SlideShare a Scribd company logo
Dr. Melanie Rieback, John Sinteur, Niko Schmidt,
Marcus Bointon, Boi Sletterink, Frouke van Ommeren,
Rob Wiegertjes, & Peter Mosmans
Oct 4, 2016 melanie@radical.sexy
Adventures in
Spearphishing: the Good,
the Bad, and the Ugly
Oct 4, 2016
Introduction
● A customer asked us to
conduct their spearphish
test for 2016.
● Objectives:
– Spearphish the entire
organization (~150
people)
● “Low and slow” phishing
attack
Oct 4, 2016
Setting the Stage
● We registered an
innocuous sounding
domain:
clickanalytics.amsterdam
● Malware is out of scope.
Click tracking only.
● We setup a landing page
that says 'insert malicious
code here', and then
redirects the victim to what
he expects to see.
Oct 4, 2016
Our first experiment...
● We started our targeting
slowly and patiently...
● We know via-via that our
PoC likes running
● So let's send him a
RUNNING newsletter!
Oct 4, 2016
We shoot...
● We grabbed a Dutch
running newsletter, and
instrumented the URLs to
direct to our landing page.
● It took us a day to put
together a good looking
pretext
● Excited and hopeful, we
sent off the email...
Oct 4, 2016
We miss.
● We waited...
● And waited...
● He didn't click.
● Hmmmm.. maybe this is
going to be harder than
we thought.
● Especially if we need to
sent 'targeted' emails to
~150 people
Oct 4, 2016
Okay. Time for Plan B.
● The realization slowly
dawns on us that it will be
impossible to individually
target 150 people within
time and budget.
● So we need to take a
broader approach.
● Automation is going to be
needed...
Oct 4, 2016
Coming up with a new idea..
● How about using spam as a
phishing vector?
● People are used to receiving
it. (Also at work).
● Spam causes annoyance
rather than suspicion
● It's easy to harvest, rip
instrument, and send in an
automated fashion (crucial
for targeting 150 people).
Oct 4, 2016
Targeted vs. Generic
●
Less targeted "spam" (i.e. fake
LinkedIn invites, obviously
commercial advertisements,
etc..) is, ironically enough, far
more effective in getting clicks
●
It is also far less risky (in terms
of getting caught) than phishing
emails that are more targeted to
their audience
Oct 4, 2016
Example: Phishing “Spam”
Oct 4, 2016
Example: Targeted Phishing
Oct 4, 2016
Our Spearphishing Toolkit
Oct 4, 2016
This gave us some knobs to turn
●
We could adjust the
batch sizes and the
degree of "targeting"
(tailoring the pretext
towards the organization)
●
This gave us some
surprising results....
Oct 4, 2016
The Most Clicked Pretext
Yes, seriously..
Oct 4, 2016
Detailed Breakdown
●
Total target addresses: 145
●
Total mailings: 14
●
Total messages: 528
●
Total opened: 261
●
Total clicks: 46
●
Unique click IP addresses: 29
●
Most clicked pretext was
LinkedIn: 8
Oct 4, 2016
Arch Nemesis: The Spamfilter
●
Our largest hindrance with the
"spam-based" phishing approach
was the spam filter.
●
We started researching SPF
values, to get through the spam
filter.
●
We found that the optimum batch
size of "phishing spam" seems to
be: batches large enough to hit *as
many targets as possible*, without
getting marked by the spam filter.
Oct 4, 2016
The gig is up!
●
As we got closer to the
deadline, we got increasingly
aggressive with our targeting
and batch sizes.
●
In short.. we wanted to know
how much we could “push it”
before we got caught.
●
A Bridge Too Far: fake Mozilla
security update to the CSIRT
●
6 clicks (presumably from a
sandboxed environment) ;-)
Oct 4, 2016
The Excrement Hits the Fan
●
Things really exploded when
our SETUP pretext escaped the
customer environment
●
Some staff members posted
angry tweets about SETUP for
“spamming” them
●
SETUP thought they had a data
breach, and launched a full
investigation
●
Angry folks. Damage control.
Oct 4, 2016
Ethical Issues in Spearphishing
●
This leads to some interesting
ethical issues, actually..
●
It's industry standard to use 3rd
parties as pretexts for phishing
tests. But is that okay?
●
If not, how can we do that
properly?
●
Can we put together a pool of
organizations that give
permission for this?
Oct 4, 2016
Technical Lessons Learned
●
Check SPF and DKIM on
inbound email
●
Disable default image loading in
email clients
●
Flag newly registered domains
as suspicious
●
Security awareness training
●
Monitor network traffic (useful
for incident response later)
Oct 4, 2016 melanie@radical.sexy
Questions?

More Related Content

Similar to Melanie Rieback - The Good, the Bad, and the Ugly

Contextual Personas for Content Design (WCTO16)
Contextual Personas for Content Design (WCTO16)Contextual Personas for Content Design (WCTO16)
Contextual Personas for Content Design (WCTO16)
Jesse Emmanuel Rosario
 
Wisefootinthedoor
WisefootinthedoorWisefootinthedoor
WisefootinthedoorSøren Muus
 
Ten Top Tips seminar
Ten Top Tips seminarTen Top Tips seminar
Ten Top Tips seminar
squaremealvande
 
Real Estate - Open the Door to Your Next Sale Using an Effective Social Media...
Real Estate - Open the Door to Your Next Sale Using an Effective Social Media...Real Estate - Open the Door to Your Next Sale Using an Effective Social Media...
Real Estate - Open the Door to Your Next Sale Using an Effective Social Media...
Charlie Conard
 
Pentest trends 2017
Pentest trends 2017Pentest trends 2017
Pentest trends 2017
Jorge González
 
3 Steps to a Kick Ass PR Pitch
3 Steps to a Kick Ass PR Pitch3 Steps to a Kick Ass PR Pitch
3 Steps to a Kick Ass PR Pitch
Ashley Mann
 
De-Mystifying Twitter for Small Business - 2016
De-Mystifying Twitter for Small Business - 2016De-Mystifying Twitter for Small Business - 2016
De-Mystifying Twitter for Small Business - 2016
Charlie Conard
 
How to Rock at Startup PR
How to Rock at Startup PRHow to Rock at Startup PR
How to Rock at Startup PR
Erica Swallow
 
Why is it important to engage people in user research?
Why is it important to engage people in user research?Why is it important to engage people in user research?
Why is it important to engage people in user research?
Roman Schöneboom
 
Content Marketing Challenges in the Next Decade
Content Marketing Challenges in the Next DecadeContent Marketing Challenges in the Next Decade
Content Marketing Challenges in the Next Decade
Pieter Berwaerts
 
Growth Hackers Amsterdam Meetup - PR Hacking with Robin Wauters, Founding Edi...
Growth Hackers Amsterdam Meetup - PR Hacking with Robin Wauters, Founding Edi...Growth Hackers Amsterdam Meetup - PR Hacking with Robin Wauters, Founding Edi...
Growth Hackers Amsterdam Meetup - PR Hacking with Robin Wauters, Founding Edi...
Growth Tribe
 
Writing Recommendations
Writing RecommendationsWriting Recommendations
Writing Recommendations
Ariel Vinizki
 
Do you have founder myopia?
Do you have founder myopia?Do you have founder myopia?
Do you have founder myopia?
Lane Goldstone
 
Clever Hacks for Hiring – June 2016 London
Clever Hacks for Hiring – June 2016 LondonClever Hacks for Hiring – June 2016 London
Clever Hacks for Hiring – June 2016 London
Lever Inc.
 
Shared responsibility model: Why and how to choose the right 2 fa method for ...
Shared responsibility model: Why and how to choose the right 2 fa method for ...Shared responsibility model: Why and how to choose the right 2 fa method for ...
Shared responsibility model: Why and how to choose the right 2 fa method for ...
ConorGilsenan1
 
User Centered Analytics: Superweek 2015
User Centered Analytics: Superweek 2015User Centered Analytics: Superweek 2015
User Centered Analytics: Superweek 2015Tim Leighton-Boyce
 
The Brand Journalist's Toolbox
The Brand Journalist's ToolboxThe Brand Journalist's Toolbox
The Brand Journalist's Toolbox
Prowly PR Software
 
Effective 2FA - Part 1: the technical stuff
Effective 2FA - Part 1: the technical stuffEffective 2FA - Part 1: the technical stuff
Effective 2FA - Part 1: the technical stuff
ConorGilsenan1
 
Product Hunt France - Bubble - 041016 @ Startinpost
Product Hunt France - Bubble - 041016 @ StartinpostProduct Hunt France - Bubble - 041016 @ Startinpost
Product Hunt France - Bubble - 041016 @ Startinpost
Product Hunt France
 
Above the code microsoft accelerator : herzliya
Above the code   microsoft accelerator : herzliyaAbove the code   microsoft accelerator : herzliya
Above the code microsoft accelerator : herzliya
Alan Weinkrantz
 

Similar to Melanie Rieback - The Good, the Bad, and the Ugly (20)

Contextual Personas for Content Design (WCTO16)
Contextual Personas for Content Design (WCTO16)Contextual Personas for Content Design (WCTO16)
Contextual Personas for Content Design (WCTO16)
 
Wisefootinthedoor
WisefootinthedoorWisefootinthedoor
Wisefootinthedoor
 
Ten Top Tips seminar
Ten Top Tips seminarTen Top Tips seminar
Ten Top Tips seminar
 
Real Estate - Open the Door to Your Next Sale Using an Effective Social Media...
Real Estate - Open the Door to Your Next Sale Using an Effective Social Media...Real Estate - Open the Door to Your Next Sale Using an Effective Social Media...
Real Estate - Open the Door to Your Next Sale Using an Effective Social Media...
 
Pentest trends 2017
Pentest trends 2017Pentest trends 2017
Pentest trends 2017
 
3 Steps to a Kick Ass PR Pitch
3 Steps to a Kick Ass PR Pitch3 Steps to a Kick Ass PR Pitch
3 Steps to a Kick Ass PR Pitch
 
De-Mystifying Twitter for Small Business - 2016
De-Mystifying Twitter for Small Business - 2016De-Mystifying Twitter for Small Business - 2016
De-Mystifying Twitter for Small Business - 2016
 
How to Rock at Startup PR
How to Rock at Startup PRHow to Rock at Startup PR
How to Rock at Startup PR
 
Why is it important to engage people in user research?
Why is it important to engage people in user research?Why is it important to engage people in user research?
Why is it important to engage people in user research?
 
Content Marketing Challenges in the Next Decade
Content Marketing Challenges in the Next DecadeContent Marketing Challenges in the Next Decade
Content Marketing Challenges in the Next Decade
 
Growth Hackers Amsterdam Meetup - PR Hacking with Robin Wauters, Founding Edi...
Growth Hackers Amsterdam Meetup - PR Hacking with Robin Wauters, Founding Edi...Growth Hackers Amsterdam Meetup - PR Hacking with Robin Wauters, Founding Edi...
Growth Hackers Amsterdam Meetup - PR Hacking with Robin Wauters, Founding Edi...
 
Writing Recommendations
Writing RecommendationsWriting Recommendations
Writing Recommendations
 
Do you have founder myopia?
Do you have founder myopia?Do you have founder myopia?
Do you have founder myopia?
 
Clever Hacks for Hiring – June 2016 London
Clever Hacks for Hiring – June 2016 LondonClever Hacks for Hiring – June 2016 London
Clever Hacks for Hiring – June 2016 London
 
Shared responsibility model: Why and how to choose the right 2 fa method for ...
Shared responsibility model: Why and how to choose the right 2 fa method for ...Shared responsibility model: Why and how to choose the right 2 fa method for ...
Shared responsibility model: Why and how to choose the right 2 fa method for ...
 
User Centered Analytics: Superweek 2015
User Centered Analytics: Superweek 2015User Centered Analytics: Superweek 2015
User Centered Analytics: Superweek 2015
 
The Brand Journalist's Toolbox
The Brand Journalist's ToolboxThe Brand Journalist's Toolbox
The Brand Journalist's Toolbox
 
Effective 2FA - Part 1: the technical stuff
Effective 2FA - Part 1: the technical stuffEffective 2FA - Part 1: the technical stuff
Effective 2FA - Part 1: the technical stuff
 
Product Hunt France - Bubble - 041016 @ Startinpost
Product Hunt France - Bubble - 041016 @ StartinpostProduct Hunt France - Bubble - 041016 @ Startinpost
Product Hunt France - Bubble - 041016 @ Startinpost
 
Above the code microsoft accelerator : herzliya
Above the code   microsoft accelerator : herzliyaAbove the code   microsoft accelerator : herzliya
Above the code microsoft accelerator : herzliya
 

Recently uploaded

test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
Arif0071
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
3ipehhoa
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
keoku
 
Bài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docxBài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docx
nhiyenphan2005
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
JeyaPerumal1
 
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
cuobya
 
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
cuobya
 
Search Result Showing My Post is Now Buried
Search Result Showing My Post is Now BuriedSearch Result Showing My Post is Now Buried
Search Result Showing My Post is Now Buried
Trish Parr
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
Rogerio Filho
 
2.Cellular Networks_The final stage of connectivity is achieved by segmenting...
2.Cellular Networks_The final stage of connectivity is achieved by segmenting...2.Cellular Networks_The final stage of connectivity is achieved by segmenting...
2.Cellular Networks_The final stage of connectivity is achieved by segmenting...
JeyaPerumal1
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
ufdana
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC
 
[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024
hackersuli
 
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
zoowe
 
Gen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needsGen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needs
Laura Szabó
 
Understanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdfUnderstanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdf
SEO Article Boost
 
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfMeet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Florence Consulting
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
eutxy
 
Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027
harveenkaur52
 
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
CIOWomenMagazine
 

Recently uploaded (20)

test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
 
Bài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docxBài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docx
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
 
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
 
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
 
Search Result Showing My Post is Now Buried
Search Result Showing My Post is Now BuriedSearch Result Showing My Post is Now Buried
Search Result Showing My Post is Now Buried
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
 
2.Cellular Networks_The final stage of connectivity is achieved by segmenting...
2.Cellular Networks_The final stage of connectivity is achieved by segmenting...2.Cellular Networks_The final stage of connectivity is achieved by segmenting...
2.Cellular Networks_The final stage of connectivity is achieved by segmenting...
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
 
[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024
 
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
 
Gen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needsGen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needs
 
Understanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdfUnderstanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdf
 
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfMeet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
 
Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027
 
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
 

Melanie Rieback - The Good, the Bad, and the Ugly

  • 1. Dr. Melanie Rieback, John Sinteur, Niko Schmidt, Marcus Bointon, Boi Sletterink, Frouke van Ommeren, Rob Wiegertjes, & Peter Mosmans Oct 4, 2016 melanie@radical.sexy Adventures in Spearphishing: the Good, the Bad, and the Ugly
  • 2. Oct 4, 2016 Introduction ● A customer asked us to conduct their spearphish test for 2016. ● Objectives: – Spearphish the entire organization (~150 people) ● “Low and slow” phishing attack
  • 3. Oct 4, 2016 Setting the Stage ● We registered an innocuous sounding domain: clickanalytics.amsterdam ● Malware is out of scope. Click tracking only. ● We setup a landing page that says 'insert malicious code here', and then redirects the victim to what he expects to see.
  • 4. Oct 4, 2016 Our first experiment... ● We started our targeting slowly and patiently... ● We know via-via that our PoC likes running ● So let's send him a RUNNING newsletter!
  • 5. Oct 4, 2016 We shoot... ● We grabbed a Dutch running newsletter, and instrumented the URLs to direct to our landing page. ● It took us a day to put together a good looking pretext ● Excited and hopeful, we sent off the email...
  • 6. Oct 4, 2016 We miss. ● We waited... ● And waited... ● He didn't click. ● Hmmmm.. maybe this is going to be harder than we thought. ● Especially if we need to sent 'targeted' emails to ~150 people
  • 7. Oct 4, 2016 Okay. Time for Plan B. ● The realization slowly dawns on us that it will be impossible to individually target 150 people within time and budget. ● So we need to take a broader approach. ● Automation is going to be needed...
  • 8. Oct 4, 2016 Coming up with a new idea.. ● How about using spam as a phishing vector? ● People are used to receiving it. (Also at work). ● Spam causes annoyance rather than suspicion ● It's easy to harvest, rip instrument, and send in an automated fashion (crucial for targeting 150 people).
  • 9. Oct 4, 2016 Targeted vs. Generic ● Less targeted "spam" (i.e. fake LinkedIn invites, obviously commercial advertisements, etc..) is, ironically enough, far more effective in getting clicks ● It is also far less risky (in terms of getting caught) than phishing emails that are more targeted to their audience
  • 10. Oct 4, 2016 Example: Phishing “Spam”
  • 11. Oct 4, 2016 Example: Targeted Phishing
  • 12. Oct 4, 2016 Our Spearphishing Toolkit
  • 13. Oct 4, 2016 This gave us some knobs to turn ● We could adjust the batch sizes and the degree of "targeting" (tailoring the pretext towards the organization) ● This gave us some surprising results....
  • 14. Oct 4, 2016 The Most Clicked Pretext Yes, seriously..
  • 15. Oct 4, 2016 Detailed Breakdown ● Total target addresses: 145 ● Total mailings: 14 ● Total messages: 528 ● Total opened: 261 ● Total clicks: 46 ● Unique click IP addresses: 29 ● Most clicked pretext was LinkedIn: 8
  • 16. Oct 4, 2016 Arch Nemesis: The Spamfilter ● Our largest hindrance with the "spam-based" phishing approach was the spam filter. ● We started researching SPF values, to get through the spam filter. ● We found that the optimum batch size of "phishing spam" seems to be: batches large enough to hit *as many targets as possible*, without getting marked by the spam filter.
  • 17. Oct 4, 2016 The gig is up! ● As we got closer to the deadline, we got increasingly aggressive with our targeting and batch sizes. ● In short.. we wanted to know how much we could “push it” before we got caught. ● A Bridge Too Far: fake Mozilla security update to the CSIRT ● 6 clicks (presumably from a sandboxed environment) ;-)
  • 18. Oct 4, 2016 The Excrement Hits the Fan ● Things really exploded when our SETUP pretext escaped the customer environment ● Some staff members posted angry tweets about SETUP for “spamming” them ● SETUP thought they had a data breach, and launched a full investigation ● Angry folks. Damage control.
  • 19. Oct 4, 2016 Ethical Issues in Spearphishing ● This leads to some interesting ethical issues, actually.. ● It's industry standard to use 3rd parties as pretexts for phishing tests. But is that okay? ● If not, how can we do that properly? ● Can we put together a pool of organizations that give permission for this?
  • 20. Oct 4, 2016 Technical Lessons Learned ● Check SPF and DKIM on inbound email ● Disable default image loading in email clients ● Flag newly registered domains as suspicious ● Security awareness training ● Monitor network traffic (useful for incident response later)
  • 21. Oct 4, 2016 melanie@radical.sexy Questions?