Research

Phishing – the difference an ASCII parser makes

Since my recent blogpost the attackers decided to continue their phishing run and send out more phishing emails.

We received new variants on Wednesday, yesterday and there’s a good chance that we’ll get even more today.

The interesting thing is that the attackers decided to use a fair amount of ASCII in their emails, probably to try and fool spam/virus filters.

Most reports simply talked about emails which seemed to be almost complete gibberish. This seemed strange – why should phishers send out a message which clearly couldn’t have come from a bank?.

One report cleared the matter up – it turns out that the ASCII parts of the message get parsed differently by different parsers.

Here are two images of the same email: one parsed by Outlook Express, the other by Mozilla Thunderbird.

It’s a big difference, isn’t it? And to make matters even stranger, if you forward the message using OE, you’ll get almost the same result as with Thunderbird.

On a slightly different note, this is yet another example of why you should read and write plain text email. With HTML parsing disabled, you’re much less likely to fall for this type of scam because the message simply won’t be displayed.

Phishing – the difference an ASCII parser makes

Your email address will not be published. Required fields are marked *

 

Reports

Lazarus targets defense industry with ThreatNeedle

In mid-2020, we realized that Lazarus was launching attacks on the defense industry using the ThreatNeedle cluster, an advanced malware cluster of Manuscrypt (a.k.a. NukeSped). While investigating this activity, we were able to observe the complete life cycle of an attack, uncovering more technical details and links to the group’s other campaigns.

Sunburst backdoor – code overlaps with Kazuar

While looking at the Sunburst backdoor, we discovered several features that overlap with a previously identified backdoor known as Kazuar. Our observations shows that Kazuar was used together with Turla tools during multiple breaches in past years.

Lazarus covets COVID-19-related intelligence

As the COVID-19 crisis grinds on, some threat actors are trying to speed up vaccine development by any means available. We have found evidence that the Lazarus group is going after intelligence that could help these efforts by attacking entities related to COVID-19 research.

Sunburst: connecting the dots in the DNS requests

We matched private and public DNS data for the SUNBURST-malware root C2 domain with the CNAME records, to identify who was targeted for further exploitation. In total, we analyzed 1722 DNS records, leading to 1026 unique target name parts and 964 unique UIDs.

Subscribe to our weekly e-mails

The hottest research right in your inbox