From Trust to Trickery: Brand Impersonation Over the Email Attack Vector
Summary: Link(s):
Cisco researchers have discovered various techniques used by cybercriminals to embed and deliver brand logos within emails, targeting users through brand impersonation. This widespread threat leverages the familiarity and trust associated with well-known brand logos to solicit sensitive information, particularly in phishing emails where attackers aim to deceive recipients into revealing credentials or other valuable information. Cisco’s threat intelligence unit, Talos, conducted an analysis between March and April 2024, revealing the extensive nature of these attacks. The techniques identified include simple HTML insertions, advanced methods like fetching logos from remote servers at the time of email delivery, base64 encoding, and embedding logos within email attachments. Sometimes, entire email bodies, including logos, are attached as images or PDFs to evade detection mechanisms.
Security Officer Comments:
Many impersonation emails originate from various domains, often using free email services. For instance, emails imitating document signing services, security software, and retail support services have been sent from a wide range of domains, targeting different industry sectors, including education and insurance. Threat researchers can utilize the data collected to block future attacks, focusing on factors like sender email addresses, originating IP addresses, attachments, and URLs. Researchers at Cisco Talos have identified patterns such as callback phishing, where attackers include a phone number in the email to persuade recipients to call, thereby shifting the communication channel and potentially delivering malware through subsequent interactions.
Suggested Corrections:
Researchers at Cisco Talos have published the following mitigations to protect against brand impersonation:
https://blog.talosintelligence.com/from-trust-to-trickery-brand-impersonation/