NIST Site Search
Custom Search
[Official NIST.GOV TIME]
Product Research

Advertise on this site
Spear Phishing – Casting a Narrow Net
If you haven't heard of the term “Spear Phishing” you probably don't work for the Department of Defense (DoD). All DoD employees and contractors (Army, Navy, Air Force, Marines, etc.) are now required to complete spear phishing training. What is it and why should you care?No Longer Supported
Spear Phishing is simply as the title of this article indicates, it is the same as phishing but focused on a much smaller audience. A small net to catch just a few, or one, big fish. Often the attack is tailored to a particular individual, office or company. The bait is customized with information familiar, and specific, to the target. Often the attack takes on characteristics of a traditional con. The attacker uses information about you or your company to lower your guard and defeat any skepticism you may have that the email you just received is a scam. The information may be easily obtainable from the Internet, a phone book, or perhaps from a call to the office secretary. Social engineering is often a part of a good spear phishing attack. There is also some sort of bait to convince you that the message isn't just legitimate spam (because even if the sender of the email knows you that doesn't mean you want to open their email).

An attacker may use jargon used by the individual's business or line of work. They may express familiarity with other people within the company and mention them by name. Sometimes they'll reference procedures or forms used by the targets agency. Each of us may think we would never fall for this, but think of the people you work with. Given a personally addressed email that referenced a company specific product or service how many would open an attached file? Especially a MS Word or Excel file (both of which have had exploits recently that can be used to compromise a computer). Probably a large percentage of your coworkers would fall for this.

The goal of a spear phishing attack is often to obtain very specific information. It could be financial information, insider contract information, passwords, sensitive employee data, etc. (Studies show that a large percentage of users are still all too willing to give out their password to someone they don' know that claims to work for the IT department.) If they still fall for that they'll fall for most anything. (See References and Recommendations below)

Scenario 1:
Motivation: Wreak Havoc at a government office
Method: Combined social engineering / spear phishing attack
Details: Attacker finds an employee contact page on the Internet by searching Google for +“employee contacts” +site:gov. This turns up a number of web pages with contacts at various government offices. Attacker settles on a department at XYZ.GOV because not only do they list employee names and email addresses they also list the person's title (many offices still do this). The office also has a Homeland Security role so a successful attack would likely get lots of publicity. The attacker begins by calling a mid-level employee, John, in department YYY saying that he needed to open a trouble ticket for a virus on his computer. John has no idea why this person called his number but promptly gives the person the phone number of the IT Help Desk. Before he hangs up the attack asks John what antivirus he uses and whether he has had any problems before. Attacker then calls the help desk to open a ticket in John's name. While on the phone with the Help Desk the attacker makes friendly and gets this help desk person's name and email address. The attacker now spoofs an email from the Help Desk employee to a few select high level employees at department YYY with the addresses obtained from the web. The email from address is spoofed so that it apparently comes from the Help Desk employee. The email is very convincing as it contains a real name, real phone number for the help desk, even the help desk employee's personal telephone extension. The email also asks recipients to open the attached executable in order to install an antivirus security patch. Of course the attachment is actually a unique backdoor trojan and keylogger. The trojan will not be detectable by the departments antivirus and will install a rootkit that may never be found. After getting login information for the department head the hacker then logs in to several sensitive systems over the course of weeks and makes changes to existing data. The department head's computers are essentially owned by the hacker until they're replaced or completely rebuilt from the ground up.

Scenario 2: (currently being played out)
Motivation: Money
Method: Google harvest / spear phishing attack
Details: Attacker uses an off the shelf email address collection program to harvest email addresses of government employees. These programs are very simple to use and using spidering techniques can collect thousands of targeted email addresses per hour. Attacker uses these addresses to send phishing emails to government employees. The phishing message claims to be from Bank of America (BoA) asking people to update their BoA profile information. The message looks real, is addressed to “Dear Government Employee” and mentions their “government” BoA credit card. Over 1.2 million federal government employees have a BoA credit card and most are use to getting email messages asking them to update their information in some government system or another. Of course once they log in to the system from this email the phishers start running up charges against their government credit card. The Department of Defense specifically addresses this scam in it's spear phishing training that all DoD employees are required to take. But people are still being fooled.

Spear phishing scams are only limited by the attackers imagination. People are just much too likely to be tricked by a phishing email if it contains targeted information familiar to them. We also make it far too easy for attackers by including targeting information on websites. Web pages with information such as a person's email address, job function, title, phone number, mailing address, department name, recent projects they've worked on, client names, etc. are gold mines for the attacker. Employee locators are rich with this type of information and contain lists of thousands of people.

We recently used a government agency employee locator to find an email address of someone in IT security at that office so that we could notify them of a critical vulnerability on their website that was reported to us. When we found an address that said something like we added that as one of the addresses notified. Turned out that address was actually a mailing list. Everyone that had anything to do with IT in that agency received the email! We know because we received hundreds of return receipts. Bad idea to publish that address, in fact mail from the outside shouldn't be allowed to reach such a group (this agency promptly came to the same conclusion). But such an address is perfect spear phishing. Not only does it reach a large targeted audience but the email address even tells you what its used for. Had this been a new unpublished exploit used by an attacker it could have brought that agency down for days and caused immeasurable harm.

  • Training – Though it may not seem as easy as installing a security appliance at the perimeter it is still one of the most effective steps against any social engineering attack. As mentioned above the Department of Defense has mandated it for all DoD employees. Even with all the money and technical know-how they can throw at the problem this was still one of the most important steps.
  • Block inbound message at the perimeter that contain a from address with your own domain (as applicable). Make sure mail from known sources originates from those sources. Eg; If you do a lot of business with a sister organization make sure email from that organization originates from known SMTP servers.
  • Use digital signatures where possible. This is being mandated within DoD and will soon be used throughout the federal government. If an important email is not signed ask the sender to resend it digitally signed. Yes, this can require a large PKI infrastructure but if you are implementing PKI for authentication, HSPD-12, DoD's Common Access Cards (CAC), etc. then by all means start using them within your organization to digitally sign your email. Its the best method for verifying the sender of an email.
  • Use encryption. If only the sender and yourself know the shared secret key then no one else will be able to impersonate one of you to the other. Of course symmetric key encryption (where the key is the same to both encrypt and decrypt a message) becomes very difficult to manage with a large number of people. But its certainly an option. Asymmetric encryption (public / private key) requires the same PKI infrastructure mentioned above or some sort of web of trust to certify the person is who they say they are (see the following description on how the product Pretty Good Privacy (PGP) works).
  • Double up on your current spam defenses. Often times phishing messages originate from compromised computers or botnets. Your anti-spam appliance may have already identified the source as a compromised or rogue SMTP server. Having multiple devices, or services, verifying incoming mail ups the odds of detection.
  • Make sure your users are using either IE7, Firefox 2.0, or Opera 9.1 as those web browsers include some built in protection against known phishing websites. Each of these browsers use technology to compare visited sites against databases of discovered phishing sites. None of these products will offer much protection against true spear phishing since the “narrow net” would probably involve a server that had not yet been discovered. But every layer of protection helps.

  • What is Spear Phishing by Microsoft
  • Spear Phishing by Wikipedia
  • What Is Spear Phishing from Definitions
  • DoD's Spear Phishing Awareness Training – Unclassified PowerPoint but hard to find if you're not part of one of the military Intranets. This link may not work for long so get it while you can, with a little modification it would be great training for any end-user.
  • DoD Information Assurance Awareness – by Defense Information Systems Agency (DISA). Excellent end-user training that can be used by anyone. Takes about 1.5 hours to complete and includes a short test at the end.
  • DoD Battles Spear Phishing – by Federal Computer Week. Real-life spear phishing examples of what the military faces daily. The same techniques can be used against anyone. The argument can be made that every organization or company has something they don't want falling in to the wrong hands.
  • AntiPhishing.Org – A good source of Anti-Phishing information, news, training, whitepapers, and statistics.

Share or Bookmark this Article Using:
No Longer Supported


Posted by on Wednesday 17 January 2007 - 22:05:35 | |printer friendly
Translate to: {GOOGLETRANS}
Google Ads


»CVE-2014-9903 (linux_kernel)
The sched_read_attr function in kernel/sched/core.c in the Linux kernel 3.14-rc before 3.14-rc4 uses ...
»CVE-2014-9904 (linux_kernel)
The snd_compress_check_input function in sound/core/compress_offload.c in the ALSA subsystem in the ...
»CVE-2015-7473 (websphere_mq)
runmqsc in IBM WebSphere MQ 8.x before allows local users to bypass intended queue-manager c ...
»CVE-2015-7987 (airport_base_station_firmware, iphone_os, mac_os_x, mdnsresponder, watchos)
Multiple buffer overflows in mDNSResponder before 625.41.2 allow remote attackers to read or write t ...
»CVE-2015-7988 (airport_base_station_firmware, iphone_os, mac_os_x, mdnsresponder, watchos)
The handle_regservice_request function in mDNSResponder before 625.41.2 allows remote attackers to e ...
CA Release Automation (formerly LISA Release Automation) 5.0.2 before 5.0.2-227, 5.5.1 before 5.5.1- ...
Multiple cross-site scripting (XSS) vulnerabilities in CA Release Automation (formerly LISA Release ...
»CVE-2016-0224 (marketing_platform)
SQL injection vulnerability in IBM Marketing Platform 8.5.x, 8.6.x, and 9.x before allows re ...
»CVE-2016-0229 (marketing_platform)
Cross-site scripting (XSS) vulnerability in IBM Marketing Platform 8.6.x and 9.x before allo ...
»CVE-2016-0233 (marketing_platform)
SQL injection vulnerability in IBM Marketing Platform 8.5.x, 8.6.x, and 9.x before allows re ...
»CVE-2016-0259 (websphere_mq)
runmqsc in IBM WebSphere MQ 8.x before allows local users to bypass an intended +dsp authori ...
Memory leak in queue-manager agents in IBM WebSphere MQ 8.x before allows remote attackers t ...
IBM Spectrum Scale 4.1 before and 4.2 before and General Parallel File System 3.5 be ...
IBM UrbanCode Deploy 6.0.x before, 6.1.x before, and 6.2.x before allows re ...
»CVE-2016-0277 (domino)
Heap-based buffer overflow in the KeyView PDF filter in IBM Domino 8.5.x before 8.5.3 FP6 IF13 and 9 ...

Date published: 2016-06-29T04:50:00Z

»Symantec Releases Security Updates
Original release date: June 29, 2016 Symantec has released security updates to address vulner ...
»IRS Announces Safeguards to Protect Taxpayer Information
Original release date: June 24, 2016 The Internal Revenue Service (IRS) has issued two news r ...
»WordPress Releases Security Update
Original release date: June 22, 2016 WordPress 4.5.2 and prior versions are affected by sever ...
»Apple Releases Security Update
Original release date: June 21, 2016 Apple has released a security update to address a vulner ...
»Google Releases Security Update for Chrome
Original release date: June 17, 2016 Google has released Chrome version 51.0.2704.103 to addr ...
»Adobe Releases Security Updates
Original release date: June 16, 2016 Adobe has released security updates to address vulnerabi ...
»Cisco Releases Security Updates
Original release date: June 15, 2016 Cisco has released security updates to address vulnerabi ...
»VMware Releases Security Updates
Original release date: June 15, 2016 VMware has released security updates to address a vulner ...
»Microsoft Releases June 2016 Security Bulletin
Original release date: June 14, 2016 Microsoft has released 16 updates to address vulnerabili ...
»Adobe Releases Security Updates
Original release date: June 14, 2016 Adobe has released security updates to address vulnerabi ...

Date published: not known

»BSides Denver to take place the day after VB2016
VB2016, the 26th International Virus Bulletin conference, is an exc ...
»VB2015 paper: DDoS Trojan: A Malicious Concept that Conquered the ELF Format
In their VB2015 paper, Peter Kálnai and Jaromír Hořejší look at the ...
»Throwback Thursday: Hyppönen, that Data Fellow / Finnish Sprayer
This week, well known and universally respected industry guru Mikko ...
»VB2015 paper: Economic Sanctions on Malware
Financial pressure can be a proactive and potentially very effectiv ...
»Virus Bulletin's job site for recruiters and job seekers
Virus Bulletin has relaunched its security job vacancy service and ...
»Throwback Thursday: One_Half: The Lieutenant Commander?
In October 1994, a new multi-partite virus appeared, using some of ...
»Advertisements on Blogspot sites lead to support scam
Support scam pop-ups presented through malicious advertisements sho ...
»To make Tor work better on the web, we need to be honest about it
Many websites put barriers in front of visitors who use the Tor net ...
»Paper: How It Works: Steganography Hides Malware in Image Files
A new paper by CYREN researcher Lordian Mosuela takes a close look ...

Date published: not known
Main Menu
· Home
Current Security News
US-CERT Current Activity

» Symantec Releases Security Updates
[29 Jun 2016 09:40am]

» IRS Announces Safeguards to Protect Taxpayer Information
[24 Jun 2016 05:02pm]

» WordPress Releases Security Update
[22 Jun 2016 06:42am]

» Apple Releases Security Update
[21 Jun 2016 06:56am]

» Google Releases Security Update for Chrome
[16 Jun 2016 11:32pm]

» Adobe Releases Security Updates
[16 Jun 2016 07:55pm]

» Cisco Releases Security Updates
[15 Jun 2016 06:32pm]

» VMware Releases Security Updates
[15 Jun 2016 10:40am]

» Microsoft Releases June 2016 Security Bulletin
[14 Jun 2016 11:38am]

» Adobe Releases Security Updates
[14 Jun 2016 11:08am]

US-CERT Alerts

» TA16-144A: WPAD Name Collision Vulnerability
[23 May 2016 05:38am]

» TA16-132A: Exploitation of SAP Business Applications
[11 May 2016 05:31am]

» TA16-105A: Apple Ends Support for QuickTime for Windows; New Vulnerabilities Announced
[14 Apr 2016 01:48pm]

» TA16-091A: Ransomware and Recent Variants
[31 Mar 2016 04:00pm]

» TA15-337A: Dorkbot
[03 Dec 2015 04:40pm]

» TA15-314A: Compromised Web Servers and Web Shells - Threat Awareness and Guidance
[10 Nov 2015 06:12pm]

» TA15-286A: Dridex P2P Malware
[13 Oct 2015 05:23am]

» TA15-240A: Controlling Outbound DNS Access
[28 Aug 2015 11:31am]

» TA15-213A: Recent Email Phishing Campaigns – Mitigation and Response Recommendations
[01 Aug 2015 04:01pm]

» TA15-195A: Adobe Flash and Microsoft Windows Vulnerabilities
[14 Jul 2015 05:13pm]

Computerworld Security

» Security vulnerabilities in Symantec and Norton 'as bad as it gets' warns researcher
[29 Jun 2016 08:17am]

» Facebook may (or may not) suggest friends based on your location
[29 Jun 2016 04:39am]

» Update: Hacker puts 9.3M U.S. patient records up for sale
[28 Jun 2016 03:54pm]

» Resold hard drives on eBay, Craigslist are still ripe with leftover data
[28 Jun 2016 02:50pm]

» Senator stalls intelligence funding bill over surveillance concerns
[28 Jun 2016 02:31pm]

» IDG Contributor Network: The devil is in the details: The importance of tight processes to strong information security
[28 Jun 2016 02:03pm]

» Thousands of hacked CCTV devices used in DDoS attacks
[28 Jun 2016 09:54am]

» IDG Contributor Network: Biometrics is the new cool -- LogMeOnce goes password free
[28 Jun 2016 07:00am]

» Google's Sundar Pichai joins ranks of those hacked by OurMine
[28 Jun 2016 04:15am]

» Senate expansion of FBI surveillance meets obstacle
[28 Jun 2016 04:11am]

» Google’s Sundar Pichai has been hacked; which CEO will be next?
[27 Jun 2016 11:53am]

» Bart ransomware shows it can be effective without sophisticated encryption
[27 Jun 2016 11:17am]

» Report: Security teams plagued by poorly managed identity data
[27 Jun 2016 09:02am]

» IRS kills electronic filing PIN feature due to repeated attacks
[27 Jun 2016 07:47am]

» What Apple users need to know about differential privacy
[27 Jun 2016 07:26am]

Microsoft Security Advisories

» 2880823 - Deprecation of SHA-1 Hashing Algorithm for Microsoft Root Certificate Program - Version: 2.0
[18 May 2016 11:00am]

» 3155527 - Update to Cipher Suites for FalseStart - Version: 1.0
[10 May 2016 11:00am]

» 3152550 - Update to Improve Wireless Mouse Input Filtering - Version: 1.1
[22 Apr 2016 11:00am]

» 3137909 - Vulnerabilities in ASP.NET Templates Could Allow Tampering - Version: 1.1
[10 Feb 2016 11:00am]

» 2871997 - Update to Improve Credentials Protection and Management - Version: 5.0
[09 Feb 2016 11:00am]

» 3123479 - Deprecation of SHA-1 Hashing Algorithm for Microsoft Root Certificate Program - Version: 1.0
[12 Jan 2016 11:00am]

» 3109853 - Update to Improve TLS Session Resumption Interoperability - Version: 1.0
[12 Jan 2016 11:00am]

» 3118753 - Updates for ActiveX Kill Bits 3118753 - Version: 1.0
[12 Jan 2016 11:00am]

» 2755801 - Update for Vulnerabilities in Adobe Flash Player in Internet Explorer and Microsoft Edge - Version: 53.0
[05 Jan 2016 11:00am]

» 3057154 - Update to Harden Use of DES Encryption - Version: 1.1
[08 Dec 2015 11:00am]

» 3123040 - Inadvertently Disclosed Digital Certificate Could Allow Spoofing - Version: 1.0
[08 Dec 2015 11:00am]

» 3119884 - Inadvertently Disclosed Digital Certificates Could Allow Spoofing - Version: 1.0
[30 Nov 2015 11:00am]

» 3108638 - Update for Windows Hyper-V to Address CPU Weakness - Version: 1.0
[10 Nov 2015 11:00am]

» 3042058 - Update to Default Cipher Suite Priority Order - Version: 1.1
[13 Oct 2015 11:00am]

» 3097966 - Inadvertently Disclosed Digital Certificates Could Allow Spoofing - Version: 2.0
[13 Oct 2015 11:00am]


» Researchers Sue the Government Over Computer Hacking Law
[29 Jun 2016 08:00am]

» Uh Oh: Google Expands Its Ad Tracking. But, Yay: It’s Opt-In
[28 Jun 2016 11:01am]

» Peter Thiel Has Only Pushed the Next Gawker Underground
[28 Jun 2016 11:00am]

» Clever Attack Uses the Sound of a Computer’s Fan to Steal Data
[28 Jun 2016 05:00am]

» Meet OurMine, the ‘Security’ Group Hacking CEOs and Celebs
[27 Jun 2016 03:46pm]

» So Hey You Should Stop Using Texts for Two-Factor Authentication
[26 Jun 2016 05:00am]

» Security News This Week: Brexit Edition (Hey, at Least Bitcoin Is OK)
[25 Jun 2016 05:00am]

» A Bug in Chrome Makes It Easy to Pirate Movies
[24 Jun 2016 05:00am]

» Hey, Congress, Here’s How You Use Periscope
[22 Jun 2016 02:52pm]

» House Dems Take to Twitter to Let You See Their Gun-Control Sit-In
[22 Jun 2016 11:08am]

Network World Security

» ACLU lawsuit challenges US computer hacking law
[29 Jun 2016 09:36am]

» Wormable flaws in Symantec products expose millions of computers to hacking
[29 Jun 2016 08:55am]

» Terrorism database of 2.2 million people leaked, a blacklist used by governments, banks
[29 Jun 2016 07:03am]

» Dangerous keyboard app has more than 50 million downloads
[29 Jun 2016 06:00am]

» Buyer’s Guide to 9 multi-factor authentication products
[06 Jun 2016 04:00am]

» 5 trends shaking up multi-factor authentication
[06 Jun 2016 04:00am]

» 9-vendor authentication roundup: The good, the bad and the ugly
[06 Jun 2016 04:00am]

» Review: Hot new tools to fight insider threats
[31 May 2016 04:00am]

» 3 top tools to fight insider threats
[31 May 2016 04:00am]

» SIEM review: Splunk, ArcSight, LogRhythm and QRadar
[09 May 2016 02:00pm]

» What users love (and hate) about 4 leading firewall solutions
[25 Apr 2016 01:48pm]

» 10 no-cost home security mobile apps worth a download
[01 Apr 2016 06:39am]

» 7 VPN services for hotspot protection
[14 Mar 2016 04:00am]

» Wormable flaws in Symantec products expose millions of computers to hacking
[29 Jun 2016 08:55am]

» Terrorism database of 2.2 million people leaked, a blacklist used by governments, banks
[29 Jun 2016 07:03am]


More IT Security
News Feeds
More Sponsors

Advertise on this site
RSS Feeds
Our news can be syndicated by using these rss feeds.
rdf is in no way connected to the U.S. government site

This site is © John Herron, CISSP. All Rights Reserved.

Please visit daily to stay up to date on all your IT Security compliance issues. -
Hosted by BlueHost. We've never had a better hosting company.