Tactics and Techniques Used
Section Introduction
Overview of tactics and techniques used to make phishing emails appear legitimate, increase engagement, and evade detection by security tools.
#Spear Phishing
A targeted phishing attack that uses reconnaissance and OSINT to craft highly convincing, personalized emails for a specific individual or group.
Characteristics
Tailored content based on target’s personal/professional information
Increases likelihood of clicking links or opening attachments
May use additional techniques such as typosquatting or sender spoofing to appear legitimate
Example Scenario
Attacker targets employee at
AcmeCorp.local
Finds target’s LinkedIn profile → identifies colleagues
Reverse-image search reveals Facebook account with public friends and interests
Crafts email referencing real hobbies/interests to increase trust
Includes malicious attachment to install a backdoor for remote access
Uses social engineering (e.g., impersonating a known contact) to boost credibility
Impersonation
A phishing tactic where the attacker pretends to be a trusted person — such as a friend, colleague, or senior leader — to increase the likelihood of the target acting on the request.
Characteristics
Exploits authority bias — employees may comply faster when requests come from higher-ranking individuals
Can be combined with spear phishing for higher success rates
Common impersonation targets: CEO, CFO, managers, directors
Example Scenario (as shown in diagram)
Malicious actor sends email posing as company CEO (“James”) to Finance employee (“Robert”)
Email requests urgent transfer of £5000 to “secure a deal”
Robert, believing request is legitimate, transfers funds to attacker-controlled account
Attacker receives payment, bypassing normal approval or verification
Key Points
Often time-sensitive or urgent to discourage verification
May use spoofed email addresses or lookalike domains
Best defenses:
Verification via a separate communication channel
Policies for confirming financial transactions
Training staff to recognize authority-based phishing tactics
Typosquatting and Homographs
Two domain-based phishing tactics that visually imitate legitimate domains or email addresses to deceive recipients.
Typo Squatting
Registers domains with minor spelling variations of a legitimate domain
Examples (based on legitimate
SecureOps.local
):SecurltyOps.local
(lowercase “L” replacing “I”)SecureOpps.local
(extra “P” in “Ops”)SecurOps.local
(missing “e” in “Secure”)
Can be used for:
Hosting phishing sites
Creating convincing phishing email addresses
Defense:
Monitor or register common misspellings of company domain
Train staff to scrutinize sender addresses
Example Scenario:
Legitimate domain:
AcmeCorp.local
Attacker registers:
AcmeCorpp.local
Creates address
chloe.wood@AcmeCorpp.local
Sends email to new HR employee impersonating senior HR manager, requesting sensitive employee information about another staff member
Homoglyphs
Exploits Unicode characters that look visually identical but have different underlying code points
Examples:
AсmeCorp.local
— first “c” is Cyrillic “с” instead of Latin “c`PayPaⅼ.SecureMail.net
— last “l” is a lowercase L from a different script
Enables creation of lookalike domains that are impossible to distinguish by sight
Safe Detection Methods:
# Display Unicode code points for each character in the domain
echo "AсmeCorp.local" | hexdump -C
00000000 41 d1 81 6d 65 43 6f 72 70 2e 6c 6f 63 61 6c 0a |A..meCorp.local.|
00000010
# (d1 81 = Cyrillic “с”, different from Latin “c”)
# Use 'idn2' to reveal the punycode representation of an IDN
idn2 "AсmeCorp.local"
xn--meCorp-iva.local
In browsers, hover over the link and inspect the status bar or right-click → “Copy Link” → paste into a plain text editor to reveal the true domain.
Security gateways can block IDNs from untrusted sources or convert them to punycode for inspection.
Sender Spoofing
A phishing tactic where the From address is forged to appear as if the email is coming from a trusted sender, increasing the likelihood that the recipient will interact with the message. Commonly paired with credential harvester campaigns.
How It Works
SMTP allows the From field to be set to any value — no verification at sending
Attacker forges a trusted sender’s address to bypass recipient suspicion
Example 1 – FROM Address
Target:
james.smith@AcmeCorp.local
Attacker forges From address as
ServiceDesk@AcmeCorp.local
Includes link to an Office365 credential harvester
Victim believes the email is from IT and enters their credentials
Detection:
Check the sending server IP (e.g.,
X-Originating-IP
header)Perform WHOIS/IP lookup to confirm if server belongs to the claimed organization
Example 2 – FROM Address with Reply-To
Attacker sets From address as
contact@MailOps.net
to impersonate a trusted senderSets Reply-To address as
helpdesk.support@SecureMail.net
(attacker-controlled)Victim replies → response goes to attacker’s mailbox
Detection:
Compare From and Reply-To headers
Block attacker-controlled Reply-To addresses at the email gateway
HTML Styling
How phishers use branded HTML (logos, colors, buttons, layout) to make emails look legitimate and increase clicks on malicious links or attachments.
Why Attackers Use Styling
Mimics trusted brands and internal templates to lower suspicion
Hides malicious links behind buttons and styled anchors
Uses layout tricks (tables, divs) to place urgent warnings/promos prominently
Common Elements You’ll See
Logos and header banners sourced from attacker-controlled CDNs
Buttons using
<a>
tags styled as CTAs (“Update Payment”, “Verify Account”)Tables for precise layout (common in marketing templates)
Inline CSS to control fonts, colors, spacing and to bypass some scanners
Quick Tag Reference
<a>…</a>
: hyperlink text or buttons to an external URL<table>…</table>
: structure and spacing of content blocks<b>…</b>
,<i>…</i>
,<u>…</u>
: emphasis (bold/italic/underline)<img src="…">
: logos/tracking pixels (sometimes 1×1 invisible)
Example: Decode HTML from a Base64 Email Section
# Decode a base64-encoded HTML snippet from an email
echo 'UEhUTUwgc25pcHBldCBleGFtcGxlOiA8aHRtbD48Ym9keT48aDE+QWNtZUNvcnAgQWNjb3VudCBOb3RpY2U8L2gxPjwvYm9keT48L2h0bWw+' | base64 -d
<html><body><h1>AcmeCorp Account Notice</h1></body></html>
Shows how to safely view encoded HTML content without opening it in a browser.
Attachments
Phishing campaigns often use attachments to deliver malware, trick users into revealing information, or direct them to malicious websites. Common categories include:
Non-malicious files for social engineering — e.g., fake invoices, letters, images
Non-malicious files with malicious hyperlinks — e.g., PDFs linking to phishing sites
Malicious files — e.g., Office documents with macro-based malware
Social Engineering Files
Appear legitimate and request information under false pretenses
Example: Posing as HR with a “payroll change form” attachment, using urgency to rush the recipient
Can be paired with sender spoofing for credibility
Data gathered can enable fraud, blackmail, or further impersonation attacks
Lure Documents
Contain embedded hyperlinks to malicious sites instead of malicious code
Example: PDF “invoice” directing user to “view online” via a phishing domain
Bypasses some email scanners since the file itself is clean, but the link is dangerous
Malicious Files
Inherently harmful, typically Office docs with macros that execute malware
Can download additional payloads from attacker-controlled domains
Require convincing the user to click “Enable Content” for macros to run
Best defense: keep macros disabled, train users to avoid unsolicited attachments, and use sandboxing where possible
Hyperlinks
Clickable elements in emails — text, buttons, or images — that open a browser and navigate to a specified URL. Attackers use them to lead targets to:
Malicious file downloads
Fake login portals (credential harvesters)
Redirect chains ending at phishing or malware sites
Why They Work
Most emails contain links, so recipients are accustomed to clicking them
Appear less suspicious than attachments
Can be disguised with:
Typosquatted domains
URL shorteners to hide the true destination
Safe Analysis
Hover over the link to preview the destination without clicking
If hidden, open the email in a text editor or safe analysis environment (VM, “dirty” system) and look for
<a>
anchor tagsNever open suspicious links on a production system
HTML Anchor Tag Example
<p>Need to access Google?
<a href="https://www.google.com">Just click this text!</a></p>
<p>
…</p>
: paragraph blockNeed to access Google?
: normal, non-linked text<a href="…">
: opening anchor tag, defines link destinationJust click this text!
: clickable link text</a>
: closes the link
Key Takeaways
Hyperlinks can appear safe but lead elsewhere — always verify the actual domain
HTML inspection reveals the real link even when disguised behind styled text or buttons
URL-Shortening Services
Services like Bitly or Short URL replace long URLs with short versions that redirect to the original destination. Attackers use them to:
Hide the true destination of a malicious link
Bypass some automated link analysis tools
Make links look cleaner and more enticing to click
How They Work
Shortener stores the full URL and issues a short link (e.g.,
bit.ly/abc123
)Clicking the short link redirects the browser to the stored destination
Back-half of the short link can often be customized to make it more believable
Example (Legitimate Use)
Original URL:
https://training.AcmeCorp.local/courses/introduction-to-OSINT
Shortened (default):
bit.ly/4hT92xQ
Shortened (custom):
bit.ly/OSINTCourse
Why This Is Dangerous in Phishing
Destination URL may lead to:
Credential harvesters
Malware downloads
Typosquatted or homoglyph domains
Masks the mismatch between brand in email and real domain
Analyzing Shortened URLs Safely
Use an unshortening service (e.g., WannaBrowser) to preview the resolved URL without visiting it directly
Look for:
Final destination URL
Number of redirects
HTTP status codes and “Location” headers
Example CLI Method:
# Resolve a Bitly link without opening it in a browser
curl -I "https://bit.ly/4hT92xQ"
HTTP/2 301
location: https://training.AcmeCorp.local/courses/introduction-to-OSINT
301
= permanent redirectlocation
shows the final destination
Use of Legitimate Services
Attackers leverage well-known, trusted platforms to send phishing emails or host malicious content, making detection and blocking more difficult for defenders.
Email Delivery
Tactic: Use free webmail providers (e.g.,
@MailOps.net
,@SecureMail.net
) to send phishing messagesWhy Effective:
Organizations rarely block common domains used for legitimate communication (HR queries, customer contact, etc.)
Can also use reputable email marketing services (e.g., MailGun, MailChimp) whose IPs are typically whitelisted
Impact: Emails from these services are less likely to be flagged or blocked by security filters
File Hosting
Tactic: Host malicious documents on trusted platforms such as Dropbox, OneDrive, or Google Drive
Why Effective:
Recognizable domains increase user trust
Free and fast account creation
Example:
Attacker uploads a Microsoft Word document with malicious macros to
drive.google.com
Sends phishing email containing link to the hosted file
Alternatively, uses Google Docs to create a clean-looking document containing a hyperlink to a malicious page, bypassing link inspection in the email body
Business Email Compromise (BEC)
A high-impact phishing attack targeting organizations that regularly transfer large sums of money. BEC can lead to significant financial loss or private information disclosure by leveraging compromised or spoofed email accounts and social engineering.
How It Works
Targets organizations with predictable payment relationships (vendors, suppliers)
Attacker compromises or spoofs an executive or key employee’s email account
Uses trust and authority to redirect payments or request sensitive data
Often involves a monitoring phase to study payment patterns before acting
Highly effective — the FBI reported $1.77B in U.S. losses from BEC in 2019
Common Scenarios
1. Email Compromise & Vendor Attack
Compromised payment-handling employee account used to send fake invoices to vendors
Vendors unknowingly pay into attacker-controlled accounts
2. Email Spoofing & Alternative Payment Attack
Spoofed address sends new payment instructions to vendors
Future payments redirected to attacker accounts
3. Email Spoofing & CEO Fraud
Attacker impersonates C-suite executive (CEO, CFO, CTO)
Urgent request to finance staff or bank to transfer funds immediately
4. Email Spoofing & Data Theft
Spoofed employee requests personal or financial data (e.g., tax forms)
Data used for spear phishing, blackmail, or resale to other attackers
5. Email Compromise & Zombie Phishing
Compromised account replies to existing email threads with malicious links
High trust factor increases likelihood of clicks
Last updated