{"id":3418,"date":"2023-08-23T09:43:47","date_gmt":"2023-08-23T09:43:47","guid":{"rendered":"https:\/\/www.empowerelearning.com\/blog\/?p=3418"},"modified":"2023-12-28T06:12:18","modified_gmt":"2023-12-28T06:12:18","slug":"how-phishing-emails-can-bypass-your-email-security-using-html-smuggling","status":"publish","type":"post","link":"https:\/\/www.empowerelearning.com\/blog\/how-phishing-emails-can-bypass-your-email-security-using-html-smuggling\/","title":{"rendered":"Email Phishing and Security: A Detailed Overview of Types and Techniques"},"content":{"rendered":"<p>Kaspersky Labs has raised a red flag against a new form of phishing emails. These emails use HTML file attachments to phish their targets. Although such emails started spiking in 2019, this technique has become a common form of phishing in 2022. Between January and April, Kaspersky detected more than 2 million phishing emails of this type.<\/p>\n<p>Generally, <a href=\"https:\/\/www.empowerelearning.com\/blog\/protect-your-business-from-phishing\/\">phishing<\/a> uses fake web pages and email attachments to trick their victims. To counter such attacks, security software scans incoming emails and blocks those with suspicious content. But, with this new technique, such emails can evade detection by security software.<\/p>\n<p><b>What is a Phishing Email?\u00a0<\/b><\/p>\n<p><span style=\"font-weight: 400;\">A <a href=\"https:\/\/www.empowerelearning.com\/courses\/fight-phishing\/\">phishing email<\/a> is a cyber attack that relies on deception to steal confidential information from users and organizations. Phishing victims are tricked into disclosing information that should be kept private. When a phishing email arrives, recipients have no reason to doubt the request. They believe that the party requesting the information \u2013 often posing as a familiar platform, a trusted vendor, colleague, or boss \u2013 is who they say they are. With the best intentions, phishing email victims respond without a second thought.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In phishing emails, cybercriminals often ask for the following information:\u00a0<\/span><\/p>\n<ul>\n<li><span style=\"font-weight: 400;\">Date of birth<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Social security number\u00a0<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Phone number\u00a0<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Home address\u00a0<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Credit card details\u00a0<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Login details\u00a0<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Password (or other information needed to reset your password)\u00a0<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Cybercriminals then use this information to impersonate you and apply for credit cards or loans, open bank accounts, and commit other fraudulent acts.\u00a0<\/span><\/p>\n<h3><b>How to recognize a phishing email<\/b><\/h3>\n<p><img decoding=\"async\" class=\"size-full wp-image-4044 aligncenter\" src=\"https:\/\/www.empowerelearning.com\/blog\/wp-content\/uploads\/2022\/05\/7-Signs-of-Phishing-Email.jpg\" alt=\"7-Signs-of-Phishing-Email\" width=\"740\" height=\"740\" srcset=\"https:\/\/www.empowerelearning.com\/blog\/wp-content\/uploads\/2022\/05\/7-Signs-of-Phishing-Email.jpg 740w, https:\/\/www.empowerelearning.com\/blog\/wp-content\/uploads\/2022\/05\/7-Signs-of-Phishing-Email-300x300.jpg 300w, https:\/\/www.empowerelearning.com\/blog\/wp-content\/uploads\/2022\/05\/7-Signs-of-Phishing-Email-150x150.jpg 150w, https:\/\/www.empowerelearning.com\/blog\/wp-content\/uploads\/2022\/05\/7-Signs-of-Phishing-Email-370x370.jpg 370w, https:\/\/www.empowerelearning.com\/blog\/wp-content\/uploads\/2022\/05\/7-Signs-of-Phishing-Email-270x270.jpg 270w\" sizes=\"(max-width: 740px) 100vw, 740px\" \/><\/p>\n<p><b>Mismatched Email Addresses<\/b><span style=\"font-weight: 400;\">: The displayed name might look legitimate, but the actual email address may be a jumbled mix of characters or slightly altered from the official domain.<\/span><\/p>\n<p><b>Suspicious Links:<\/b><span style=\"font-weight: 400;\"> Hover over any links without clicking on them. This will display the link&#8217;s destination URL. If it looks suspicious or doesn&#8217;t match the purported sender&#8217;s website, it&#8217;s likely a phishing attempt.<\/span><\/p>\n<p><b>Poor Grammar and Spelling:<\/b><span style=\"font-weight: 400;\"> While not always a definite sign, many phishing emails contain misspellings, poor grammar, or awkward phrasing.<\/span><\/p>\n<p><b>Generic Greetings: <\/b><span style=\"font-weight: 400;\">Phishing emails often use generic greetings like &#8220;Dear customer&#8221; instead of your actual name.<\/span><\/p>\n<p><b>Request for Personal Information:<\/b><span style=\"font-weight: 400;\"> Legitimate companies will never request sensitive information, like passwords or social security numbers, via email.<\/span><\/p>\n<p><b>Unsolicited Attachments:<\/b><span style=\"font-weight: 400;\"> Be wary of unexpected attachments. They might contain malware.<\/span><\/p>\n<p><b>Urgent or Threatening Language:<\/b><span style=\"font-weight: 400;\"> Phishers often use urgency to their advantage. Phrases like &#8220;urgent action required&#8221; or &#8220;your account will be suspended&#8221; can be signs of a phishing attempt.<\/span><\/p>\n<p><b>Requests for Money: <\/b><span style=\"font-weight: 400;\">Any unexpected request for money, especially via wire transfer or an untraceable method, should be an immediate red flag.<\/span><\/p>\n<p><b>Too Good To Be True:<\/b><span style=\"font-weight: 400;\"> Offers that seem too good to be true often are. Be skeptical of any email offering rewards, cash, or gifts out of the blue.<\/span><\/p>\n<p><b>Mismatched URLs:<\/b><span style=\"font-weight: 400;\"> If the email claims to be from a known organization but the URL is different from the organization&#8217;s known URL, it&#8217;s a red flag.<\/span><\/p>\n<p><b>Unusual Sender<\/b><span style=\"font-weight: 400;\">: If you receive an email from someone you haven\u2019t communicated with before or don&#8217;t expect to hear from, be cautious.<\/span><\/p>\n<p><b>Altered Logo or Branding:<\/b><span style=\"font-weight: 400;\"> Look for slightly altered logos or off-brand coloring. The phishers might recreate logos, but sometimes small inconsistencies can give them away.<\/span><\/p>\n<p><b>No Contact Information:<\/b><span style=\"font-weight: 400;\"> Legitimate businesses will have their contact information available. If it&#8217;s missing, that&#8217;s suspicious.<\/span><\/p>\n<p><b>Check the Signature<\/b><span style=\"font-weight: 400;\">: Generic signatures like &#8220;Support Team&#8221; or &#8220;Customer Service&#8221; without specific contact details can be a sign of a phishing email.<\/span><\/p>\n<h3><b>8 Types of Email Phishing<\/b><\/h3>\n<p><img decoding=\"async\" class=\"size-full wp-image-4045 aligncenter\" src=\"https:\/\/www.empowerelearning.com\/blog\/wp-content\/uploads\/2022\/05\/8-points-of-Phishing-Email.jpg\" alt=\"8-points-of-Phishing-Email.\" width=\"740\" height=\"300\" srcset=\"https:\/\/www.empowerelearning.com\/blog\/wp-content\/uploads\/2022\/05\/8-points-of-Phishing-Email.jpg 740w, https:\/\/www.empowerelearning.com\/blog\/wp-content\/uploads\/2022\/05\/8-points-of-Phishing-Email-300x122.jpg 300w, https:\/\/www.empowerelearning.com\/blog\/wp-content\/uploads\/2022\/05\/8-points-of-Phishing-Email-370x150.jpg 370w, https:\/\/www.empowerelearning.com\/blog\/wp-content\/uploads\/2022\/05\/8-points-of-Phishing-Email-270x109.jpg 270w\" sizes=\"(max-width: 740px) 100vw, 740px\" \/><\/p>\n<p><b>Deceptive Phishing<\/b><span style=\"font-weight: 400;\">: This is the most common type. Attackers impersonate a legitimate company to steal personal information or login credentials. They often use threats to create a sense of urgency, like &#8220;Your account will be closed if you don&#8217;t respond.&#8221;<\/span><\/p>\n<p><b>Spear Phishing:<\/b><span style=\"font-weight: 400;\"> Targeted at specific individuals or companies. Attackers often gather detailed information about their victims to make the scam more believable.<\/span><\/p>\n<p><b>CEO Fraud \/ Business Email Compromise (BEC):<\/b><span style=\"font-weight: 400;\"> A type of spear phishing where attackers pretend to be a high-ranking executive or company CEO. They&#8217;ll typically request an urgent wire transfer or sensitive information.<\/span><\/p>\n<p><b>Pharming:<\/b><span style=\"font-weight: 400;\"> Even though this isn&#8217;t strictly an email-based attack, it&#8217;s closely related. In pharming attacks, cybercriminals redirect users from a legitimate site to a fake one. The transition is often seamless, and users might not notice they&#8217;ve been redirected.<\/span><\/p>\n<p><b>Whaling: <\/b><span style=\"font-weight: 400;\">This is a more targeted version of spear phishing where high-profile individuals like C-level executives, politicians, or celebrities are the primary targets.<\/span><\/p>\n<p><b>Vishing: <\/b><span style=\"font-weight: 400;\">While this is mainly phone-based, it&#8217;s worth mentioning because phishing emails can request the victim to call a particular number. The goal is to extract personal information during the call.<\/span><\/p>\n<p><b>Dropbox Phishing: <\/b><span style=\"font-weight: 400;\">Attackers send notifications from popular cloud storage providers like Dropbox, urging users to click on a link. Once they do, they&#8217;ll be asked to enter their login credentials.<\/span><\/p>\n<p><b>Google Doc Phishing: <\/b><span style=\"font-weight: 400;\">This attack became famous in 2017 when a malicious actor sent a deceptive invite to access a Google Doc. When clicked, it led users to a page that asked for their Google login details.<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><\/p>\n<h3><b>Examples of Phishing Emails in Everyday Scenarios<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Highlighted below are typical phishing email scenarios:<\/span><\/p>\n<p><span style=\"font-weight: 400;\"><strong>Account Verification Alert:<\/strong> An email mimics PayPal, alerting the receiver about potential account breaches. The recipient is urged to validate their credit card on a fraudulent PayPal site, where the data is captured for illegal activities.<\/span><\/p>\n<p><img decoding=\"async\" class=\"size-full wp-image-4054 alignright\" src=\"https:\/\/www.empowerelearning.com\/blog\/wp-content\/uploads\/2022\/05\/paypal-phishing-1.png\" alt=\"Phishing\" width=\"953\" height=\"696\" srcset=\"https:\/\/www.empowerelearning.com\/blog\/wp-content\/uploads\/2022\/05\/paypal-phishing-1.png 953w, https:\/\/www.empowerelearning.com\/blog\/wp-content\/uploads\/2022\/05\/paypal-phishing-1-300x219.png 300w, https:\/\/www.empowerelearning.com\/blog\/wp-content\/uploads\/2022\/05\/paypal-phishing-1-768x561.png 768w, https:\/\/www.empowerelearning.com\/blog\/wp-content\/uploads\/2022\/05\/paypal-phishing-1-370x270.png 370w, https:\/\/www.empowerelearning.com\/blog\/wp-content\/uploads\/2022\/05\/paypal-phishing-1-270x197.png 270w, https:\/\/www.empowerelearning.com\/blog\/wp-content\/uploads\/2022\/05\/paypal-phishing-1-740x540.png 740w\" sizes=\"(max-width: 953px) 100vw, 953px\" \/><\/p>\n<p><a href=\"https:\/\/appriver.com\/blog\/in-progress-phishing-with-a-sense-of-urgency\" rel=\"nofollow sponsored noopener\" target=\"_blank\"><em>Image Source URL<\/em><\/a><\/p>\n<p><span style=\"font-weight: 400;\"><strong>Credit Card Security Alert:<\/strong> Post a recent Apple purchase, an email, masquerading as Apple&#8217;s support, warns about possible credit card breaches and asks for card validation.<\/span><\/p>\n<p><span style=\"font-weight: 400;\"><strong>Urgent Funds Transfer:<\/strong> An email, seemingly from the company&#8217;s traveling CEO, requests an emergency funds transfer to a foreign associate. The receiver, believing in aiding the company, promptly acts on it.<\/span><\/p>\n<p><span style=\"font-weight: 400;\"><strong>Social Media Link:<\/strong> A friend request on Facebook from a seemingly mutual friend leads to a message containing a malicious video link that, once clicked, deploys malware.<\/span><\/p>\n<p><span style=\"font-weight: 400;\"><strong>Google Docs Authentication Alert:<\/strong> An email prompts the user to verify their Google Docs login on a counterfeit page. The email might be from a deceptive address like <\/span><a href=\"mailto:accountupdate@google.org.com\"><span style=\"font-weight: 400;\">accountupdate@google.org.com<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><img decoding=\"async\" class=\"alignnone size-full wp-image-4051\" src=\"https:\/\/www.empowerelearning.com\/blog\/wp-content\/uploads\/2022\/05\/scenario-2.jpg\" alt=\"Google Doc\" width=\"1732\" height=\"1500\" srcset=\"https:\/\/www.empowerelearning.com\/blog\/wp-content\/uploads\/2022\/05\/scenario-2.jpg 1732w, https:\/\/www.empowerelearning.com\/blog\/wp-content\/uploads\/2022\/05\/scenario-2-300x260.jpg 300w, https:\/\/www.empowerelearning.com\/blog\/wp-content\/uploads\/2022\/05\/scenario-2-1024x887.jpg 1024w, https:\/\/www.empowerelearning.com\/blog\/wp-content\/uploads\/2022\/05\/scenario-2-768x665.jpg 768w, https:\/\/www.empowerelearning.com\/blog\/wp-content\/uploads\/2022\/05\/scenario-2-1536x1330.jpg 1536w, https:\/\/www.empowerelearning.com\/blog\/wp-content\/uploads\/2022\/05\/scenario-2-370x320.jpg 370w, https:\/\/www.empowerelearning.com\/blog\/wp-content\/uploads\/2022\/05\/scenario-2-270x234.jpg 270w, https:\/\/www.empowerelearning.com\/blog\/wp-content\/uploads\/2022\/05\/scenario-2-740x641.jpg 740w\" sizes=\"(max-width: 1732px) 100vw, 1732px\" \/><a href=\"https:\/\/terranovasecurity.com\/top-examples-of-phishing-emails\/\" rel=\"nofollow sponsored noopener\" target=\"_blank\"><em>Image Source URL<\/em><\/a><\/p>\n<p><span style=\"font-weight: 400;\"><strong>IT Support Software Update:<\/strong> An official-looking email, ostensibly from the company&#8217;s IT department, suggests downloading new messaging software. The download link, however, deploys ransomware on the network.<\/span><\/p>\n<h3><b>Phishing Techniques Overview<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Phishing schemes aren&#8217;t just about sending deceptive emails and hoping recipients fall for them. There are advanced methods cybercriminals employ to deceive their targets, such as:<\/span><\/p>\n<p><b>URL Misrepresentation<\/b><span style=\"font-weight: 400;\">. By using JavaScript, cybercriminals can overlay a genuine URL image on a browser&#8217;s address bar. The true URL becomes evident when you hover over a link within the email. Attackers can also modify this using JavaScript.<\/span><\/p>\n<p><b>URL Camouflaging<\/b><span style=\"font-weight: 400;\">. Also known as URL hiding, it&#8217;s a prevalent strategy in phishing attacks. Here, the displayed URL appears authentic, but it leads users to a malevolent site.<\/span><\/p>\n<p><b>Use of URL Condensers.<\/b><span style=\"font-weight: 400;\"> By taking advantage of services like Bitly, attackers can conceal the real destination of a link. For unsuspecting victims, it&#8217;s tough to determine whether the abbreviated URL leads to a trustworthy or harmful site.<\/span><\/p>\n<p><b>Character Deception in URLs.<\/b><span style=\"font-weight: 400;\"> Attackers craft URLs using characters that closely resemble those in trusted domain names. This way, they can establish fake sites that appear authentic to the untrained eye.<\/span><\/p>\n<p><b>Image-based Messages<\/b><span style=\"font-weight: 400;\">. By converting textual content into images, attackers can sometimes dodge phishing detection tools. Since many security solutions search for specific text patterns found in phishing attempts, converting the text to an image can avoid these scans.<\/span><\/p>\n<p><b>Hidden Redirects<\/b><span style=\"font-weight: 400;\">. In this technique, victims believe they&#8217;re giving personal information to a trusted entity. But in reality, they&#8217;re first directed to a malicious intermediary site that captures their details, only then to be sent to the genuine site.<\/span><\/p>\n<p><b>Enhanced Chatbots<\/b><span style=\"font-weight: 400;\">. Leveraging AI, cybercriminals can perfect the language used in phishing messages. AI-driven chatbots can refine the text, eliminating the grammar and spelling mistakes usually present in phishing content, and making detection tougher.<\/span><\/p>\n<p><b>Voice Mimicking with AI. <\/b><span style=\"font-weight: 400;\">Cybercriminals can harness AI to replicate someone&#8217;s voice, making it sound as if a known individual or authority figure is speaking. To achieve this realistic effect, they only need a brief audio snippet from the intended impersonated party.<\/span><\/p>\n<h3>How Phishing Emails Can Bypass Your Email Security Using HTML Smuggling<\/h3>\n<p>This is how it works. The emails contain an HTML attachment or a zipped file. When the user opens the attachment, it runs a malicious script. Threat actors are using these attachments to redirect users to malicious websites and display spoofed login forms. These attachments are being used for installing malware over corporate networks.<\/p>\n<p>Unfortunately, as HTML is not malicious, mail security tools fail to mark the messages as phishing attempts. Thus, increasing the number of phishing emails that reach victims\u2019 inboxes.<\/p>\n<p>In addition, security researchers have found signs of HTML smuggling as well.<\/p>\n<p><a href=\"https:\/\/www.empowerelearning.com\/courses\/fight-phishing\/\"><img decoding=\"async\" class=\"aligncenter wp-image-4047 size-full\" src=\"https:\/\/www.empowerelearning.com\/blog\/wp-content\/uploads\/2022\/05\/Phishing-Awareness-Training-1.jpg\" alt=\" Phishing-Awareness-Training\" width=\"740\" height=\"150\" srcset=\"https:\/\/www.empowerelearning.com\/blog\/wp-content\/uploads\/2022\/05\/Phishing-Awareness-Training-1.jpg 740w, https:\/\/www.empowerelearning.com\/blog\/wp-content\/uploads\/2022\/05\/Phishing-Awareness-Training-1-300x61.jpg 300w, https:\/\/www.empowerelearning.com\/blog\/wp-content\/uploads\/2022\/05\/Phishing-Awareness-Training-1-370x75.jpg 370w, https:\/\/www.empowerelearning.com\/blog\/wp-content\/uploads\/2022\/05\/Phishing-Awareness-Training-1-270x55.jpg 270w\" sizes=\"(max-width: 740px) 100vw, 740px\" \/><\/a><\/p>\n<h2><b>What to Do if You\u2019ve Been Phished<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">If you have already responded to a phishing email, follow these steps to protect you and your business:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Change your passwords immediately, starting with your most sensitive accounts.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Alert your bank and credit card companies.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Monitor your accounts for suspicious activity.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Report the phishing attempt to the platform or service impersonated.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Update and run antivirus software.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Be vigilant and educate yourself about common phishing signs.<\/span><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Kaspersky Labs has raised a red flag against a new form of phishing emails. These emails use HTML file attachments to phish their targets. Although such emails started spiking in 2019, this technique has become a common form of phishing in 2022. Between January and April, Kaspersky detected more than 2 million phishing emails of [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":4043,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6,278],"tags":[312,161,348],"class_list":["post-3418","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-infosec","category-security-awareness-training","tag-email-security","tag-phishing","tag-phishing-email"],"_links":{"self":[{"href":"https:\/\/www.empowerelearning.com\/blog\/wp-json\/wp\/v2\/posts\/3418","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.empowerelearning.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.empowerelearning.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.empowerelearning.com\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.empowerelearning.com\/blog\/wp-json\/wp\/v2\/comments?post=3418"}],"version-history":[{"count":0,"href":"https:\/\/www.empowerelearning.com\/blog\/wp-json\/wp\/v2\/posts\/3418\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.empowerelearning.com\/blog\/wp-json\/wp\/v2\/media\/4043"}],"wp:attachment":[{"href":"https:\/\/www.empowerelearning.com\/blog\/wp-json\/wp\/v2\/media?parent=3418"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.empowerelearning.com\/blog\/wp-json\/wp\/v2\/categories?post=3418"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.empowerelearning.com\/blog\/wp-json\/wp\/v2\/tags?post=3418"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}