SlideShare a Scribd company logo
Phishing stories from
the trenches
– Cyber
+ Hacking
$ whoami
Gabor Szathmari
● Incident manager @ Amazon.com
● Security expert @ Iron Bastion
● Privacy advocate @ CryptoAUSTRALIA
We’ll cover
● Why phishing works – examples
● How to get better at offense and
defence
Go
What phishing is
“Only amateurs attack machines; professionals
target people” - Bruce Schneier
● Social engineering
● Not just email
● From simple to sophisticated
Why phishing?
● Steal sensitive stuff:
○ Passwords
○ Payment details (cc numbers, crypto wallets)
● Trick someone into doing something:
○ Reset someone’s password → CIA Director John
Brennan’s AOL account
○ Transfer a phone number → YouTube “h3h3: Your
Privacy is at Risk”
Why phishing? (part 2.)
● Install badware
○ Ransomware, cryptolockers
○ Backdoors, Remote Access Toolkits (RAT)
● The long game
○ Resetting pws of other accounts (DropBox, personal
mailboxes, Steam accounts)
○ Tamper with payment directions
○ Lateral movement into corporate networks
○ Fun
Outdated pieces of advice
Outdated pieces of advice
Outdated pieces of advice
● Hover links
● Check the sender’s email address
● Broken English
● Don’t open files
● Change passwords often
“None of the victims are idiots” - me
Why they don’t work?
Examples
Spot the phish 1.
Spot the phish 2.
Spot the phish 2.
Spot the phish 3.
http://epl.paypal-
communication.com/
T/v40[...]
Spot the phish 3.
Lol:
“As for https://epl.paypal-
communication.com it is clearly also just a
tracker made by PayPal”
https://www.reddit.com/r/paypal/comments/4qlnf0/is_this_a_phishing_attempt/
Spot the phish 4.
Spot the phish 5.
Spot the phish 5.
https://twitter.com/cryptoaustralia/status/905981181048401920
Spot the phish 6.
Enhance! – iPhone
● Sender address
isn’t displayed
● No link hovering
ಠ_ಠ – Lotus Notes
“In Outlook email, I can point the mouse over any hyperlink in email body
and right click and copy the URL that the hyperlink is pointing to.
How do you do this in Lotus Notes email?”
“1. Right click on the email and select ‘Edit’
2. Right click on the link in question and select ‘HotSpot Properties’
3. A new box will pop up that has details about the link
4. Select the text in the ‘Value’ field and Ctrl-C to copy the link address.”
https://superuser.com/questions/836890/how-to-copy-links-in-lotus-notes-email
Plain English
Outdated pieces of advice (recap)
● Hover links – ಠ_ಠ
● Check the sender’s email address – Yeah nah
● Broken English – u w0t m8
● Don’t open files – Good luck with this
● Change passwords often - API creds, application pws
“None of the victims are idiots” - me
Offense and Defence
Disclaimer
● The following offensive
techniques are meant to be
used in penetration testing/
read teaming engagements
● You must have a written
permission from the right
person of the organisation
Phish like a pro
Sender IP reputation:
- DNSBL
- Reverse DNS record (PTR)
Domain reputation:
- Age (> 1 month)
- Old school TLD
(no .horse, .wang, .plumbing)
- Public WHOIS record
- Hosts a website
Phish like pro 2.
Spam/Phishing filter evasion:
- Consistent ‘Envelope sender’, HELO, ‘From’ and domain
- SPF / DKIM / DMARC records
- ‘To: f_name l_name <user@example.com>’
- No web links
- No HTTP redirects
- No link shorteners
- Plain-text
- Avoid suspicious wording
Phish like pro 3.
URL reputation:
- Don’t get blacklisted:
- URIBL.com
- Google Safe Browsing
- Add safe category:
- http://url.fortinet.net/rate/submit.php
- https://www.trustedsource.org/en/feedback/url
- https://global.sitesafety.trendmicro.com/index.php
- https://sitereview.bluecoat.com/
Tooling – Offense 1.
Manage phishing campaigns:
● https://getgophish.com/
● https://github.com/pentestgeek/phishing-frenzy
● https://github.com/securestate/king-phisher
Tooling – Offense
Tooling – Offense 2.
- Generate domains (typosquatting): dnstwist
- Buy abandoned domains: ExpiredDomains.net
- Obfuscate payload
- https://github.com/Veil-Framework/Veil
- Research & pretext
- “Here’s an AWS gift card for using our #hashtag”
- “We’ll send you a survey tomorrow”
How to phish more effectively 101
Tooling – Offense 3.
Improve deliverability:
- Spell check / proofread / peer review emails
- Track bounces and spam complaints (self-hosted)
- https://glockapps.com/bounces-complaints-monitoring/
- Use a transactional email services
- Mailgun, Sendgrid ...
- Buy dedicated IP ($$$)
Tooling – Offense 4.
Build quality email lists:
● DIY – Browser and loads of time
● Pentesting scripts (e.g. theHarvester)
● Pay someone:
○ Search “Lead generation”
○ UpWork.com, Freelancer.com
● Marketing tools to the rescue: Hunter.io, Snov.io
Tooling – Offense 5.
Random words of advice:
● Reduce bounces & complaints:
BriteVerify, emailchecker.io, zerobounce.net
● Spam test: mail-tester.com
● Start slow (warm up with few emails per day)
● Proper salutation + first name
● Add a little variety to each outgoing email
Tooling – Defence 1. – Abuse
Domain monitoring w/ Certificate Transparency:
- https://developers.facebook.com/tools/ct/
- https://phishfinder.io
DMARC record:
- Set to ‘reject’
- Receive forensic reports
- OnDMARC, DMARCian, DMARC Analyzer ($$$)
Tooling – Defence 2. – Email gw
● Neutralise attachments ( .doc → .html )
● Malware sandbox
● URL rewriting
● DNSBL blocklists
● Email quarantine
● URLs: Web proxy or DNS sinkholing (e.g. Pi-hole, Cisco Umbrella)
Services: Mimecast, MailGuard ...
ASD recommendations:
https://www.asd.gov.au/publications/protect/malicious_email_mitigation.htm
Tooling – Defence 3.– Endpoint
● Anti-malware / endpoint protection
○ Anti-phishing filter
○ Ransomware protection
● Browser extensions
○ NoScript, Scriptsafe, Flashblock, uBlock Origin
○ Windows Defender Browser Protection for Chrome
(w00t)
○ Webroot Filtering Extension
Tooling – Defence 4. – Layer 8
● Sandboxing
○ VirtualBox
○ Sandboxie
● Awareness:
○ Phishing simulation: PhishMe, PhishingBox
Summary
● Outdated pieces of advice don’t work
● Phishing comes in different shapes and forms
● High delivery rate can be tedious (but rewarding!)
● Defense in depth is your God
● Professionals target people → Educate them!
Questions?
https://twltter.com/gszathmari
https://www.ironbastion.com.au
gabor@ironbastion.com.au

More Related Content

Similar to Phishing stories from the trenches

Internet Security - Naga Rohit S [ IIT Guwahati ] - Coding Club & DefCon DC91...
Internet Security - Naga Rohit S [ IIT Guwahati ] - Coding Club & DefCon DC91...Internet Security - Naga Rohit S [ IIT Guwahati ] - Coding Club & DefCon DC91...
Internet Security - Naga Rohit S [ IIT Guwahati ] - Coding Club & DefCon DC91...
Naga Rohit
 
How To Keep the Grinch From Ruining Your Cyber Monday
How To Keep the Grinch From Ruining Your Cyber MondayHow To Keep the Grinch From Ruining Your Cyber Monday
How To Keep the Grinch From Ruining Your Cyber Monday
Michele Chubirka
 
The Phishing Ecosystem
The Phishing EcosystemThe Phishing Ecosystem
The Phishing Ecosystem
amiable_indian
 
phishing facts be aware and do not take the bait
phishing facts be aware and do not take the baitphishing facts be aware and do not take the bait
phishing facts be aware and do not take the bait
ssuser64f8f8
 
Mc physics colloquium2018-03-30.-handouts
Mc physics colloquium2018-03-30.-handoutsMc physics colloquium2018-03-30.-handouts
Mc physics colloquium2018-03-30.-handouts
Kevin Wall
 
Chapter-5.pptx
Chapter-5.pptxChapter-5.pptx
Chapter-5.pptx
ShreyaKushwaha28
 
Secrets of Google VRP by: Krzysztof Kotowicz, Google Security Team
Secrets of Google VRP by: Krzysztof Kotowicz, Google Security TeamSecrets of Google VRP by: Krzysztof Kotowicz, Google Security Team
Secrets of Google VRP by: Krzysztof Kotowicz, Google Security Team
OWASP Delhi
 
Bsides-Philly-2016-Finding-A-Companys-BreakPoint
Bsides-Philly-2016-Finding-A-Companys-BreakPointBsides-Philly-2016-Finding-A-Companys-BreakPoint
Bsides-Philly-2016-Finding-A-Companys-BreakPoint
Zack Meyers
 
Hacking law firms with abandoned domain names
Hacking law firms with abandoned domain namesHacking law firms with abandoned domain names
Hacking law firms with abandoned domain names
Gabor Szathmari
 
User Interfaces and Algorithms for Fighting Phishing, at Google Tech Talk Jan...
User Interfaces and Algorithms for Fighting Phishing, at Google Tech Talk Jan...User Interfaces and Algorithms for Fighting Phishing, at Google Tech Talk Jan...
User Interfaces and Algorithms for Fighting Phishing, at Google Tech Talk Jan...
Jason Hong
 
Voight-Kampff for Email Addresses: Quantifying Email Address Reputation to Id...
Voight-Kampff for Email Addresses: Quantifying Email Address Reputation to Id...Voight-Kampff for Email Addresses: Quantifying Email Address Reputation to Id...
Voight-Kampff for Email Addresses: Quantifying Email Address Reputation to Id...
Joshua Kamdjou
 
How I Will Phish You
How I Will Phish You How I Will Phish You
How I Will Phish You
Dawn Yankeelov
 
Web security ppt sniper corporation
Web security ppt   sniper corporationWeb security ppt   sniper corporation
Web security ppt sniper corporation
sharmaakash1881
 
Evil User Stories - Improve Your Application Security
Evil User Stories - Improve Your Application SecurityEvil User Stories - Improve Your Application Security
Evil User Stories - Improve Your Application Security
Anne Oikarinen
 
So whats in a password
So whats in a passwordSo whats in a password
So whats in a password
Rob Gillen
 
Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks
Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks
Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks
Er. Rahul Jain
 
Spam and hackers
Spam and hackersSpam and hackers
Spam and hackers
Souhail Hammou
 
Spam and hackers
Spam and hackersSpam and hackers
Spam and hackers
Souhail Hammou
 
Discretion in APT
Discretion in APTDiscretion in APT
Discretion in APT
HeungSoo Kang
 
Beyond Automated Testing - RVAsec 2016
Beyond Automated Testing - RVAsec 2016Beyond Automated Testing - RVAsec 2016
Beyond Automated Testing - RVAsec 2016
Andrew McNicol
 

Similar to Phishing stories from the trenches (20)

Internet Security - Naga Rohit S [ IIT Guwahati ] - Coding Club & DefCon DC91...
Internet Security - Naga Rohit S [ IIT Guwahati ] - Coding Club & DefCon DC91...Internet Security - Naga Rohit S [ IIT Guwahati ] - Coding Club & DefCon DC91...
Internet Security - Naga Rohit S [ IIT Guwahati ] - Coding Club & DefCon DC91...
 
How To Keep the Grinch From Ruining Your Cyber Monday
How To Keep the Grinch From Ruining Your Cyber MondayHow To Keep the Grinch From Ruining Your Cyber Monday
How To Keep the Grinch From Ruining Your Cyber Monday
 
The Phishing Ecosystem
The Phishing EcosystemThe Phishing Ecosystem
The Phishing Ecosystem
 
phishing facts be aware and do not take the bait
phishing facts be aware and do not take the baitphishing facts be aware and do not take the bait
phishing facts be aware and do not take the bait
 
Mc physics colloquium2018-03-30.-handouts
Mc physics colloquium2018-03-30.-handoutsMc physics colloquium2018-03-30.-handouts
Mc physics colloquium2018-03-30.-handouts
 
Chapter-5.pptx
Chapter-5.pptxChapter-5.pptx
Chapter-5.pptx
 
Secrets of Google VRP by: Krzysztof Kotowicz, Google Security Team
Secrets of Google VRP by: Krzysztof Kotowicz, Google Security TeamSecrets of Google VRP by: Krzysztof Kotowicz, Google Security Team
Secrets of Google VRP by: Krzysztof Kotowicz, Google Security Team
 
Bsides-Philly-2016-Finding-A-Companys-BreakPoint
Bsides-Philly-2016-Finding-A-Companys-BreakPointBsides-Philly-2016-Finding-A-Companys-BreakPoint
Bsides-Philly-2016-Finding-A-Companys-BreakPoint
 
Hacking law firms with abandoned domain names
Hacking law firms with abandoned domain namesHacking law firms with abandoned domain names
Hacking law firms with abandoned domain names
 
User Interfaces and Algorithms for Fighting Phishing, at Google Tech Talk Jan...
User Interfaces and Algorithms for Fighting Phishing, at Google Tech Talk Jan...User Interfaces and Algorithms for Fighting Phishing, at Google Tech Talk Jan...
User Interfaces and Algorithms for Fighting Phishing, at Google Tech Talk Jan...
 
Voight-Kampff for Email Addresses: Quantifying Email Address Reputation to Id...
Voight-Kampff for Email Addresses: Quantifying Email Address Reputation to Id...Voight-Kampff for Email Addresses: Quantifying Email Address Reputation to Id...
Voight-Kampff for Email Addresses: Quantifying Email Address Reputation to Id...
 
How I Will Phish You
How I Will Phish You How I Will Phish You
How I Will Phish You
 
Web security ppt sniper corporation
Web security ppt   sniper corporationWeb security ppt   sniper corporation
Web security ppt sniper corporation
 
Evil User Stories - Improve Your Application Security
Evil User Stories - Improve Your Application SecurityEvil User Stories - Improve Your Application Security
Evil User Stories - Improve Your Application Security
 
So whats in a password
So whats in a passwordSo whats in a password
So whats in a password
 
Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks
Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks
Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks
 
Spam and hackers
Spam and hackersSpam and hackers
Spam and hackers
 
Spam and hackers
Spam and hackersSpam and hackers
Spam and hackers
 
Discretion in APT
Discretion in APTDiscretion in APT
Discretion in APT
 
Beyond Automated Testing - RVAsec 2016
Beyond Automated Testing - RVAsec 2016Beyond Automated Testing - RVAsec 2016
Beyond Automated Testing - RVAsec 2016
 

More from Gabor Szathmari

Iron Bastion: Preventing business email compromise fraud at your firm
Iron Bastion: Preventing business email compromise fraud at your firmIron Bastion: Preventing business email compromise fraud at your firm
Iron Bastion: Preventing business email compromise fraud at your firm
Gabor Szathmari
 
Iron Bastion: How to Manage Your Clients' Data Responsibly
Iron Bastion: How to Manage Your Clients' Data ResponsiblyIron Bastion: How to Manage Your Clients' Data Responsibly
Iron Bastion: How to Manage Your Clients' Data Responsibly
Gabor Szathmari
 
How to manage your client's data responsibly
How to manage your client's data responsiblyHow to manage your client's data responsibly
How to manage your client's data responsibly
Gabor Szathmari
 
How to protect your clients and your law firm from money transfer scams
How to protect your clients and your law firm from money transfer scamsHow to protect your clients and your law firm from money transfer scams
How to protect your clients and your law firm from money transfer scams
Gabor Szathmari
 
Help! I am an Investigative Journalist in 2017
Help! I am an Investigative Journalist in 2017Help! I am an Investigative Journalist in 2017
Help! I am an Investigative Journalist in 2017
Gabor Szathmari
 
CryptoParty Tor Relay Workshop
CryptoParty Tor Relay WorkshopCryptoParty Tor Relay Workshop
CryptoParty Tor Relay Workshop
Gabor Szathmari
 
Privacy for journalists introduction
Privacy for journalists introductionPrivacy for journalists introduction
Privacy for journalists introduction
Gabor Szathmari
 
Threat Modeling for Journalists
Threat Modeling for JournalistsThreat Modeling for Journalists
Threat Modeling for Journalists
Gabor Szathmari
 
Privacy for Journalists Introduction
Privacy for Journalists IntroductionPrivacy for Journalists Introduction
Privacy for Journalists Introduction
Gabor Szathmari
 
Safe Browsing in 2016
Safe Browsing in 2016Safe Browsing in 2016
Safe Browsing in 2016
Gabor Szathmari
 
When the CDN goes bananas
When the CDN goes bananasWhen the CDN goes bananas
When the CDN goes bananas
Gabor Szathmari
 
PGP and Keybase (CryptoParty Belfast)
PGP and Keybase (CryptoParty Belfast)PGP and Keybase (CryptoParty Belfast)
PGP and Keybase (CryptoParty Belfast)
Gabor Szathmari
 

More from Gabor Szathmari (12)

Iron Bastion: Preventing business email compromise fraud at your firm
Iron Bastion: Preventing business email compromise fraud at your firmIron Bastion: Preventing business email compromise fraud at your firm
Iron Bastion: Preventing business email compromise fraud at your firm
 
Iron Bastion: How to Manage Your Clients' Data Responsibly
Iron Bastion: How to Manage Your Clients' Data ResponsiblyIron Bastion: How to Manage Your Clients' Data Responsibly
Iron Bastion: How to Manage Your Clients' Data Responsibly
 
How to manage your client's data responsibly
How to manage your client's data responsiblyHow to manage your client's data responsibly
How to manage your client's data responsibly
 
How to protect your clients and your law firm from money transfer scams
How to protect your clients and your law firm from money transfer scamsHow to protect your clients and your law firm from money transfer scams
How to protect your clients and your law firm from money transfer scams
 
Help! I am an Investigative Journalist in 2017
Help! I am an Investigative Journalist in 2017Help! I am an Investigative Journalist in 2017
Help! I am an Investigative Journalist in 2017
 
CryptoParty Tor Relay Workshop
CryptoParty Tor Relay WorkshopCryptoParty Tor Relay Workshop
CryptoParty Tor Relay Workshop
 
Privacy for journalists introduction
Privacy for journalists introductionPrivacy for journalists introduction
Privacy for journalists introduction
 
Threat Modeling for Journalists
Threat Modeling for JournalistsThreat Modeling for Journalists
Threat Modeling for Journalists
 
Privacy for Journalists Introduction
Privacy for Journalists IntroductionPrivacy for Journalists Introduction
Privacy for Journalists Introduction
 
Safe Browsing in 2016
Safe Browsing in 2016Safe Browsing in 2016
Safe Browsing in 2016
 
When the CDN goes bananas
When the CDN goes bananasWhen the CDN goes bananas
When the CDN goes bananas
 
PGP and Keybase (CryptoParty Belfast)
PGP and Keybase (CryptoParty Belfast)PGP and Keybase (CryptoParty Belfast)
PGP and Keybase (CryptoParty Belfast)
 

Recently uploaded

Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Jeffrey Haguewood
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
LucaBarbaro3
 
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
alexjohnson7307
 
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Jeffrey Haguewood
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
Operating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptxOperating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptx
Pravash Chandra Das
 
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdfNunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
flufftailshop
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Tatiana Kojar
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
Intelisync
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 

Recently uploaded (20)

Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
 
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
 
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
Operating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptxOperating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptx
 
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdfNunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 

Phishing stories from the trenches

  • 1. Phishing stories from the trenches – Cyber + Hacking
  • 2. $ whoami Gabor Szathmari ● Incident manager @ Amazon.com ● Security expert @ Iron Bastion ● Privacy advocate @ CryptoAUSTRALIA
  • 3. We’ll cover ● Why phishing works – examples ● How to get better at offense and defence
  • 4. Go
  • 5. What phishing is “Only amateurs attack machines; professionals target people” - Bruce Schneier ● Social engineering ● Not just email ● From simple to sophisticated
  • 6. Why phishing? ● Steal sensitive stuff: ○ Passwords ○ Payment details (cc numbers, crypto wallets) ● Trick someone into doing something: ○ Reset someone’s password → CIA Director John Brennan’s AOL account ○ Transfer a phone number → YouTube “h3h3: Your Privacy is at Risk”
  • 7. Why phishing? (part 2.) ● Install badware ○ Ransomware, cryptolockers ○ Backdoors, Remote Access Toolkits (RAT) ● The long game ○ Resetting pws of other accounts (DropBox, personal mailboxes, Steam accounts) ○ Tamper with payment directions ○ Lateral movement into corporate networks ○ Fun
  • 10. Outdated pieces of advice ● Hover links ● Check the sender’s email address ● Broken English ● Don’t open files ● Change passwords often “None of the victims are idiots” - me
  • 11. Why they don’t work? Examples
  • 15. Spot the phish 3. http://epl.paypal- communication.com/ T/v40[...]
  • 16. Spot the phish 3. Lol: “As for https://epl.paypal- communication.com it is clearly also just a tracker made by PayPal” https://www.reddit.com/r/paypal/comments/4qlnf0/is_this_a_phishing_attempt/
  • 19. Spot the phish 5. https://twitter.com/cryptoaustralia/status/905981181048401920
  • 21. Enhance! – iPhone ● Sender address isn’t displayed ● No link hovering
  • 22. ಠ_ಠ – Lotus Notes “In Outlook email, I can point the mouse over any hyperlink in email body and right click and copy the URL that the hyperlink is pointing to. How do you do this in Lotus Notes email?” “1. Right click on the email and select ‘Edit’ 2. Right click on the link in question and select ‘HotSpot Properties’ 3. A new box will pop up that has details about the link 4. Select the text in the ‘Value’ field and Ctrl-C to copy the link address.” https://superuser.com/questions/836890/how-to-copy-links-in-lotus-notes-email
  • 24. Outdated pieces of advice (recap) ● Hover links – ಠ_ಠ ● Check the sender’s email address – Yeah nah ● Broken English – u w0t m8 ● Don’t open files – Good luck with this ● Change passwords often - API creds, application pws “None of the victims are idiots” - me
  • 26. Disclaimer ● The following offensive techniques are meant to be used in penetration testing/ read teaming engagements ● You must have a written permission from the right person of the organisation
  • 27. Phish like a pro Sender IP reputation: - DNSBL - Reverse DNS record (PTR) Domain reputation: - Age (> 1 month) - Old school TLD (no .horse, .wang, .plumbing) - Public WHOIS record - Hosts a website
  • 28. Phish like pro 2. Spam/Phishing filter evasion: - Consistent ‘Envelope sender’, HELO, ‘From’ and domain - SPF / DKIM / DMARC records - ‘To: f_name l_name <user@example.com>’ - No web links - No HTTP redirects - No link shorteners - Plain-text - Avoid suspicious wording
  • 29. Phish like pro 3. URL reputation: - Don’t get blacklisted: - URIBL.com - Google Safe Browsing - Add safe category: - http://url.fortinet.net/rate/submit.php - https://www.trustedsource.org/en/feedback/url - https://global.sitesafety.trendmicro.com/index.php - https://sitereview.bluecoat.com/
  • 30. Tooling – Offense 1. Manage phishing campaigns: ● https://getgophish.com/ ● https://github.com/pentestgeek/phishing-frenzy ● https://github.com/securestate/king-phisher
  • 32. Tooling – Offense 2. - Generate domains (typosquatting): dnstwist - Buy abandoned domains: ExpiredDomains.net - Obfuscate payload - https://github.com/Veil-Framework/Veil - Research & pretext - “Here’s an AWS gift card for using our #hashtag” - “We’ll send you a survey tomorrow”
  • 33. How to phish more effectively 101
  • 34. Tooling – Offense 3. Improve deliverability: - Spell check / proofread / peer review emails - Track bounces and spam complaints (self-hosted) - https://glockapps.com/bounces-complaints-monitoring/ - Use a transactional email services - Mailgun, Sendgrid ... - Buy dedicated IP ($$$)
  • 35. Tooling – Offense 4. Build quality email lists: ● DIY – Browser and loads of time ● Pentesting scripts (e.g. theHarvester) ● Pay someone: ○ Search “Lead generation” ○ UpWork.com, Freelancer.com ● Marketing tools to the rescue: Hunter.io, Snov.io
  • 36. Tooling – Offense 5. Random words of advice: ● Reduce bounces & complaints: BriteVerify, emailchecker.io, zerobounce.net ● Spam test: mail-tester.com ● Start slow (warm up with few emails per day) ● Proper salutation + first name ● Add a little variety to each outgoing email
  • 37.
  • 38. Tooling – Defence 1. – Abuse Domain monitoring w/ Certificate Transparency: - https://developers.facebook.com/tools/ct/ - https://phishfinder.io DMARC record: - Set to ‘reject’ - Receive forensic reports - OnDMARC, DMARCian, DMARC Analyzer ($$$)
  • 39. Tooling – Defence 2. – Email gw ● Neutralise attachments ( .doc → .html ) ● Malware sandbox ● URL rewriting ● DNSBL blocklists ● Email quarantine ● URLs: Web proxy or DNS sinkholing (e.g. Pi-hole, Cisco Umbrella) Services: Mimecast, MailGuard ... ASD recommendations: https://www.asd.gov.au/publications/protect/malicious_email_mitigation.htm
  • 40. Tooling – Defence 3.– Endpoint ● Anti-malware / endpoint protection ○ Anti-phishing filter ○ Ransomware protection ● Browser extensions ○ NoScript, Scriptsafe, Flashblock, uBlock Origin ○ Windows Defender Browser Protection for Chrome (w00t) ○ Webroot Filtering Extension
  • 41. Tooling – Defence 4. – Layer 8 ● Sandboxing ○ VirtualBox ○ Sandboxie ● Awareness: ○ Phishing simulation: PhishMe, PhishingBox
  • 42. Summary ● Outdated pieces of advice don’t work ● Phishing comes in different shapes and forms ● High delivery rate can be tedious (but rewarding!) ● Defense in depth is your God ● Professionals target people → Educate them!

Editor's Notes

  1. Works over phone, voicemail, SMS or QR codes Mr. Robot - USB flash drives
  2. Works over phone, voicemail, SMS or QR codes Mr. Robot - USB flash drives
  3. Smartphones like iPhone doesn’t display the sender email address Proofreading for $5, pixel perfect copies of Australia Post emails File attachments are a vital part of every business. E.g. resumes, invoices, essays You can’t hover on phone or Lotus Notes Backdoor accounts with API keys or application passwords
  4. Smartphones like iPhone doesn’t display the sender email address Proofreading for $5, pixel perfect copies of Australia Post emails File attachments are a vital part of every business. E.g. resumes, invoices, essays You can’t hover on phone or Lotus Notes Backdoor accounts with API keys or application passwords
  5. Smartphones like iPhone doesn’t display the sender email address Proofreading for $5, pixel perfect copies of Australia Post emails File attachments are a vital part of every business. E.g. resumes, invoices, essays You can’t hover on phone or Lotus Notes Backdoor accounts with API keys or application passwords
  6. Low bounce rate Avoid generic addresses like sales@