TTPwire Vol. 1 · MITRE ATT&CK·Tagged

← All stories

Huntress

Phishing Email Examples: 5 Scams You Should Know | Huntress

2023-10-18 · Read original ↗

ATT&CK techniques detected

16 predictions
T1566.002Spearphishing Link
98%
"organizations will never ask for such sensitive information via email. - suspicious links and attachments : phishing emails contain links or attachments that, when clicked, may lead to malicious websites or download malware onto your device. these links often appear legitimate bu…"
T1566.002Spearphishing Link
98%
"the qr code con this is a relatively newer tactic that leverages the use of qr codes in order to bypass url scanning. in this example, the email notifies the user that their messages are quarantined until they scan the code to complete a security verification. how it works : - in…"
T1566.002Spearphishing Link
93%
"looks like chase bank, where they would enter their banking login details … straight into the attacker ’ s hands. social engineering tactics used : - fear and urgency play a significant role here. by impersonating a trusted source, the threat actors count on the user ’ s anxiety …"
T1566.002Spearphishing Link
87%
"watch for : - check the sender. verify the sender ' s email address and name. be cautious if it doesn ' t match the official domain of the organization or if there are typos or special characters in those fields. - beware of urgency. if the email creates a sense of urgency, espec…"
T1566Phishing
86%
"phishing email examples : 5 scams you should know | huntress email is a cornerstone of communication today, but it ’ s also a favorite attack vector of threat actors. phishing is a deceptively simple but highly effective technique used by threat actors to obtain sensitive informa…"
T1566.002Spearphishing Link
71%
"account. social engineering tactics used : - in this case, fear is the driving force. fear of a compromised paypal account is a nightmare for many users. additionally, the email convincingly impersonates paypal, making it seem like a genuine security alert from the platform. exam…"
T1598.003Spearphishing Link
70%
"are regarded as one of the largest cyber threats organizations face today. they are fast, effective, and cannot be stopped with technology alone. how phishing emails work to phish is to trick and deceive. in order to infiltrate an inbox or carry out their goal, threat actors will…"
T1566Phishing
56%
"are regarded as one of the largest cyber threats organizations face today. they are fast, effective, and cannot be stopped with technology alone. how phishing emails work to phish is to trick and deceive. in order to infiltrate an inbox or carry out their goal, threat actors will…"
T1598Phishing for Information
54%
"are regarded as one of the largest cyber threats organizations face today. they are fast, effective, and cannot be stopped with technology alone. how phishing emails work to phish is to trick and deceive. in order to infiltrate an inbox or carry out their goal, threat actors will…"
T1598Phishing for Information
53%
"be especially effective when targeting employees of a startup. actually, this is a real phishing simulation we ’ ve sent as part of huntress ’ internal security awareness training. and truth be told, this one has been by far the most effective. how it works : - if a threat actor …"
T1598Phishing for Information
50%
"phishing email examples : 5 scams you should know | huntress email is a cornerstone of communication today, but it ’ s also a favorite attack vector of threat actors. phishing is a deceptively simple but highly effective technique used by threat actors to obtain sensitive informa…"
T1566.002Spearphishing Link
43%
"are regarded as one of the largest cyber threats organizations face today. they are fast, effective, and cannot be stopped with technology alone. how phishing emails work to phish is to trick and deceive. in order to infiltrate an inbox or carry out their goal, threat actors will…"
T1566Phishing
42%
"account. social engineering tactics used : - in this case, fear is the driving force. fear of a compromised paypal account is a nightmare for many users. additionally, the email convincingly impersonates paypal, making it seem like a genuine security alert from the platform. exam…"
T1657Financial Theft
42%
"looks like chase bank, where they would enter their banking login details … straight into the attacker ’ s hands. social engineering tactics used : - fear and urgency play a significant role here. by impersonating a trusted source, the threat actors count on the user ’ s anxiety …"
T1566.003Spearphishing via Service
39%
"are regarded as one of the largest cyber threats organizations face today. they are fast, effective, and cannot be stopped with technology alone. how phishing emails work to phish is to trick and deceive. in order to infiltrate an inbox or carry out their goal, threat actors will…"
T1566.002Spearphishing Link
35%
"be especially effective when targeting employees of a startup. actually, this is a real phishing simulation we ’ ve sent as part of huntress ’ internal security awareness training. and truth be told, this one has been by far the most effective. how it works : - if a threat actor …"

Summary

Explore the art of phishing, learn how to spot common phishing scams and red flags, and understand the importance of security awareness training.