Advertisement

Is Polymorphic Phishing The Next Big Threat In Cyber Attacks?

In the data-driven business world everyone in an organisation — from employees to CEO, use email on a day to day basis. The use of email has reached such a level that it has now even become a top cyberattack vector, and cybercriminals are persistently targeting high-value individuals through phishing emails who have privileged access or handle sensitive data within an organization.

Today, people might say that phishing is old school and is not effective. But they are not aware that hackers are also leveraging the advanced technologies and using sophisticated methods to pwn. And one of those methods is Polymorphic Phishing Attacks.

The Rise Of Polymorphic Phishing

According to a source, IRONSCALES, an Israel-based cybersecurity firm was doing research on an automatic anti-phishing platform. And to the surprise, the firm has discovered that 42% of the phishing attempts they examined were “polymorphic” in nature. They identified 11,733 email phishing attacks that underwent at least one permutation over 12 months. And with 52,825 permutations, these attacks successfully made their way into 209,807 inboxes around the world.

Polymorphic email phishing is a phishing email sent to multiple users where an attacker implements slight but significant and often random changes to an emails’ artefacts — at least one of the following is being changed either randomly or manually/intentionally depending on the attack: Sender name, Sender address, Subject Greeting, Email body or signature.

This strategic approach of hacking has been seen in the wild since at least 2016. At the very beginning, this attack was all about generating “polymorphic URLs”, thousands of different URLs that would lead to phishing or malware delivery pages. However, gone are those days — today, even this attack has even extremely sophisticated, enabling attackers to quickly develop phishing attacks that can easily trick/manipulate and bypass most of the anti-phishing tools.

Example Of Polymorphic Phishing

Suppose you get an email and there is an attached that appears to be a pdf file. And when you fail to identify the email as phishing and open the file, it prompts an update message claiming the tool is not updated. And when you click the update link, it redirects you to a cloned web page that asks you to enter your credentials.

Furthermore, the email spreads like a virus across the company. But the catch here is that every employee would receive the email with a slight yet significant change, which wouldn’t let the employees detect whether its that same email.

The Role Of Dark Web

Behind this sophisticated phishing email attack, the darknet is playing a major role. There are a huge number of tools available on the dark web that help hackers carry out polymorphic phishing attacks on big companies.

According to a source, Over a five-month period, Dr Mike McGuire, Senior Lecturer in Criminology at the University of Surrey and his team analyzed over 70,000 Darknet websites in order to find out what type of tools and services are there.

What they find out through their research is quite surprising as the target companies are big enough. Around 40% of dark web offerings are targeted hacking services that specifically designed to exploit Fortune 500 and FTSE 100 companies.

Even though there were successful takedowns of dark web websites in the past, there are still numerous websites hosted on the dark web that are offering some of the most notorious services. And phishing tools are one among all those services that are gaining significant traction.

Bottom Line

Over the past couple of years, the world has witnessed both — technologies to mitigate cyber threats and technologies to power up cyber threats. Meaning, advancement in technology is not only for the better side, but even the wrongdoers are also making the best use of technology to advance their attacking strategy.

Phishing is a great example — a type of attack that was once termed as not effective and easily detectable, today it has become a major threat. Targeted phishing attacks are increasingly bypassing gateway security controls and are landing right into employees’ mailboxes in every organisation around the globe. And the best way to cope with this is to have a strong and reliable security infrastructure. Also, sessions that train employees on different cyber-attacks.

Download our Mobile App

Harshajit Sarmah
Harshajit is a writer / blogger / vlogger. A passionate music lover whose talents range from dance to video making to cooking. Football runs in his blood. Like literally! He is also a self-proclaimed technician and likes repairing and fixing stuff. When he is not writing or making videos, you can find him reading books/blogs or watching videos that motivate him or teaches him new things.

Subscribe to our newsletter

Join our editors every weekday evening as they steer you through the most significant news of the day.
Your newsletter subscriptions are subject to AIM Privacy Policy and Terms and Conditions.

Our Upcoming Events

15th June | Bangalore

Future Ready | Lead the AI Era Summit

15th June | Online

Building LLM powered applications using LangChain

17th June | Online

Mastering LangChain: A Hands-on Workshop for Building Generative AI Applications

20th June | Bangalore

Women in Data Science (WiDS) by Intuit India

Jun 23, 2023 | Bangalore

MachineCon 2023 India

26th June | Online

Accelerating inference for every workload with TensorRT

MachineCon 2023 USA

Jul 21, 2023 | New York

Cypher 2023

Oct 11-13, 2023 | Bangalore

3 Ways to Join our Community

Telegram group

Discover special offers, top stories, upcoming events, and more.

Discord Server

Stay Connected with a larger ecosystem of data science and ML Professionals

Subscribe to our Daily newsletter

Get our daily awesome stories & videos in your inbox
MOST POPULAR

 5 Android Apps That Were Caught Spying

In this day and age, privacy seems to be about as mythical as unicorns. We can’t help but wonder, how many more popular applications are out there, pulling the wool over our unsuspecting eyes.