Spotting a Phish

Phishing HookPhishing is still the overwhelming go-to choice for cyber-criminals launching an attack.  Over 90% of computer system breaches start with a phishing email in an inbox.  Finding ways to unmask these impostors is a good first step are protecting yourself from a phishing exploit.  Let’s look at this first example, apparently from a law firm about a legal action.

 

green-winick

Spoofed sender – The first issue is that the sender is lichao@ntuh.gov.tw.  This is undoubltedly a spoofed or worse yet hijacked email account.  It obviously not from someone who works at Green Winnick.

Generic Greeting – Most phishing emails are sent in bulk to thousands, even millions of email addresses.  The greeting will not be personalized for you, but something such as “Dear Customer,” or in this case “Notice to Appear.”  Sometimes they may insert your email address on the greeting line.  Though in the case of a spearphishing attack, the email will very definitely be addressed to you, because this email was specially created just for you after much research by the attacker.

Bad Link – The link hiding under the word “here” does not go to a courts website or to Green Winnick.  It is going to a website at lilianarestrepo.info.  What follows the forward slash, and the long string of characters would indicate that this is an interior page that is probably carrying a drive-by download of malware.  We were able to reveal the destination by simply hovering over the link without clicking.  The tool tip box opened and let us check the destination of the link without danger.  If this trick does not work, you can try right-clicking the link and choosing “Properties” or “Inspect” from the context menu.  (Not left-clicking – that will take you to the malicious destination!)

The Story – There is always a story.  In this case, it is the threat of losing a lawsuit you of course knew nothing about.  Sometimes it is a lost, damaged or undeliverable package.  Might be unpaid and past-due taxes, or a past due invoice.  Or on the positive side, you might have been told you won a lottery you never entered.  After a natural disaster, phish are sent that play on your charitable nature by asking for a donation.  Or the widow of an African prince wants your help moving a pile of money illegally.

The Emotional Hook – The story is designed to change your emotional state from whatever is normal for you to one of fear, anxiety, concern, greed, or anger.  Or you may feel a sense of urgency or impending doom.  The email will try to get you to make a hasty and emotional decision.  If you are having one or more of these feelings, take a breath, and thirty seconds to calm yourself and perform a reality check


Let’s look at another example from “FedEx 2Day.”  Here again we have the spoofed email address.  Ken Brandt does not work for FedEx but is at “jeremysoares.com.”  The greeting on this one is personalized, but they did it by popping off “Bob” from my email address.  This time there is no link, instead there is an attachment.

Fed-Ex-phishing2

The Attachment – Many phishing emails, especially the ones that are distributing the crypto-ransomware attacks, will appear with an attachment.  Often, as with this example,  the attachment is a ZIP archive which will contain a document or two and a malicious software program that will install when you unzip the attachment.  Other common attachment types include PDF files, and Word, PowerPoint, or Excel documents.  The Office documents may be using hidden macros (yes the macros virus is back!), although when you try to open the file you will be told you have to enable macros to view the file. They may even provide step by step instructions to help you!  Enabling macros will run the Visual Basic software script and infect your computer.

Bad Grammar – For many of the people who craft these emails, English is not their first language.  Bad grammar, poor sentence structure, and confusing language usage are another indication that this email may not be legitimate.  To be fair to our adversaries, the English usage has improved dramatically over the last several years, so good grammar is proof of nothing.

The End Game – What are the bad guys after?  It may be just enough to get you to open the attachment and start the malware infection.  If you click through the link, you may be asked to provide your user ID and password, or other personal information on a web form.  Often this link will take you to a page that is serving up a malicious drive-by download.  Or this may be a scheme designed to part you from your money, as in a charitable contribution scam, advanced fee scam, or worse yet, using banking malware such as Everquest or DyreWolf to empty your bank account.

Hopefully this tutorial will help you wade through the minefield in your inbox, and avoid phishing emails.  If you found this information valuable, I hope you will share this column with your friends, family members, or coworkers.  As always, be safe out there!

 

 

 

 

 

 

0

About the Author:

I am a cybersecurity and IT instructor, cybersecurity analyst, pen-tester, trainer, and speaker. I am an owner of the WyzCo Group Inc. In addition to consulting on security products and services, I also conduct security audits, compliance audits, vulnerability assessments and penetration tests. I also teach Cybersecurity Awareness Training classes. I work as an information technology and cybersecurity instructor for several training and certification organizations. I have worked in corporate, military, government, and workforce development training environments I am a frequent speaker at professional conferences such as the Minnesota Bloggers Conference, Secure360 Security Conference in 2016, 2017, 2018, 2019, the (ISC)2 World Congress 2016, and the ISSA International Conference 2017, and many local community organizations, including Chambers of Commerce, SCORE, and several school districts. I have been blogging on cybersecurity since 2006 at http://wyzguyscybersecurity.com

Add a Comment


This site uses Akismet to reduce spam. Learn how your comment data is processed.