www.csoonline.com Open in urlscan Pro
151.101.130.165  Public Scan

URL: https://www.csoonline.com/article/3695075/attacks-increasingly-use-malicious-html-email-attachments.html
Submission: On May 04 via api from TR — Scanned from DE

Form analysis 1 forms found in the DOM

<form class="gsc-search-box gsc-search-box-tools" accept-charset="utf-8">
  <table cellspacing="0" cellpadding="0" role="presentation" class="gsc-search-box">
    <tbody>
      <tr>
        <td class="gsc-input">
          <div class="gsc-input-box" id="gsc-iw-id1">
            <table cellspacing="0" cellpadding="0" role="presentation" id="gs_id50" class="gstl_50 gsc-input" style="width: 100%; padding: 0px;">
              <tbody>
                <tr>
                  <td id="gs_tti50" class="gsib_a"><input autocomplete="off" type="text" size="10" class="gsc-input" name="search" title="search" aria-label="search" id="gsc-i-id1" dir="ltr" spellcheck="false" placeholder="Start Searching"
                      style="width: 100%; padding: 0px; border: none; margin: 0px; height: auto; outline: none;"></td>
                  <td class="gsib_b">
                    <div class="gsst_b" id="gs_st50" dir="ltr"><a class="gsst_a" href="javascript:void(0)" title="Clear search box" role="button" style="display: none;"><span class="gscb_a" id="gs_cb50" aria-hidden="true">×</span></a></div>
                  </td>
                </tr>
              </tbody>
            </table>
          </div>
        </td>
        <td class="gsc-search-button"><button class="gsc-search-button gsc-search-button-v2"><svg width="13" height="13" viewBox="0 0 13 13">
              <title>search</title>
              <path
                d="m4.8495 7.8226c0.82666 0 1.5262-0.29146 2.0985-0.87438 0.57232-0.58292 0.86378-1.2877 0.87438-2.1144 0.010599-0.82666-0.28086-1.5262-0.87438-2.0985-0.59352-0.57232-1.293-0.86378-2.0985-0.87438-0.8055-0.010599-1.5103 0.28086-2.1144 0.87438-0.60414 0.59352-0.8956 1.293-0.87438 2.0985 0.021197 0.8055 0.31266 1.5103 0.87438 2.1144 0.56172 0.60414 1.2665 0.8956 2.1144 0.87438zm4.4695 0.2115 3.681 3.6819-1.259 1.284-3.6817-3.7 0.0019784-0.69479-0.090043-0.098846c-0.87973 0.76087-1.92 1.1413-3.1207 1.1413-1.3553 0-2.5025-0.46363-3.4417-1.3909s-1.4088-2.0686-1.4088-3.4239c0-1.3553 0.4696-2.4966 1.4088-3.4239 0.9392-0.92727 2.0864-1.3969 3.4417-1.4088 1.3553-0.011889 2.4906 0.45771 3.406 1.4088 0.9154 0.95107 1.379 2.0924 1.3909 3.4239 0 1.2126-0.38043 2.2588-1.1413 3.1385l0.098834 0.090049z">
              </path>
            </svg></button></td>
        <td class="gsc-clear-button">
          <div class="gsc-clear-button" title="clear results">&nbsp;</div>
        </td>
      </tr>
    </tbody>
  </table>
</form>

Text Content

Close Ad


cso online
GERMANY
 * United States
 * ASEAN
 * Australia
 * India
 * United Kingdom
 * Germany


×

search
 

More from the Foundry Network

 * About Us |
 * Contact |
 * Republication Permissions |
 * Privacy Policy |
 * Cookie Policy |
 * European Privacy Settings |
 * Member Preferences |
 * Advertising |
 * Foundry Careers |
 * Ad Choices |
 * E-commerce Links |
 * California: Do Not Sell My Personal Info |

 * Follow Us
 * 
 * 
 * 


×

Close
 * HTML smuggling campaigns impersonate well-known brands to deliver malware
 * RELATED STORIES
 * Researchers warn of two new variants of potent IcedID malware loader
 * SPONSORED BY Advertiser Name Here Sponsored item title goes here as designed
 * 5 top threats from 2022 most likely to strike in 2023
 * 5 top threats from 2022 most likely to strike in 2023

 * Home
 * Security
 * Email Security

News Analysis


ATTACKS INCREASINGLY USE MALICIOUS HTML EMAIL ATTACHMENTS


NEW RESEARCH SHOWS THAT UP TO A HALF OF ALL HTML EMAIL ATTACHMENTS ARE
MALICIOUS, AND NOT JUST BECAUSE OF A FEW MASSIVE CAMPAIGNS.

 * 
 * 
 * 
 * 
 * 
 * 
 * 

By Lucian Constantin

CSO Senior Writer, CSO | 3 May 2023 12:34


Rawpixel/Shutterstock



Researchers warn that attackers are relying more on malicious HTML files in
their attacks, with malicious files now accounting for half of all HTML
attachments sent via email. This rate of malicious HTML prevalence is double
compared to what it was last year and doesn't appear to be the result of mass
attack campaigns that send the same attachment to a large number of people.

"When it comes to attack tactics and tools, the fact that something has been
around for a while doesn’t appear to make it any less potent," researchers from
security firm Barracuda Networks said in a new report. "Malicious HTML is still
being used by attackers because it works. Getting the right security in place is
as important now as it has ever been, if not more so."


WHY IS HTML AN ATTACKER FAVORITE?

HTML, the standard markup language for displaying Web content, has many
legitimate uses inside email communications. For example, enterprise users often
receive reports that various applications and tools generate and send by email.
This doesn't make them suspicious when they see this type of attachment and the
attachment type can't be outright banned by email security gateway filters.



HTML is also flexible in terms of what types of attacks it can enable. One of
the most common use cases is credential phishing with attackers crafting HTML
attachments that, when opened, masquerade as the login page for various
services. This can also be dynamic, with the HTML including JavaScript code that
redirects the user to a phishing site. Imagine receiving an email that seems
like an automated notification for a DHL parcel, opening the HTML attachment,
and seeing a copy of the DHL login page.

In other cases, the HTML attachments include links and lures that try to
convince users to download a secondary file that's actually a malware payload.
The benefit for attackers is that this method of malware delivery has a much
higher chance of bypassing the email security gateway compared to attaching a
malware payload directly inside a zip archive or as a different file type. Since
the lure is now in front of the user, if they agree to download the file locally
to their computer, it's up to the endpoint protection solution to detect it, so
attackers have already defeated the first layer of defense.

"However, in some cases seen by Barracuda researchers, the HTML file itself
includes sophisticated malware which has the complete malicious payload embedded
within it, including potent scripts and executables," the researchers said.
"This attack technique is becoming more widely used than those involving
externally hosted JavaScript files."




THE PREVALENCE OF MALICIOUS HTML ATTACHMENTS

Barracuda used its telemetry to perform an analysis in May 2022 and found that
21% of the HTML attachments its products scanned that month were malicious. This
was by far the highest malicious-to-clean ratio of any file type sent via email,
but it progressively got worse since then, reaching 45.7% in March this year.

So, for anyone who receives an HTML attachment via email right now there's a one
in two chance it's malicious. However, to make sure the data is not skewed by a
few massive attacks the researchers also looked at the uniqueness of the files.

The researchers picked two dates from January to March where large spikes of
malicious HTML files were detected, suggesting possible mass attacks. On March
7, the company's products scanned 672,145 malicious HTML artifacts of which
181,176 were different, meaning around a quarter of the attachments were the
result of unique attacks. For the second spike, on March 23, things were much
worse. Of 475,938 malicious HTML detections, 85% or almost nine in ten, were
unique.

"Protection against malicious HTML-based attacks should take into account the
entire email carrying HTML attachments, looking at all redirects, and analyzing
the content of the email for malicious intent," the researchers said.


HOW TO MITIGATE MALICIOUS HTML ATTACHMENTS

The company's recommendation is to choose email security solutions that can
evaluate the entire email context and not just the attachment's contents.
Training employees to spot and report malicious HTML attachments and to be wary
of such attachments from unknown sources is also very important. It's also
important for the company to have incident response tools and processes that
allow removing an attachment from all mailboxes it might have reached once it's
flagged as malicious by the security team.

Using two-factor authentication coupled with zero-trust access solutions that
evaluate not only the credentials, but also the user's device, location, time
zone, and history, can limit breaches even if users fall victim to phishing and
credential theft. Accounts should also have post-login monitoring that can alert
the security team if any suspicious behavior is detected.


Next read this
 * The 10 most powerful cybersecurity companies
 * 7 hot cybersecurity trends (and 2 going cold)
 * The Apache Log4j vulnerabilities: A timeline
 * Using the NIST Cybersecurity Framework to address organizational risk
 * 11 penetration testing tools the pros use

Related:
 * Email Security
 * Phishing
 * Cyberattacks

Lucian Constantin is a senior writer at CSO, covering information security,
privacy, and data protection.

Follow
 * 
 * 
 * 
 * 
 * 

Copyright © 2023 IDG Communications, Inc.

7 hot cybersecurity trends (and 2 going cold)


CSO Online CSO provides news, analysis and research on security and risk
management Follow us
 * 
 * 
 * 
   

 * About Us
 * Contact
 * Republication Permissions
 * Privacy Policy
 * Cookie Policy
 * European Privacy Settings
 * Member Preferences
 * Advertising
 * Foundry Careers
 * Ad Choices
 * E-commerce Links
 * California: Do Not Sell My Personal Info

Copyright © 2023 IDG Communications, Inc.

Explore the Foundry Network descend
 * CIO
 * Computerworld
 * CSO Online
 * InfoWorld
 * Network World













CSO WANTS TO SHOW YOU NOTIFICATIONS

--------------------------------------------------------------------------------

YOU CAN TURN OFF NOTIFICATIONS AT ANY TIME FROM YOUR BROWSER

Accept Do not accept

POWERED BY SUBSCRIBERS