Friday, September 22, 2023
LetsAskBinu.com
  • Home
  • Cybersecurity
  • Cyber Threats
  • Hacking
  • Protection
  • Networking
  • Malware
  • Fintech
  • Internet Of Things
No Result
View All Result
LetsAskBinu.com
No Result
View All Result
Home Protection

Dear all! What are some common subject lines in phishing emails?

Researcher by Researcher
September 14, 2023
in Protection
0
Dear all! What are some common subject lines in phishing emails?
189
SHARES
1.5k
VIEWS
Share on FacebookShare on Twitter


In 2014, a data breach exposed information of three billion Yahoo users. In 2016, Sony Pictures employees saw sensitive private information leaked along with thousands of company documents. What do these two attacks have in common? Both started with a phishing email.

Email threats are still one of the most common ways attackers have to access sensitive information or install malware. While most known cases of phishing target anonymous users, the attackers can also use emails containing fake links or files to target specific individuals who hold sensitive information. And, as ESET researchers point out, in 2022, this kind of threat saw a year-over-year increase of almost 30%. And as AI language models make it easier to compose emails, chances are that these numbers are just about to go up even more!

Phishing attacks are a form of social engineering that makes us react with a sense of urgency and curiosity. While we can all be victims of this type of attack, we can also learn to avoid it. Let’s take a look at some real-life examples of the most common phishing used to trick us.

1. “Your session expired. Click here to sign in again.”

Some of the most common phishing lines and tactics just briefly inform you that you’ve been logged out of an account and it pushes you to fill in your credentials. Clicking the link will take you to a website looking very similar to the real one. The difference, however, is that inputting your credentials will send them right away to the attackers, who will then use them to access your information. In some instances, they might even log in for you and change the password to avoid giving you access.

This technique relies on the users’ habit of responding to such messages automatically without thinking about the content or without checking for the typical signs of a phishing email/message. (Learn about those signs here). 

For example, last year, GitHub Security warned about emails impersonating the popular software development CI/CD platform CircleCI. The impersonators would send an alert with “session expired” and request a new login using GitHub credentials. “We have noticed some unusual activity on your account. Please verify.”

With this trick, scammers try to whip up a sense of urgency. Who wouldn’t want to avoid the sudden loss of an account, right? Usually, these emails impersonate messages from legitimate services such as Amazon, PayPal, etc.  

For example, in late 2018, The United States Federal Trade Commission (FTC) issued a warning about phishing emails impersonating the streaming giant Netflix. These emails claimed that an account was put on hold due to something wrong with payment details, asking people to update their billing information using an embedded link, which was, of course, malicious and used to obtain login credentials.

Similarly, Apple customers were targeted in 2016 when scammers tried to steal their personal information with phishing emails claiming that users needed to reconfirm their account details because “a virus” had been found in Apple’s iTunes database. 

apple-scam

Spammed-out email

2. “I need you to make an urgent payment”

Impersonating corporate email accounts has been a long-time champion among spearphishing campaigns that don’t target anonymous people but instead go after one specific person or a group of employees in a selected company. 

Before sending these fraudulent emails, scammers learn as much as possible about corporate structures, visuals, language, etc. of a business, to make the phishing email almost indistinguishable from a genuine one. 

Some of these emails specifically target employees who are responsible for cash handling and financial matters. They pretend to be the CEO or a different superior authorized to order a monetary transfer and ask the victim to send funds to a specific account, supposedly the CEO’s, or maybe the company’s. 

In 2018, CEO impersonation was used to steal over CA$100,000 from the Canadian city of Ottawa. Impersonating a request from the city manager, the city treasurer received a fake email to transfer the amount that ended up in the pockets of fraudsters.

Greedy scammers also tried to deceive the treasurer for a second time, but when receiving another email, the city manager was there to personally witness it. After asking whether the request was legitimate, the scam was revealed, and the crooks were caught in a lie.

3. “Dear applicant…”

These phishing emails or messages rely on fake job offers as the lure. They may trick potential victims into clicking on a phishing link or opening malicious files sent along with an email message, asking the victim, for example, to create an account and input their personal details as a means to apply for the job.

For instance, the Lazarus threat group has run numerous such campaigns, such as Operation DreamJob, discovered by ESET researchers just recently, which lured its victims with fake job offers.

These scams also exist on popular job advertising boards, so always try to verify whether the headhunter who contacted you or the job offer you see is legitimate.

HSBC_themed_lure
An HSBC-themed lure in the Linux DreamJob campaign

The latest campaign targeted Linux users with a ZIP file that delivers a fake HSBC job offer as a decoy. 

4. “Due to the current situation… “

Phishing is also on the rise in times of big events – be it a sports event or a humanitarian crisis.

For example, at the beginning of 2023, the threat group Fancy Bear ran an email campaign related to the war in Ukraine. The emails were carrying a malicious RTF file called “Nuclear Terrorism A Very Real Threat.” Once open, it would not only compromise that computer, but it was also a blog by the reputable think tank Atlantic Council stating that the likelihood of Putin using nuclear weapons in the war in Ukraine is very low – the exact opposite of the claim in the document name and that prompted the victims to open it.

5. “Merry Christmas!”

Scams during holidays often abuse the shopping spree with emails impersonating messages from legitimate vendors. Emails contain “too-good-to-be-true” offers or create a false sense of urgency to catch the last-minute deal! 

Another approach for scammers is to send emails with malicious files related to holidays, including Christmas cards, gift vouchers, etc. 

6. “We are unable to process your tax return”

Only a few things in this world are certain—death, taxes, and phishing emails during tax season. Because people are filing their taxes, it isn’t surprising for them to receive some email from a tax agency. 

Scammers abuse this situation by sending phishing emails with fake tax agency messages. Usually, they claim that some information is missing and request additional personal or financial details.

Other emails offer a refund while asking for credit card information. 

7. No response required

Some phishing emails have little to no content, luring you to open an attached file to learn more about the matter. 

For example, ESET Research uncovered the malicious campaign targeting corporate networks in Spanish-speaking countries using short emails with PDF attachments in 2021. 

The subject of the email can be as simple as in this case: “Services Statement Dublin”; there was no message apart from a signature and a mobile phone contact in Venezuela. 

Example-of-a-malicious-email
Example of a malicious email

Meanwhile, the attachment is a simple PDF file with no additional informational value, but contained a link redirecting victims to cloud storage services, from which the malware could be downloaded.

How to protect against phishing emails 

  • Carefully read the email. Don’t click on anything automatically. 
  • Check whether the email address matches the real domain. 
  • Be cautions with unexpected sudden emails from a bank, vendor, or any other organization.
  • Check the red flag, such as urgent or threatening emails requiring immediate response or requests for credentials, personal, and financial information. Numerous grammar mistakes, spelling errors, and typos are also a red flag. 
  • Compare the attached URL with the respective domain of a legitimate company or organization. If you spot anything suspicious, don’t click on it.  
  • Be aware of offers that are too good to be true and unexpected gifts. 
  • Don’t send money hastily. If your superior suddenly asks for such a transfer, approach them directly.
  • Install a cybersecurity product with incorporated anti-phishing tools. 

Phishing emails are a prevalent threat, and even IT professionals may fall for this scam. Luckily, most of those emails are quite easy to spot, if you control the urge to click links or open attachments before confirming who’s the sender.

 



Source link

Related articles

Security Operations Centers to the rescue!

Security Operations Centers to the rescue!

September 16, 2023
Will you give X your biometric data? – Week in security with Tony Anscombe

APTs target MSP access to customer networks – Week in security with Tony Anscombe

September 16, 2023
Tags: commonDearEmailslinesphishingsubject
Share76Tweet47

Related Posts

Security Operations Centers to the rescue!

Security Operations Centers to the rescue!

September 16, 2023
0

The European Union (EU) is transforming itself into a digitally aware, secure, and productive collective, with the aim of entering...

Will you give X your biometric data? – Week in security with Tony Anscombe

APTs target MSP access to customer networks – Week in security with Tony Anscombe

September 16, 2023
0

Video The recent compromise of the networks of several companies via the abuse of a remote access tool used by...

Will you give X your biometric data? – Week in security with Tony Anscombe

The real cost of a free lunch – Week in security with Tony Anscombe

September 16, 2023
0

Video Don't download software from non-reputable websites and sketchy links – you might be in for more than you bargained...

Asylum Ambuscade: crimeware or cyberespionage?

Asylum Ambuscade: crimeware or cyberespionage?

September 15, 2023
0

Asylum Ambuscade is a cybercrime group that has been performing cyberespionage operations on the side. They were first publicly outed...

Will you give X your biometric data? – Week in security with Tony Anscombe

Is a RAT stealing your files? – Week in security with Tony Anscombe

September 15, 2023
0

Video Could your Android phone be home to a remote access tool (RAT) that steals WhatsApp backups or performs other...

Load More
  • Trending
  • Comments
  • Latest
This Week in Fintech: TFT Bi-Weekly News Roundup 08/02

This Week in Fintech: TFT Bi-Weekly News Roundup 15/03

March 15, 2022
Supply chain efficiency starts with securing port operations

Supply chain efficiency starts with securing port operations

March 15, 2022
Microsoft to Block Macros by Default in Office Apps

Qakbot Email Thread Hijacking Attacks Drop Multiple Payloads

March 15, 2022
QNAP Escalation Vulnerability Let Attackers Gain Administrator Privileges

QNAP Escalation Vulnerability Let Attackers Gain Administrator Privileges

March 15, 2022
Beware! Facebook accounts being hijacked via Messenger prize phishing chats

Beware! Facebook accounts being hijacked via Messenger prize phishing chats

0
Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

0
Remote work causing security issues for system and IT administrators

Remote work causing security issues for system and IT administrators

0
Elementor WordPress plugin has a gaping security hole – update now – Naked Security

Elementor WordPress plugin has a gaping security hole – update now – Naked Security

0
Same ol’ rig, new drill pipes

Same ol’ rig, new drill pipes

September 22, 2023
Attestation and Fully Homomorphic Encryption Coming to Intel Cloud Services

Attestation and Fully Homomorphic Encryption Coming to Intel Cloud Services

September 22, 2023
LUCR-3 Attacking Fortune 2000 Companies Using Victims’ Own Tools

LUCR-3 Attacking Fortune 2000 Companies Using Victims’ Own Tools

September 21, 2023
EBANX Furthers Expansion into Africa; Adding 8 new Countries to its Ecosystem

EBANX Furthers Expansion into Africa; Adding 8 new Countries to its Ecosystem

September 21, 2023

Recent Posts

Same ol’ rig, new drill pipes

Same ol’ rig, new drill pipes

September 22, 2023
Attestation and Fully Homomorphic Encryption Coming to Intel Cloud Services

Attestation and Fully Homomorphic Encryption Coming to Intel Cloud Services

September 22, 2023
LUCR-3 Attacking Fortune 2000 Companies Using Victims’ Own Tools

LUCR-3 Attacking Fortune 2000 Companies Using Victims’ Own Tools

September 21, 2023

Categories

  • Cyber Threats
  • Cybersecurity
  • Fintech
  • Hacking
  • Internet Of Things
  • LetsAskBinuBlogs
  • Malware
  • Networking
  • Protection

Tags

Access attack Attacks banking BiWeekly bug Cisco cloud code critical Cyber Cybersecurity Data Digital exploited financial Fintech Flaw flaws Google Group Hackers Krebs Latest launches malware Microsoft million Network News open patches platform Ransomware RoundUp security Software Stories TFT Threat Top vulnerabilities vulnerability warns Week

© 2022 Lets Ask Binu All Rights Reserved

No Result
View All Result
  • Home
  • Cybersecurity
  • Cyber Threats
  • Hacking
  • Protection
  • Networking
  • Malware
  • Fintech
  • Internet Of Things

© 2022 Lets Ask Binu All Rights Reserved