TTPwire Vol. 1 · MITRE ATT&CK·Tagged

← All stories

F5 Labs

Fighting Back Against Phishing and Fraud—Part 1

2019-01-17 · Read original ↗

ATT&CK techniques detected

8 predictions
T1566.002Spearphishing Link
99%
"and web filtering - controlling which certificate authorities may create certificates on your behalf figure 1. examples of tools, protocols, and methods useful in combatting phishing ( presented within the nist cybersecurity framework ( csf ) ). the most common initial vector for…"
T1566.002Spearphishing Link
93%
"of retailers and shipping services while income tax season sees the focus shift to government websites. her majesty ' s revenue and customs ( hmrc ), the uk government agency responsible for collecting income tax, is the most phished brand in the country. fake emails purporting t…"
T1566.002Spearphishing Link
93%
"fighting back against phishing and fraud — part 1 this is the first in a series of articles aimed at helping organisations understand how to protect their business and their brand from phishing and fraud attacks. many protocols and tools — some new, some old — exist that can help…"
T1583.001Domains
83%
"global top - level domains ( gtlds ) such as. com and. net appear in the middle of the address. internationalized domain name. by making use of non - ascii character sets and the fact that some alphabets have similar looking characters, an attacker can register a domain that look…"
T1566.002Spearphishing Link
81%
"according to the f5 labs report, apple is one of the top ten phished ( impersonated ) sites by attackers. not surprisingly, the centsys. io database lists 107, 505 certificates that contain the word “ apple, ” 45 % of which were created by users of the free and automated let ' s …"
T1583.001Domains
77%
"cases, a vulnerability of the target organisations website, such as an open redirect3 can allow the attacker to create malicious links that actually make use of legitimate domains. in the following example, a vulnerability on a banking website allows redirections to external doma…"
T1583.001Domains
75%
"and 2 ), many will register a domain or subdomain that includes the domain name or brand name of the targeted organisation ( methods 3, 4 and 5 ). it is for this attack vector that certificate transparency ( ct ) comes in useful. in our next blog, we ’ ll look at ct in more detai…"
T1588.004Digital Certificates
34%
"yourbank. com - attacker. com in addition to compromising your registrar, attackers will monitor the use of subdomains. often a subdomain will be used to point to a third - party site such as github or wordpress. if the relevant github or wordpress subscription lapses, then it ma…"

Summary

Using existing protocols and tools to begin building a robust phishing and fraud mitigation strategy.