ID | Name |
---|---|
T1566.001 | Spearphishing Attachment |
T1566.002 | Spearphishing Link |
T1566.003 | Spearphishing via Service |
Adversaries may send spearphishing emails with a malicious attachment in an attempt to gain access to victim systems. Spearphishing attachment is a specific variant of spearphishing. Spearphishing attachment is different from other forms of spearphishing in that it employs the use of malware attached to an email. All forms of spearphishing are electronically delivered social engineering targeted at a specific individual, company, or industry. In this scenario, adversaries attach a file to the spearphishing email and usually rely upon User Execution to gain execution. Spearphishing may also involve social engineering techniques, such as posing as a trusted source.
There are many options for the attachment such as Microsoft Office documents, executables, PDFs, or archived files. Upon opening the attachment (and potentially clicking past protections), the adversary's payload exploits a vulnerability or directly executes on the user's system. The text of the spearphishing email usually tries to give a plausible reason why the file should be opened, and may explain how to bypass system protections in order to do so. The email may also contain instructions on how to decrypt an attachment, such as a zip file password, in order to evade email boundary defenses. Adversaries frequently manipulate file extensions and icons in order to make attached executables appear to be document files, or files exploiting one application appear to be a file for a different one.
Angreifer können Spearphishing-E-Mails mit einem bösartigen Anhang versenden, um sich Zugang zu den Systemen der Opfer zu verschaffen. Der Spearphishing-Anhang ist eine spezielle Variante des Spearphishings. Der Spearphishing-Anhang unterscheidet sich von anderen Formen des Spearphishings durch die Verwendung von Malware im Anhang einer E-Mail. Alle Formen von Spearphishing sind elektronisch übermittelte Social Engineering-Methoden, die auf eine bestimmte Person, ein Unternehmen oder eine Branche abzielen. In diesem Szenario hängen die Angreifer eine Datei an die Spearphishing-E-Mail an und nutzen in der Regel die User Execution, um die Ausführung zu erreichen. Spearphishing kann auch Social-Engineering-Techniken beinhalten, wie z. B. das Ausgeben als vertrauenswürdige Quelle.
Es gibt viele Möglichkeiten für den Anhang, z. B. Microsoft Office-Dokumente, ausführbare Dateien, PDFs oder archivierte Dateien. Nach dem Öffnen des Anhangs (und dem möglichen Übergehen von Schutzmechanismen) nutzt der Angreifer eine Sicherheitslücke aus oder wird direkt auf dem System des Benutzers ausgeführt. Der Text der Spearphishing-E-Mail versucht in der Regel, einen plausiblen Grund zu nennen, warum die Datei geöffnet werden sollte, und kann erklären, wie man den Systemschutz umgeht, um dies zu tun. Die E-Mail kann auch Anweisungen zur Entschlüsselung eines Anhangs enthalten, wie z. B. das Kennwort einer Zip-Datei, um den Schutz der E-Mail-Grenzen zu umgehen. Angreifer manipulieren häufig Dateierweiterungen und Symbole, um angehängte ausführbare Dateien als Dokumentdateien erscheinen zu lassen, oder Dateien, die eine Anwendung ausnutzen, als Datei für eine andere Anwendung.
Les adversaires peuvent envoyer des e-mails de spearphishing avec une pièce jointe malveillante dans le but d'accéder aux systèmes des victimes. Le spearphishing en pièce jointe est une variante spécifique du spearphishing. Le spearphishing en pièce jointe diffère des autres formes de spearphishing en ce qu'il utilise un logiciel malveillant joint à un e-mail. Toutes les formes de spearphishing sont de l'ingénierie sociale délivrée par voie électronique et ciblant une personne, une entreprise ou un secteur spécifique. Dans ce scénario, les adversaires joignent un fichier à l'e-mail de spearphishing et s'appuient généralement sur [User Execution] (/techniques/T1204) pour l'exécuter. Le spearphishing peut également impliquer des techniques d'ingénierie sociale, comme se faire passer pour une source de confiance.
Il existe de nombreuses options pour la pièce jointe, comme des documents Microsoft Office, des exécutables, des PDF ou des fichiers archivés. En ouvrant la pièce jointe (et en cliquant éventuellement sur des protections antérieures), la charge utile de l'adversaire exploite une vulnérabilité ou s'exécute directement sur le système de l'utilisateur. Le texte de l'e-mail de spearphishing tente généralement de donner une raison plausible pour laquelle le fichier devrait être ouvert, et peut expliquer comment contourner les protections du système pour le faire. L'e-mail peut également contenir des instructions sur la manière de décrypter une pièce jointe, comme le mot de passe d'un fichier zip, afin d'échapper aux défenses des limites de l'e-mail. Les adversaires manipulent fréquemment les extensions de fichiers et les icônes afin que les exécutables joints semblent être des fichiers de documents, ou que les fichiers exploitant une application semblent être un fichier pour une autre application.
Gli avversari possono inviare email di spearphishing con un allegato malevolo nel tentativo di ottenere l'accesso ai sistemi delle vittime. Lo spearphishing attachment è una variante specifica dello spearphishing. Lo spearphishing attachment è diverso dalle altre forme di spearphishing in quanto impiega l'uso di malware allegato ad un'email. Tutte le forme di spearphishing sono ingegneria sociale consegnata elettronicamente e mirata ad un individuo, un'azienda o un settore specifico. In questo scenario, gli avversari allegano un file all'email di spearphishing e di solito si basano su User Execution per ottenere l'esecuzione. Lo spearphishing può anche coinvolgere tecniche di ingegneria sociale, come ad esempio fingersi una fonte fidata.
Ci sono molte opzioni per l'allegato come documenti Microsoft Office, eseguibili, PDF o file archiviati. Aprendo l'allegato (e potenzialmente cliccando oltre le protezioni), il payload dell'avversario sfrutta una vulnerabilità o viene eseguito direttamente sul sistema dell'utente. Il testo dell'email di spearphishing di solito cerca di dare una ragione plausibile per cui il file dovrebbe essere aperto e può spiegare come aggirare le protezioni del sistema per farlo. L'email può anche contenere istruzioni su come decriptare un allegato, come la password di un file zip, per eludere le difese di confine dell'email. Gli avversari manipolano spesso le estensioni dei file e le icone per far sembrare che gli eseguibili allegati siano file di documenti o che i file che sfruttano un'applicazione sembrino file per un'altra.
ID | Name | Description |
---|---|---|
G0018 | admin@338 |
admin@338 has sent emails with malicious Microsoft Office documents attached.[1] |
S0331 | Agent Tesla |
The primary delivered mechaism for Agent Tesla is through email phishing messages.[2] |
G0130 | Ajax Security Team |
Ajax Security Team has used personalized spearphishing attachments.[3] |
G0138 | Andariel |
Andariel has conducted spearphishing campaigns that included malicious Word or Excel attachments.[4][5] |
S0622 | AppleSeed |
AppleSeed has been distributed to victims through malicious e-mail attachments.[6] |
G0099 | APT-C-36 |
APT-C-36 has used spearphishing emails with password protected RAR attachment to avoid being detected by the email gateway.[7] |
G0006 | APT1 |
APT1 has sent spearphishing emails containing malicious attachments.[8] |
G0005 | APT12 |
APT12 has sent emails with malicious Microsoft Office documents and PDFs attached.[9][10] |
G0073 | APT19 |
APT19 sent spearphishing emails with malicious attachments in RTF and XLSM formats to deliver initial exploits.[11] |
G0007 | APT28 |
APT28 sent spearphishing emails containing malicious Microsoft Office and RAR attachments.[12][13][14][15][16][17][18] |
G0016 | APT29 |
APT29 has used spearphishing emails with an attachment to deliver files with exploits to initial victims.[19][20][21][22] |
G0013 | APT30 |
APT30 has used spearphishing emails with malicious DOC attachments.[23] |
G0050 | APT32 |
APT32 has sent spearphishing emails with a malicious executable disguised as a document or spreadsheet.[24][25][26][27][28][29] |
G0064 | APT33 |
APT33 has sent spearphishing e-mails with archive attachments.[30] |
G0067 | APT37 |
APT37 delivers malware using spearphishing emails with malicious HWP attachments.[31][32][33] |
G0082 | APT38 |
APT38 has conducted spearphishing campaigns using malicious email attachments.[34] |
G0087 | APT39 |
APT39 leveraged spearphishing emails with malicious attachments to initially compromise victims.[35][36][37] |
G0096 | APT41 |
APT41 sent spearphishing emails with attachments such as compiled HTML (.chm) files to initially compromise their victims.[38] |
S0642 | BADFLICK |
BADFLICK has been distributed via spearphishing campaigns containing malicious Microsoft Word documents.[39] |
S0234 | Bandook |
Bandook is delivered via a malicious Word document inside a zip file.[40] |
G0098 | BlackTech |
BlackTech has used spearphishing e-mails with malicious documents to deliver malware.[41] |
S0520 | BLINDINGCAN |
BLINDINGCAN has been delivered by phishing emails containing malicious Microsoft Office documents.[42] |
G0060 | BRONZE BUTLER |
BRONZE BUTLER used spearphishing emails with malicious Microsoft Word attachments to infect victims.[43][44] |
S0631 | Chaes |
Chaes has been delivered by sending victims a phishing email containing a malicious .docx file.[45] |
G0080 | Cobalt Group |
Cobalt Group has sent spearphishing emails with various attachment types to corporate and personal email accounts of victim organizations. Attachment types have included .rtf, .doc, .xls, archives containing LNK files, and password protected archives containing .exe and .scr executables.[46][47][48][49][50][51][52][53] |
G0012 | Darkhotel |
Darkhotel has sent spearphishing emails with malicious RAR and .LNK attachments.[54][55] |
G0079 | DarkHydrus |
DarkHydrus has sent spearphishing emails with password-protected RAR archives containing malicious Excel Web Query files (.iqy). The group has also sent spearphishing emails that contained malicious Microsoft Office documents that use the "attachedTemplate" technique to load a template from a remote server.[56][57][58] |
G0074 | Dragonfly 2.0 |
Dragonfly 2.0 used spearphishing with Microsoft Office attachments to target victims.[59][60] |
G0066 | Elderwood |
Elderwood has delivered zero-day exploits and malware to victims via targeted emails containing malicious attachments.[61][62] |
S0367 | Emotet |
Emotet has been delivered by phishing emails containing attachments. [63][64][65][66][67][68][69][70][71] |
S0634 | EnvyScout |
EnvyScout has been distributed via spearphishing as an email attachment.[72] |
G0137 | Ferocious Kitten |
Ferocious Kitten has conducted spearphishing campaigns containing malicious documents to lure victims to open the attachments.[73] |
G0085 | FIN4 |
FIN4 has used spearphishing emails containing attachments (which are often stolen, legitimate documents sent from compromised accounts) with embedded malicious macros.[74][75] |
G0037 | FIN6 |
FIN6 has targeted victims with e-mails containing malicious attachments.[76] |
G0046 | FIN7 |
FIN7 sent spearphishing emails with either malicious Microsoft Documents or RTF files attached.[77][78][79][80][81] |
G0061 | FIN8 |
FIN8 has distributed targeted emails containing Word documents with embedded malicious macros.[82][83][84] |
G0101 | Frankenstein |
Frankenstein has used spearphishing emails to send trojanized Microsoft Word documents.[85] |
G0084 | Gallmaker |
Gallmaker sent emails with malicious Microsoft Office documents attached.[86] |
G0047 | Gamaredon Group |
Gamaredon Group has delivered spearphishing emails with malicious attachments to targets.[87][88] |
G0078 | Gorgon Group |
Gorgon Group sent emails to victims with malicious Microsoft Office documents attached.[89] |
S0499 | Hancitor |
Hancitor has been delivered via phishing emails with malicious attachments.[90] |
G0126 | Higaisa |
Higaisa has sent spearphishing emails containing malicious attachments.[91][92] |
S0483 | IcedID |
IcedID has been delivered via phishing e-mails with malicious attachments.[93] |
G0100 | Inception |
Inception has used weaponized documents attached to spearphishing emails for reconnaissance and initial compromise.[94][95][96][97] |
G0136 | IndigoZebra |
IndigoZebra sent spearphishing emails containing malicious password-protected RAR attachments.[98][99] |
S0528 | Javali |
Javali has been delivered as malicious e-mail attachments.[100] |
S0648 | JSS Loader |
JSS Loader has been delivered by phishing emails containing malicious Microsoft Excel attachments.[80] |
S0585 | Kerrdown |
Kerrdown has been distributed through malicious e-mail attachments.[29] |
G0094 | Kimsuky |
Kimsuky has used emails containing Word, Excel and/or HWP (Hangul Word Processor) documents in their spearphishing campaigns.[101][102][103][104][105][6] |
G0032 | Lazarus Group |
Lazarus Group has targeted victims with spearphishing emails containing malicious Microsoft Word documents.[106] |
G0065 | Leviathan |
Leviathan has sent spearphishing emails with malicious attachments, including .rtf, .doc, and .xls files.[107][108] |
S0447 | Lokibot |
Lokibot is delivered via a malicious XLS attachment contained within a spearhpishing email.[109] |
G0095 | Machete |
Machete has delivered spearphishing emails that contain a zipped file with malicious contents.[110][111][112] |
G0045 | menuPass |
menuPass has sent malicious Office documents via email as part of spearphishing campaigns as well as executables disguised as documents.[113][114][115][116] |
S0455 | Metamorfo |
Metamorfo has been delivered to victims via emails with malicious HTML attachments.[117][118] |
G0103 | Mofang |
Mofang delivered spearphishing emails with malicious documents, PDFs, or Excel files attached.[119] |
G0021 | Molerats |
Molerats has sent phishing emails with malicious Microsoft Word and PDF attachments.[120][121][122] |
G0069 | MuddyWater |
MuddyWater has compromised third parties and used compromised accounts to send spearphishing emails with targeted attachments to recipients.[123][124][125][126][127][128] |
G0129 | Mustang Panda |
Mustang Panda has used spearphishing attachments to deliver initial access payloads.[129][130] |
G0019 | Naikon |
Naikon has used malicious e-mail attachments to deliver malware.[131] |
S0198 | NETWIRE |
NETWIRE has been spread via e-mail campaigns utilizing malicious attachments.[132][133] |
G0133 | Nomadic Octopus |
Nomadic Octopus has targeted victims with spearphishing emails containing malicious attachments.[134][135] |
S0346 | OceanSalt |
OceanSalt has been delivered via spearphishing emails with Microsoft Office attachments.[136] |
S0340 | Octopus | |
G0049 | OilRig |
OilRig has sent spearphising emails with malicious attachments to potential victims using compromised and/or spoofed email accounts.[137][138][139] |
G0040 | Patchwork |
Patchwork has used spearphishing with an attachment to deliver files with exploits to initial victims.[140][141][142][143] |
G0068 | PLATINUM |
PLATINUM has sent spearphishing emails with attachments to victims as its primary initial access vector.[144] |
S0428 | PoetRAT | |
S0453 | Pony | |
S0650 | QakBot |
QakBot has spread through emails with malicious attachments.[147][148][149][150][151][152][153] |
S0458 | Ramsay |
Ramsay has been distributed through spearphishing emails with malicious attachments.[154] |
G0075 | Rancor |
Rancor has attached a malicious document to an email to gain initial access.[155] |
S0496 | REvil |
REvil has been distributed via malicious e-mail attachments including MS Word Documents.[156][157][158][159][160] |
S0433 | Rifdoor |
Rifdoor has been distributed in e-mails with malicious Excel or Word documents.[161] |
S0148 | RTM |
RTM has been delivered via spearphishing attachments disguised as PDF documents.[162] |
G0048 | RTM |
RTM has used spearphishing attachments to distribute its malware.[163] |
G0034 | Sandworm Team |
Sandworm Team has delivered malicious Microsoft Office attachments via spearphishing emails.[164][165][166][167] |
G0104 | Sharpshooter |
Sharpshooter has sent malicious attachments via emails to targets.[168] |
G0121 | Sidewinder |
Sidewinder has sent e-mails with malicious attachments often crafted for specific targets.[169] |
G0091 | Silence |
Silence has sent emails with malicious DOCX, CHM, LNK and ZIP attachments. [170][171][172] |
G0062 | TA459 |
TA459 has targeted victims using spearphishing emails with malicious Microsoft Word attachments.[173] |
G0092 | TA505 |
TA505 has used spearphishing emails with malicious attachments to initially compromise victims.[174][175][176][177][178][179][180][181][182] |
G0127 | TA551 |
TA551 has sent spearphishing attachments with password protected ZIP files.[183][184][185] |
S0011 | Taidoor |
Taidoor has been delivered through spearphishing emails.[186] |
G0089 | The White Company |
The White Company has sent phishing emails with malicious Microsoft Word attachments to victims.[187] |
G0131 | Tonto Team |
Tonto Team has delivered payloads via spearphishing attachments.[188] |
G0134 | Transparent Tribe |
Transparent Tribe has sent spearphishing e-mails with attachments to deliver malicious payloads.[189][190][191][192][193] |
S0266 | TrickBot |
TrickBot has used an email with an Excel sheet containing a malicious macro to deploy the malware[194] |
G0081 | Tropic Trooper |
Tropic Trooper sent spearphishing emails that contained malicious Microsoft Office and fake installer file attachments.[195][196][197][198][199] |
S0476 | Valak |
Valak has been delivered via spearphishing e-mails with password protected ZIP files.[183] |
G0112 | Windshift |
Windshift has sent spearphishing emails with attachment to harvest credentials and deliver malware.[200] |
G0102 | Wizard Spider |
Wizard Spider has used spearphishing attachments to deliver Microsoft documents containing macros or PDFs containing malicious links to download either Emotet, Bokbot, TrickBot, or Bazar.[201][202] |
ID | Mitigation | Description |
---|---|---|
M1049 | Antivirus/Antimalware |
Anti-virus can also automatically quarantine suspicious files. |
M1031 | Network Intrusion Prevention |
Network intrusion prevention systems and systems designed to scan and remove malicious email attachments can be used to block activity. |
M1021 | Restrict Web-Based Content |
Block unknown or unused attachments by default that should not be transmitted over email as a best practice to prevent some vectors, such as .scr, .exe, .pif, .cpl, etc. Some email scanning devices can open and analyze compressed and encrypted formats, such as zip and rar that may be used to conceal malicious attachments. |
M1054 | Software Configuration |
Use anti-spoofing and email authentication mechanisms to filter messages based on validity checks of the sender domain (using SPF) and integrity of messages (using DKIM). Enabling these mechanisms within an organization (through policies such as DMARC) may enable recipients (intra-org and cross domain) to perform similar message filtering and validation.[203][204] |
M1017 | User Training |
Users can be trained to identify social engineering techniques and spearphishing emails. |
ID | Data Source | Data Component |
---|---|---|
DS0015 | Application Log | Application Log Content |
DS0022 | File | File Creation |
DS0029 | Network Traffic | Network Traffic Content |
Network Traffic Flow |
Network intrusion detection systems and email gateways can be used to detect spearphishing with malicious attachments in transit. Detonation chambers may also be used to identify malicious attachments. Solutions can be signature and behavior based, but adversaries may construct attachments in a way to avoid these systems.
Filtering based on DKIM+SPF or header analysis can help detect when the email sender is spoofed.[203][204]
Anti-virus can potentially detect malicious documents and attachments as they're scanned to be stored on the email server or on the user's computer. Endpoint sensing or network sensing can potentially detect malicious events once the attachment is opened (such as a Microsoft Word document or PDF reaching out to the internet or spawning Powershell.exe) for techniques such as Exploitation for Client Execution or usage of malicious scripts.
Monitor for suspicious descendant process spawning from Microsoft Office and other productivity software.[205]
Netzwerk-Intrusion-Detection-Systeme und E-Mail-Gateways können eingesetzt werden, um Spearphishing mit bösartigen Anhängen während der Übertragung zu erkennen. Detonationskammern können ebenfalls eingesetzt werden, um bösartige Anhänge zu identifizieren. Die Lösungen können signatur- und verhaltensbasiert sein, aber die Angreifer können Anhänge so konstruieren, dass sie diese Systeme umgehen.
Filter, die auf DKIM+SPF oder einer Header-Analyse basieren, können dabei helfen, zu erkennen, wenn der E-Mail-Absender gefälscht ist.(Zitat: Microsoft Anti Spoofing)(Zitat: ACSC Email Spoofing)
Anti-Virus kann potentiell bösartige Dokumente und Anhänge erkennen, wenn sie gescannt werden, um auf dem E-Mail-Server oder auf dem Computer des Benutzers gespeichert zu werden. Die Endpunkt- oder Netzwerkerkennung kann potenziell bösartige Ereignisse erkennen, sobald der Anhang geöffnet wird (z. B. ein Microsoft Word- oder PDF-Dokument, das ins Internet gelangt oder die Powershell.exe startet), um Techniken wie [Exploitation for Client Execution] (/techniques/T1203) oder die Verwendung bösartiger Skripte zu erkennen.
Überwachen Sie auf verdächtige Nachfolgeprozesse, die von Microsoft Office und anderer Produktivitätssoftware gestartet werden.(Zitat: Elastic - Koadiac Detection with EQL)
Les systèmes de détection d'intrusion dans les réseaux et les passerelles de messagerie peuvent être utilisés pour détecter le spearphishing avec des pièces jointes malveillantes en transit. Les chambres de détonation peuvent également être utilisées pour identifier les pièces jointes malveillantes. Les solutions peuvent être basées sur les signatures et le comportement, mais les adversaires peuvent construire les pièces jointes de manière à éviter ces systèmes.
Le filtrage basé sur DKIM+SPF ou l'analyse des en-têtes peut aider à détecter quand l'expéditeur du courriel est usurpé.(Citation : Microsoft Anti Spoofing)(Citation : ACSC Email Spoofing)
L'antivirus peut potentiellement détecter les documents et les pièces jointes malveillants lorsqu'ils sont analysés pour être stockés sur le serveur de messagerie ou sur l'ordinateur de l'utilisateur. La détection des points finaux ou du réseau peut potentiellement détecter les événements malveillants une fois que la pièce jointe est ouverte (comme un document Microsoft Word ou PDF qui se connecte à Internet ou qui génère Powershell.exe) pour des techniques telles que l'[Exploitation for Client Execution] (/techniques/T1203) ou l'utilisation de scripts malveillants.
Surveillez la création de processus descendants suspects à partir de Microsoft Office et d'autres logiciels de productivité.(Citation : Elastic - Koadiac Detection with EQL)
I sistemi di rilevamento delle intrusioni di rete e i gateway di posta elettronica possono essere utilizzati per rilevare lo spearphishing con allegati malevoli in transito. Anche le camere di detonazione possono essere utilizzate per identificare gli allegati malevoli. Le soluzioni possono essere basate sulla firma e sul comportamento, ma gli avversari possono costruire gli allegati in modo da evitare questi sistemi.
Il filtraggio basato su DKIM+SPF o sull'analisi dell'intestazione può aiutare a rilevare quando il mittente di email è spoofing.(Citazione: Microsoft Anti Spoofing)(Citazione: ACSC Email Spoofing)
L'antivirus può potenzialmente rilevare documenti ed allegati malevoli mentre vengono scansionati per essere archiviati sul server di posta elettronica o sul computer dell'utente. Endpoint sensing o network sensing possono potenzialmente rilevare eventi malevoli una volta che l'allegato viene aperto (come un documento Microsoft Word o PDF che raggiunge internet o che genera Powershell.exe) per tecniche come Exploitation for Client Execution o l'uso di script malevoli.
Monitorare la generazione di processi discendenti sospetti da Microsoft Office e altri software di produttività.(Citazione: Elastic - Koadiac Detection with EQL)