Sharing information is an important method to raise awareness of any potential issue. With the addition of practical advice, the reader can identify the relevance of that information and its usefulness to mitigate an issue.
Reading this article again and again I keep on focussing on aspects that haven’t been addressed – of course there’s only so much space that articles can utilise.
So herein lies some practical information that I believe is important to several stakeholders, namely:
Consumer – the reader of the article and specifically those in the UK that obviously would receive HMRC emails – FYI this organisation is the country’s tax department.HMRC themselves – this is the PRIMARY brand under attack by cyber criminals, andUniversity of Oklahoma – this is the SECONDARY brand under attack – why so ? See below it will become clearer.
For convenience, I have attached the image of the phishing email that the article sourced from Malwarebytes.
As part of any analysis conducted by any Security Operations Centre, I would hope that they look at more than just the phishing link – item 1 in the above image.
Equally important is item 2 – “display name” and also item 3 – “Email address” – both also known as the RFC5322.FROM address.
The display name is what we see when we use Outlook email client or similar.
The display name is just text and is unfortunately not policed or validated as part of the email standard. This is what we see in our email client such as Outlook. This element is an important piece of the overall email that formulates our perception that the email is real of fake. We covered a simple technique to overcome this issue in the aptly named “Simple Techniques to mitigate Business Email Compromise” available here. By previewing or opening the email, we can see the original email address – item 3.
The email address in item 3 is also a text field and unlike item 2 “display name”, this field can be policed and validated thanks to the DMARC standard (RFC 7489). Additionally, many email inbound processing gateways, Cisco, Barracuda, Fireeye, Symantec, etc may also perform a reputation check on this field. This is the reason why cyber criminals use a valid domain name in the field to leverage the reputation of well known email domain with the hope of sailing through the email verification checks.
Let’s take it back to that image and what other actions can be taken:
Government – HMRC —wyxfijhi–hkrptjiiqo–aau57lz2ak3@ou.edu
Spend the little extra time to open the email and see the email address.
I’m sure that I have armed most readers of this article with some useful and simple insights. I’m sure now we will do the right thing and pay it forward with your friends and colleagues.
by Con Lokos