Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


Researchers, Vendors Gear Up for Whaling Attacks

Increasingly sophisticated phishing exploits target top executives, wealthy end-users

Phishers are developing highly sophisticated methods of targeting high-level executives and wealthy end-users, creating bogus messages that are more convincing than ever before, researchers warn.

The practice of targeting specific organizations or users with false messages ("spear phishing") isn't new. But with practice, phishers are getting better at researching their targets to find the wealthiest and most influential people online -- a practice sometimes called "whaling." And now, they also are using that research to social-engineer messages that are hard to ignore.

"For example, we've seen messages recently that not only call the user by name, but make reference to specific pieces of real estate that the individual owns," says Andres Kohn, vice president of product management at Proofpoint, which researches spam and phishing attacks in support of its messaging security tools.

"In many cases, those references will be made in a message that appears to come from a major government agency or authority, such as the Department of Justice or the IRS," Kohn says. "The phishers will also give the message a sense of immediacy, something the reader needs to act on right away, and a link. When you combine all of those things, it's easy even for a savvy user to be fooled into clicking on the link."

These links usually lead to a convincing-looking Website that extracts further personal data from the user, or it might contain a Trojan or keylogger that enables the attacker to damage or steal information from the user's machine, he says.

To add to their veracity, some phishers now also include a phone number in their message, Kohn reports: "It used to be that phishers never used phone numbers, because they are easy to trace. Now, some of them are using voice-over-IP numbers that can be easily taken down and are difficult to trace."

Users who call the numbers sometimes get an automated system that prompts them to give up additional personal information, Kohn says.

Proofpoint's high-level email security package is designed to help enterprises identify and block sophisticated phishing messages before they get to the user, according to Kohn.

Another security vendor, Iconix, also was talking about the problem of sophisticated, targeted phishing attacks yesterday. "Consumers are being targeted more precisely by cyber criminals with personalized phishing attacks that are increasingly convincing," said Jeff Wilbur, vice president of marketing at Iconix. "Even the latest filters and email authentication checks used by email providers don’t catch all forms of phishing."

Iconix is attacking the "whaling" problem from the sender's side, rather than the recipient's side. In a nutshell, the Iconix Truemark service uses industry-standard technologies such as DKIM, Domain Keys, SPF, and SenderID to verify the authenticity of the sender's message. Then it checks the identification of the email sender against its list of registered senders.

Once an email has passed through these steps, Iconix attaches a Truemark Check-lock icon to the message, verifying that it is a legitimate communication from the sender. If the user has signed up for the service, which is free for recipients, the icon is displayed on the message in the user's inbox.

Iconix has already signed up about 500 sender companies for its service, including Paypal, which announced an agreement with Iconix yesterday.

No matter what defenses they choose, however, enterprises are likely to see an increasing number of whaling and spear phishing attacks coming to their top-level executives in the weeks to come.

"We're definitely predicting an increase in tax-themed attacks as we get deeper into tax season," Kohn says. "We'll see a lot of messages purporting to be from the IRS, as we do every year, but we'll also see a lot of messages that appear to be coming from the online tax services. As more people handle their taxes online, that's a new approach for the phishers."

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message.

  • Iconix Inc.

  • Proofpoint Inc.

    Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio

    Comment  | 
    Print  | 
    More Insights
  • Comments
    Newest First  |  Oldest First  |  Threaded View
    NSA Appoints Rob Joyce as Cyber Director
    Dark Reading Staff 1/15/2021
    Register for Dark Reading Newsletters
    White Papers
    Cartoon Contest
    Write a Caption, Win an Amazon Gift Card! Click Here
    Latest Comment: This comment is waiting for review by our moderators.
    Current Issue
    2020: The Year in Security
    Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
    Flash Poll
    Assessing Cybersecurity Risk in Today's Enterprises
    Assessing Cybersecurity Risk in Today's Enterprises
    COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
    Twitter Feed
    Dark Reading - Bug Report
    Bug Report
    Enterprise Vulnerabilities
    From DHS/US-CERT's National Vulnerability Database
    PUBLISHED: 2021-01-21
    Kubernetes Secrets Store CSI Driver Vault Plugin prior to v0.0.6, Azure Plugin prior to v0.0.10, and GCP Plugin prior to v0.2.0 allow an attacker who can create specially-crafted SecretProviderClass objects to write to arbitrary file paths on the host filesystem, including /var/lib/kubelet/pods.
    PUBLISHED: 2021-01-21
    Kubernetes Secrets Store CSI Driver versions v0.0.15 and v0.0.16 allow an attacker who can modify a SecretProviderClassPodStatus/Status resource the ability to write content to the host filesystem and sync file contents to Kubernetes Secrets. This includes paths under var/lib/kubelet/pods that conta...
    PUBLISHED: 2021-01-21
    Kubernetes CSI snapshot-controller prior to v2.1.3 and v3.0.2 could panic when processing a VolumeSnapshot custom resource when: - The VolumeSnapshot referenced a non-existing PersistentVolumeClaim and the VolumeSnapshot did not reference any VolumeSnapshotClass. - The snapshot-controller crashes, ...
    PUBLISHED: 2021-01-21
    Kubernetes Java client libraries in version 10.0.0 and versions prior to 9.0.1 allow writes to paths outside of the current directory when copying multiple files from a remote pod which sends a maliciously crafted archive. This can potentially overwrite any files on the system of the process executi...
    PUBLISHED: 2021-01-21
    Kubernetes API server in all versions allow an attacker who is able to create a ClusterIP service and set the spec.externalIPs field, to intercept traffic to that IP address. Additionally, an attacker who is able to patch the status (which is considered a privileged operation and should not typicall...