Bad building blocks: a new and unusual phishing campaign. [Research Saturday]

Published: June 5, 2021, 5 a.m.

Guest Karl Sigler of Trustwave's SpiderLabs joins Dave Bittner to talk about their research: "Hidden Phishing at Free JavaScript Site". The research describes an interesting phishing campaign SpiderLabs encountered recently. In this campaign, the email subject pertains to a price revision, followed by some numbers. There is no email body, but there is an attachment about an \u201dinvestment.\u201d The attachment\u2019s convoluted filename contains characters the file-naming convention doesn\u2019t allow, notably the vertical stroke, \u201c|.\u201d Even though "xlsx" is in the filename, double-clicking the attachment will prompt the user to open it with the default web browser. Thus, the file indeed appears to be an HTML document. Of course, it\u2019s malicious.\nThe research can be found here:\nHTML Lego: Hidden Phishing at Free JavaScript Site\n\nLearn more about your ad choices. Visit megaphone.fm/adchoices