Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


Researchers, Vendors Gear Up for Whaling Attacks

Increasingly sophisticated phishing exploits target top executives, wealthy end-users

Phishers are developing highly sophisticated methods of targeting high-level executives and wealthy end-users, creating bogus messages that are more convincing than ever before, researchers warn.

The practice of targeting specific organizations or users with false messages ("spear phishing") isn't new. But with practice, phishers are getting better at researching their targets to find the wealthiest and most influential people online -- a practice sometimes called "whaling." And now, they also are using that research to social-engineer messages that are hard to ignore.

"For example, we've seen messages recently that not only call the user by name, but make reference to specific pieces of real estate that the individual owns," says Andres Kohn, vice president of product management at Proofpoint, which researches spam and phishing attacks in support of its messaging security tools.

"In many cases, those references will be made in a message that appears to come from a major government agency or authority, such as the Department of Justice or the IRS," Kohn says. "The phishers will also give the message a sense of immediacy, something the reader needs to act on right away, and a link. When you combine all of those things, it's easy even for a savvy user to be fooled into clicking on the link."

These links usually lead to a convincing-looking Website that extracts further personal data from the user, or it might contain a Trojan or keylogger that enables the attacker to damage or steal information from the user's machine, he says.

To add to their veracity, some phishers now also include a phone number in their message, Kohn reports: "It used to be that phishers never used phone numbers, because they are easy to trace. Now, some of them are using voice-over-IP numbers that can be easily taken down and are difficult to trace."

Users who call the numbers sometimes get an automated system that prompts them to give up additional personal information, Kohn says.

Proofpoint's high-level email security package is designed to help enterprises identify and block sophisticated phishing messages before they get to the user, according to Kohn.

Another security vendor, Iconix, also was talking about the problem of sophisticated, targeted phishing attacks yesterday. "Consumers are being targeted more precisely by cyber criminals with personalized phishing attacks that are increasingly convincing," said Jeff Wilbur, vice president of marketing at Iconix. "Even the latest filters and email authentication checks used by email providers don’t catch all forms of phishing."

Iconix is attacking the "whaling" problem from the sender's side, rather than the recipient's side. In a nutshell, the Iconix Truemark service uses industry-standard technologies such as DKIM, Domain Keys, SPF, and SenderID to verify the authenticity of the sender's message. Then it checks the identification of the email sender against its list of registered senders.

Once an email has passed through these steps, Iconix attaches a Truemark Check-lock icon to the message, verifying that it is a legitimate communication from the sender. If the user has signed up for the service, which is free for recipients, the icon is displayed on the message in the user's inbox.

Iconix has already signed up about 500 sender companies for its service, including Paypal, which announced an agreement with Iconix yesterday.

No matter what defenses they choose, however, enterprises are likely to see an increasing number of whaling and spear phishing attacks coming to their top-level executives in the weeks to come.

"We're definitely predicting an increase in tax-themed attacks as we get deeper into tax season," Kohn says. "We'll see a lot of messages purporting to be from the IRS, as we do every year, but we'll also see a lot of messages that appear to be coming from the online tax services. As more people handle their taxes online, that's a new approach for the phishers."

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message.

  • Iconix Inc.

  • Proofpoint Inc.

    Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio

    Comment  | 
    Print  | 
    More Insights
  • Comments
    Threaded  |  Newest First  |  Oldest First
    Former CISA Director Chris Krebs Discusses Risk Management & Threat Intel
    Kelly Sheridan, Staff Editor, Dark Reading,  2/23/2021
    Security + Fraud Protection: Your One-Two Punch Against Cyberattacks
    Joshua Goldfarb, Director of Product Management at F5,  2/23/2021
    Cybercrime Groups More Prolific, Focus on Healthcare in 2020
    Robert Lemos, Contributing Writer,  2/22/2021
    Register for Dark Reading Newsletters
    White Papers
    Cartoon Contest
    Write a Caption, Win an Amazon Gift Card! Click Here
    Latest Comment: This comment is waiting for review by our moderators.
    Current Issue
    2021 Top Enterprise IT Trends
    We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
    Flash Poll
    Building the SOC of the Future
    Building the SOC of the Future
    Digital transformation, cloud-focused attacks, and a worldwide pandemic. The past year has changed the way business works and the way security teams operate. There is no going back.
    Twitter Feed
    Dark Reading - Bug Report
    Bug Report
    Enterprise Vulnerabilities
    From DHS/US-CERT's National Vulnerability Database
    PUBLISHED: 2021-02-25
    An integer overflow issue was found in the vmxnet3 NIC emulator of the QEMU for versions up to v5.2.0. It may occur if a guest was to supply invalid values for rx/tx queue size or other NIC parameters. A privileged guest user may use this flaw to crash the QEMU process on the host resulting in DoS s...
    PUBLISHED: 2021-02-25
    A flaw was found in keylime 5.8.1 and older. The issue in the Keylime agent and registrar code invalidates the cryptographic chain of trust from the Endorsement Key certificate to agent attestations.
    PUBLISHED: 2021-02-25
    A specific version of the Node.js mongodb-client-encryption module does not perform correct validation of the KMS server’s certificate. This vulnerability in combination with a privileged network position active MITM attack could result in interception of traffic between the Node....
    PUBLISHED: 2021-02-25
    Specific versions of the Java driver that support client-side field level encryption (CSFLE) fail to perform correct host name verification on the KMS server’s certificate. This vulnerability in combination with a privileged network position active MITM attack could result in inte...
    PUBLISHED: 2021-02-25
    The restify-paginate package 0.0.5 for Node.js allows remote attackers to cause a Denial-of-Service by omitting the HTTP Host header. A Restify-based web service would crash with an uncaught exception.