Credential Phishing

What are

Credential Phishing

Attacks?

One of the most common types of email-based cyber attacks, credential phishing emails are designed to appear as legitimate communication regarding an existing online account. A credential phishing email message generally contains a link to a malicious website designed to resemble a legitimate login page, soliciting a victim to submit in their  credentials, usually under the pretext or account authentication or identity validation. Once a victim submits their credentials into the phishing page, they are sent to the attacker, effectively compromising their account.

Many phishing websites are difficult to distinguish from their legitimate counterparts, with only a few subtle differences from the original. The process for making one of these websites can include cloning the real website, adjusting the login page to point to a credential-stealing script, and bundling the files together in a zipped file known as a “phishing kit”. A phishing kit is essentially a collection of files needed to stand up a fully-functioning phishing site. Once a phishing kit is uploaded to the attacker’s designated phishing website, it is unzipped and the phishing site is effectively live. Now the only thing left for the attacker to do is to send out emails impersonating the target containing links to their phishing website and wait for the credentials to roll in.

Prior to 2017, most credential phishing attacks targeted individual credentials at financial institutions; however, as other cyber attacks shifted focus from individual to enterprise targets, so did credential phishing. Enterprise credentials can be used for a wide variety of purposes, which makes them much more valuable to cybercriminals. For example, employee credentials can be used to collect payment-related communications as part of the initial stage of a business email compromise (BEC) attack. Or used to pivot to other cloud applications and steal sensitive documents. Or used as a platform to send additional phishing campaigns from legitimate infrastructure. This flexibility is why enterprise credentials are often a golden ticket for cybercriminals and why credential phishing attacks represent a significant risk to all organizations.

Recent Examples of

Credential Phishing

Attacks

Expired Account Credential Phishing Attack

Subject:
"
[Target Company Name] Urgent deactivation alert
"
Attack Date:
June 28, 2022

This link-based attack uses a personalized email subject, a maliciously registered domain, and an expired account theme to steal credentials.

No items found.
See Attack Details

DHL Fake Shipping Notification HTML Attachment Credential Phishing Attack

Subject:
"
Shipment Details
"
Attack Date:
June 28, 2022

This payload-based attack impersonates DHL using a free webmail account and a fake shipping notification theme to steal credentials.

No items found.
See Attack Details

Payment Inquiry Credential Phishing Attack

Subject:
"
RE: PO-18009612 Payment Statement
"
Attack Date:
June 28, 2022

This link-based attack impersonates a vendor/supplier using an external compromised account and a payment inquiry theme to steal credentials.

No items found.
See Attack Details