How Email Security detects phish
Email Security uses a variety of factors to determine whether a given email message, a web domain or URL, or specific network traffic is part of a phishing campaign (marked with a Malicious
disposition) or other common campaigns (for example, Spam
).
These small pattern assessments are dynamic in nature and — in many cases — no single one in and of itself will determine the final verdict. Instead, our automated systems use a combination of factors and non-factors to clearly distinguish between a valid phishing campaign and benign traffic.
- Example: Classic campaign technique which utilizes a variety of active attachment types (EXE, DOC, XLS, PPT, OLE, PDF, and more) as the malicious payload for ransomware attacks, Trojans, viruses, and malware.
- Detections applied: Machine learning (ML) models on binary bitmaps of the payload as well as higher-level attributes of the payload, with specific focus on signatureless detections for maximum coverage. Additionally, for relevant active payloads, the engine invokes a real-time sandbox to assess behavior and determine maliciousness.
- Example: Campaigns that induce the user to apply a password within the message body to the attachment.
- Detections applied: Real-time lexical parsing of message body for password extraction and ML models on binary bitmaps of the payload, signatureless detections for maximum coverage.
- Example: Campaigns that induce the user to apply a password within the message body to the attachment, with the entire body or part of the body being an image.
- Detections applied: Real-time OCR parsing of message body for password extraction and ML models on binary bitmaps of the payload, signatureless detections for maximum coverage.
- Example: Campaigns with payloads within typical archives, such as
.zip
files. - Detections applied: ML detection tree on the payload, as well as decomposition of each individual archive into component parts and fragments for compound documents.
- Example: Typical phish campaigns with a socially engineered call to action URL that will implant malware (for example, Watering Hole attacks, Malvertizing, or scripting attacks).
- Detections applied: Continuous web crawling, followed by real-time link crawling for a select group of suspicious urls, followed by machine learning applied to URL patterns in combination with other pattern rules and topic-based machine learning models for exhaustive coverage of link-based attacks.
- Example: Campaigns where the URL links through to a remote malicious attachment (for example, in a
.doc
or.pdf
file). - Detections applied: Remote document and/or attachment extraction followed by ML detection tree on the payload, instant crawl of links.
- Example: Entirely new domain with intentional obfuscation, seen for the first time in a campaign.
- Detections applied: Link structure analysis, link length analysis, domain age analysis, neural net models on entire URL as well as domain and IP reputation of URL host, including autonomous system name reputation and geolocation based reputation.
- Example: Campaigns obfuscating the payload within attachments.
- Detections applied: URL extraction within attachments, followed by above mentioned URL detection mechanisms.
- Example: Campaigns obfuscating the payload within attachments.
- Detections applied: Attachments decomposed recursively (both in archive formats and compound document formats) to extract URLs, followed by above mentioned URL detection mechanisms.
- Example: Campaigns leveraging Bitly, Owly, and similar services at multiple levels of redirection to hide the target URL.
- Detections applied: URL shorteners crawled in real time at the moment of message delivery to get to the eventual target URL, followed by URL detection methods. Real-time shorterners are intentionally not crawled ahead of time due to the dynamic nature of these services and the variation of target URLs based on time and source.
- Example: Campaigns leveraging QR code image attachment to deliver malicious payload links for malware distribution and/or credential harvesting.
- Detections applied: Resolving for images resembling QR codes into URL, followed by above mentioned URL detection mechanisms.
- Example: Typical phish campaigns with a socially engineered call to action URL that will implant a malware (for example, Watering Hole attacks, Malvertizing, or scripting attacks).
- Detections applied: Heuristics applied to URLs in message bodies that are not already detected from ahead of time crawling and those deemed suspicious according to strict criteria are crawled in real time.
- Example: Form-based credential submission attacks, leveraging known brands (Office 365, PayPal, Dropbox, Google, and more).
- Detections applied: Continuous web crawling, computer vision on top brand lures, ML models, and infrastructure association.
- Example: Campaigns spoofing sender domains to refer to the recipient domain or some known partner domain.
- Detections applied: Header mismatches, email authentication assessments, sender reputation analysis, homographic analysis, and punycode manipulation assessments.
- Example: Campaigns taking advantage of domain similarity to confuse the end user (for example,
sampledoma1n.com
orsampledomaln.com
compared tosampledomain.com
). - Detections applied: Header mismatches, email authentication assessments, and sender reputation analysis.
- Example: Campaigns taking advantage of incorrect or invalid sender Auth records (SPF/DKIM/DMARC) and bypassing incoming Auth-based controls.
- Detections applied: Assessment of sender authentication records against published SPF/DKIM/DMARC records which is applied in combination with overall message attributes.
- Example: Campaigns targeting executives and high-value targets within the organization or using the high-value targets as sources to attack other employees within the organization.
- Detections applied: Display names compared with known executive names for similarity using several matching models including the Levenshtein algorithm, and if matched, flagged when sender is originating from an unknown domain.
- Example: Typically BEC campaigns with an offline call to action (call me, wire money, invoice, or others).
- Detections applied: Message lexical analysis, subject analysis, word count assessments, and sender analysis.
- Example: Campaigns that have no malicious payload and the URL is clean when delivered, but is activated in a deferred manner (3-4 hours later), so the end user is compromised at click time.
- Detections applied: URL rewrites and/or DNS blocks.
- Example: Volume-based, large scale spam campaigns primarily originating from compromised IP address spaces or botnets.
- Detections applied: Sender and IP reputation, history, and volume analysis.
- Example: Commodity spam largely focused on selling wares.
- Detections applied: Sender reputation, history, volume analysis, and message content analysis for commercial intent.
- Example: Directly originated or targeted through web (for example, LinkedIn, Malvertizing, and more).
- Detections applied: Web and DNS service and network device integrations, like web proxies and firewalls.
- Example: Remote employee getting phished while outside the corporate network.
- Detections applied: Employee email protection and web and DNS services enforcement in remote users (typically through an MDM integration or an always-on VPN solution).
- Example: C2 communications for lateral spread within the network or malicious phish downloaded from an external host. Typically seen when an end user gets infected outside the organization, comes back into the network and the C2 hosts uses the infected endpoint to download the implant based on the IP address space it is now resident in.
- Detections applied: Network device integrations (firewalls) and API-based integrations within existing orchestration services.