top of page

Oh wow, let's throw the kitchen sink at this Phishing attempt šŸ¤¦ā€ā™‚ļø

  • Writer: OpaCyber
    OpaCyber
  • Apr 17, 2024
  • 2 min read

Here's one discovered last week in the telemetry at the massive Security Operations Centre (SOC) here at OpaCyber Security's Global Headquarters šŸ˜‰


I think they may have gone a little OTT on the social engineering 🤣


This one was slightly unusual as there was absolutely no text in the body of the email, just a PDF attachment


Here is the avalanche of social engineering red flags 🚩:


ree

1ļøāƒ£ Office365-closure Document (Oh no!) 🚩 Fear. Also perhaps 🚩 Authority (it is supposed to be from Microsoft!)

2ļøāƒ£ 🚩 Fear and 🚩 Urgency

3ļøāƒ£ 🚩 Fear, or you might go the other way and think 🚩 Liking (someone is giving me the way out of this predicament)

4ļøāƒ£ 🚩 Fear

5ļøāƒ£ 🚩 Fear

6ļøāƒ£ (Expired?. I've been trying to remember if I know any 2FA application that expires. So far I've come up with a big fat zero 🤣) 🚩 Fear and 🚩 Urgency

7ļøāƒ£ (Outdated?) 🚩 Fear and 🚩 Urgency

8ļøāƒ£ (bad grammar, tsk, tsk 🤣) The 1st line is 🚩 Fear but the 2nd, again, could be 🚩 Liking ("Oh my, how helpful!")


and lastly:


9ļøāƒ£ after all that work, the link didn't work šŸ¤¦ā€ā™‚ļø (of course it may have been taken down between detection and investigation) Final 🚩 is that the domain was only created two days before the phish was received. Not something you might know how to check but just FYI šŸ˜‰ (also, note that the domain contains microst not microsoft)


This attempt was reported as a Phish by the recipient as they receive regular Security Awareness Training and Simulated Phishing from OpaCyber Security. How good would you or your staff be at spotting something similar? If that is a concern and you would like to explore solutions, get in touch

Ā 
Ā 
bottom of page