Phishing Email Analysis

Types of Malicious Emails

  • Spam: unsolicited junk emails sent out in bulk to a large number of recipients. The more malicious variant of Spam is known as MalSpam.

  • Phishing: emails sent to a target(s) purporting to be from a trusted entity to lure individuals into providing sensitive information.

  • Spear phishing: takes phishing a step further by targeting a specific individual(s) or organization seeking sensitive information.

  • Whaling: is similar to spear phishing, but it's targeted specifically to C-Level high-position individuals (CEO, CFO, etc.), and the objective is the same.

  • Smishing: takes phishing to mobile devices by targeting mobile users with specially crafted text messages.

  • Vishing: is similar to smishing, but instead of using text messages for the social engineering attack, the attacks are based on voice calls.

  • Quishing: Also known as QR Code Phishing, uses QR codes to lure unsuspecting users to scan the QR code and redirect them to a phishing website.

Characteristics of Phishing Emails

  • The sender email name/address will masquerade as a trusted entity (email spoofing).

  • The email subject line and/or body (text) is written with a sense of urgency or uses certain keywords such as Invoice, Suspended, etc.

  • The email body (HTML) is designed to match a trusting entity such as Banking/e-commerce websites.

  • The email body (HTML) is poorly formatted or written (contrary from the previous point).

  • The email body uses generic content, such as Dear Sir/Madam.

  • The email body only shows an image, hyperlink, or QR code without any further context or information.

  • Hyperlinks (oftentimes uses URL shortening services to hide its true origin).

  • A malicious attachment posing as a legitimate document.

Email Header Analysis

Email Body Analysis

Additional Phishing Techniques

Cloud Storage Services

Attackers may use cloud storage services such as Google Drive, OneDrive, SharePoint, Dropbox, etc. to store their payloads. This is to trick users into clicking on Google Drive or OneDrive links as those appear harmless and came from a legitimate entity (Google, Microsoft) to trick users into downloading malicious files.

Subdomains and Pages

Attackers try to deceive users, security products, and analysts by creating a free subdomain or pages from services from Microsoft, WordPress, Blogspot, Wix, Google pages, etc. Since Whois information cannot be searched as a subdomain, analysts can be tricked that these addresses have been taken in the past and belong to legitimate organizations such as Microsoft, WordPress, Google, etc.

Form Applications

Various platforms allow for form creation, which attackers use instead of developing their own phishing sites. The domain is normally harmless, thus it can be sent to the user without triggering security scanners. A popular service is Google Forms. As the Whois information shows that it is from a legitimate entity, the attacker can mislead analysts, which is why it is important to perform dynamic analysis of these kinds of links as well.

Tools

Email Header Analyzer Tools

URL Defang Tools

SPF/DKIM/DMARC Lookup Tools

IP Information Lookup Tools

Reverse IP Lookup Tools

Whois Lookup Tools

URL Extractor Tools

QR Code Scanner Tools

IP/Domain Reputation Tools

File Reputation Lookup Tools

Virtual Browsers

Online Sandbox

Phishing Detection and Analysis Tools

Other Resources

Last updated