Threat Spotlight: The airline phishing attack
By Asaf Cidon VP of Content Security Services at Barracuda
April 3, 2017
After running the Barracuda Email Threat Scanner on hundreds of thousands of mailboxes across many customers, we’ve noticed some very creative and (unfortunately) very successful attacks. One such attack is a new spin on an old phishing email. We’ve seen this attack with several of our customers, especially in industries that deal with frequent shipping of goods or employee travel, such as logistics, shipping, and manufacturing.
The airline phishing attack using multiple techniques to capture sensitive data and deploy an Advanced Persistent Threat
The airline phishing attack is a combination of two or more attack techniques. The first technique is impersonation. The attacker will either impersonate a travel agency or even an employee in HR or finance that is sending an airline ticket or e-ticket. The email will be constructed to appear inconspicuous to the untrained recipient. Here’s an example subject line:
Fwd: United Airlines: Confirmation – Flight to Tokyo – $3,543.30
In a well-researched attack, the attacker will have prepared the email specifically for the target. The airline, destination, and price will be carefully selected so that these details look legitimate in the context of the company and the recipient.
After getting the employee to open the email, the second tool employed by the attacker is an advanced persistent threat embedded in an email attachment. The attachment, usually a flight confirmation or receipt, is typically formatted as a PDF or DOCX document. In this attack, the malware will be executed upon the opening of the document. Our analysis shows that for the airline phishing attack, attackers are successful over 90% of the time in getting employees to open airline impersonation emails. This is one of the highest success rates for phishing attacks.
We have also observed attacks that have included links to a phishing website designed to capture sensitive data from the victim. This phishing website will be designed to imitate an airline website, or it will impersonate the expense or travel system used by the company. This step in the process is designed to trick the victim of the attack into entering corporate credentials into the site. The attacker will then capture the credentials, and use them to infiltrate the corporate network and internal company systems, such as databases, email servers, and file servers.
As you can see, this attack depends on three specific techniques:
These steps complement each other, ultimately enabling the criminal to deploy additional attacks like ransomware or to remain in stealth mode and conduct reconnaissance against the target network. At this point, the attacker is in control.
Companies should use a multi-layered security approach to block this type of attack. The first layer is sandboxing. Effective sandboxing and advanced persistent threat prevention should be able to block malware before it ever reaches the corporate mail server. The second layer is anti-phishing protection. Advanced phishing engines with Link Protection look for links to websites that contain malicious code. Links to these compromised websites are blocked, even if those links are buried within the contents of a document. The third layer is employee training and awareness. Regular training and testing of your employees will increase their awareness and help them catch targeted attacks without compromising your internal network.
Finally, if you’re curious whether your company has been the victim of an airline phishing attack, we highly recommend the Barracuda Email Threat Scanner. It’s a free tool that scans your Office 365 account for advanced persistent threats and phishing risks. The scan provides you with a personalized risk assessment and evaluation of your existing security posture.