Barracuda researchers discover malicious HTML attachments being used in emails
Researchers at Barracuda have recently analyzed data on the millions of attachments scanned by Barracuda systems over the past month to identify HTML attachments being used the most for malicious purposes. 21% of all HTML attachments scanned by Barracuda were malicious.
HTML attachments are commonly used in email communication. These are particularly common in system-generated email reports that users might receive regularly. These messages include URL links to the actual report. Attackers have been embedding HTML attachments in emails disguised as a weekly report, tricking users into clicking on phishing links. These are successful techniques because hackers no longer need to include malicious links in an email, allowing them to easily bypass anti-spam and anti-virus policies.
The malicious HTML attachments are being used for credential phishing. They include a link to a phishing site, which, when opened, gets redirected to a third-party machine that requests the users to enter their credentials to access information or download a file that may contain malware. Hackers don’t always need to create a fake website. They can create a phishing form directly embedded in the attachment, ultimately sending phishing sites as attachments instead of links.
Considering such HTML attachments are hard to identify accurately, and detection often includes many false positives, the best solutions are machine learning and static code analysis that can evaluate the content of an email to identify and block malicious HTML attachments.
Meanwhile, given the volume of these attacks, users should be wary of all HTML attachments, especially those coming from sources they haven’t seen before. They must be trained with examples of these attacks as part of their phishing simulation campaigns and urged to always double-check before sharing their login credentials.
In case, malicious emails get through, it is necessary to keep the post-delivery remediation tools ready to quickly identify and remove any instances of those emails from all user inboxes. Automated incident response can help do this quickly before attacks spread through an organization, and account takeover protection can monitor and alert the users of suspicious account activity if login credentials were to be compromised.
Happiest Minds Technologies announces IDaaS MSSP solution powered by OneLogin
Happiest Minds Technologies has announced the launch of Identity Vigil 2.0, a ne...
Micro Focus’ CyberRes partners with Google Cloud for High-Scale secure cloud analytics
CyberRes, a Micro Focus line of business, announced a partnership with Google Cloud to sup...
Crayon Software Experts India hosts Crayon Connect CIO Event 2022
Crayon Software Experts India has organized their flagship customer event, the Crayon Conn...
BPE Celebrates 22 years of Trust, Leadership & Success
Best Power Equipments (BPE) celebrated its 22nd anniversary on Saturday, 23 July 2022, at...
India Mobile Congress declares the schedule for 6th edition of the IMC
Hon’ble Minister of Communications, Electronics & Information Technology and Rai...