• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite
Home  /  Phishing  /  Are industrial whales getting massacred by spear-phishing?
Are industrial whales getting massacred by spear-phishing?
28 July 2020

Are industrial whales getting massacred by spear-phishing?

Written by Seqrite
Seqrite
Phishing

Supply chains and industrial enterprises are being targeted through a series of ongoing spear-phishing attacks. This recent campaign, observed on systems within Germany, United States and Japan thus far, operates through the obfuscation of malware on public, legitimate sources.

Sophisticated attack chain

The attack chain is sufficiently drawn-out to escape detection. It starts through phishing emails that have been tailored and customized for each victim. These phishing emails urge the respondent to open the attached Excel document; on opening the document, users are asked to enable active content, triggering a malicious PowerShell script. On execution of the script, the code accesses a public image hosting service and proceeds to download an image which initiates the data-extraction procedure.

A unique attribute of this specialized spear-phishing campaign is that data is hidden in the downloaded image and is then later processed by the malware. This is a tactic called steganography which is defined as the practice of concealing specific data inside another piece of data. By hiding the data inside the image, the attackers can evade cybersecurity solutions that scan enterprise perimeters.

Analysis of this spear-phishing campaign observed that this is an extremely methodical and targeted attack. The original phishing emails are tailored to the specific targets – users in Japan received emails in Japanese with the attachment containing the malicious macro.

Unique in its attack capability

While researchers have found variants of this attack since 2018, this new variation is unique because of its affinity for industrial enterprises and supply chains. Mostly industrial enterprises have been attacked through this campaign so far. With the manufacturing sector already seeing a fundamental disruption in revenues due to the ongoing COVID-19 pandemic, this is another major challenge and could cause further problems, if not treated properly.

Secondly, as noted earlier, the execution of this phishing campaign is conducted through steganographic tactics by being embedded in images. This makes it impossible for cybersecurity solutions to detect and block malware. By using a decryption key for the malicious payload, it becomes even more difficult for security administrators to analyze and block the malware.

However, industrial enterprises should not panic but follow a set of security recommendations to ensure maximum protection:

  • Ensure employees are educated about spotting and reporting phishing campaigns. Periodic awareness in the form of information campaigns should be conducted so that employees are aware of the common tactics criminal use to trick them
  • As much as possible, macros should be restricted in Microsoft Office documents to lower the vulnerability threshold
  • The importance of strong authentication controls cannot be underemphasized. Employees, especially senior leaders, must be regularly reminded to maintain strong passwords for their user accounts and to regularly change them. Good password hygiene goes a long way in preventing these kinds of spear-phishing attacks.
  • If not already done, install and maintain an integrated cybersecurity solution with features such as anti-phishing and anti-virus. It is essential to update this cybersecurity solution regularly to ensure it is updated with the latest patches.

Seqrite Endpoint Security integrates a range of powerful features such as phishing & spam protection, Antivirus, Anti Ransomware & Email Protection to help industrial enterprises and other organizations ensure complete security and control.

 Previous PostBlue Mockingbird’ threat group targets servers in India for Cry...
Next Post  Is your router exposed to cyber threats? Here is how to safeguard...
Seqrite

About Seqrite

Follow us for the latest updates and insights related to security for enterprise networks. Subscribe to our newsletter to stay...

Articles by Seqrite »

Related Posts

  • Goodbye HTA, Hello MSI: New TTPs and Clusters of an APT driven by Multi-Platform Attacks

    April 8, 2025
  • SVC New Stealer on the Horizon

    March 21, 2025
  • QR Code Phishing (Quishing) Attacks: How to Spot & Prevent Them

    March 18, 2025
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (322) cyber security (31) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (11) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (107) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies