cyber espionage campaign targeting users in South Asia with the…

4 hours ago

Misinformation and hacktivist campaigns targeting the Philippines skyrocket

Amidst rising tensions with China in the SCS, Resecurity observed a spike in malicious cyber…

4 hours ago

Russia is trying to sabotage European railways, Czech minister said

Czech transport minister warned that Russia conducted ‘thousands’ of attempts to sabotage railways, attempting to…

8 hours ago

Ransomware group Dark Angels claims the theft of 1TB of data from chipmaker Nexperia

The Dark Angels (Dunghill) ransomware group claims the hack of the chipmaker Nexperia and the…

10 hours ago

Cisco Duo warns telephony supplier data breach exposed MFA SMS logs

Cisco Duo warns that a data breach involving one of its telephony suppliers exposed multifactor…

21 hours ago

Ukrainian Blackjack group used ICS malware Fuxnet against Russian targets

The Ukrainian hacking group Blackjack used a destructive ICS malware dubbed Fuxnet in attacks against…

22 hours ago

This website uses cookies.