Adversaries may send spearphishing emails with a malicious attachment in an attempt to gain access to victim systems. Spearphishing attachment is a specific variant of spearphishing. Spearphishing attachment is different from other forms of spearphishing in that it employs the use of malware attached to an email. All forms of spearphishing are electronically delivered social engineering targeted at a specific individual, company, or industry. In this scenario, adversaries attach a file to the spearphishing email and usually rely upon User Execution to gain execution.
There are many options for the attachment such as Microsoft Office documents, executables, PDFs, or archived files. Upon opening the attachment (and potentially clicking past protections), the adversary's payload exploits a vulnerability or directly executes on the user's system. The text of the spearphishing email usually tries to give a plausible reason why the file should be opened, and may explain how to bypass system protections in order to do so. The email may also contain instructions on how to decrypt an attachment, such as a zip file password, in order to evade email boundary defenses. Adversaries frequently manipulate file extensions and icons in order to make attached executables appear to be document files, or files exploiting one application appear to be a file for a different one.
View in MITRE ATT&CK®Capability ID | Capability Description | Mapping Type | ATT&CK ID | ATT&CK Name | Notes |
---|---|---|---|---|---|
AC-4 | Information Flow Enforcement | Protects | T1566.001 | Spearphishing Attachment | |
CA-7 | Continuous Monitoring | Protects | T1566.001 | Spearphishing Attachment | |
SC-44 | Detonation Chambers | Protects | T1566.001 | Spearphishing Attachment | |
SC-7 | Boundary Protection | Protects | T1566.001 | Spearphishing Attachment | |
SI-2 | Flaw Remediation | Protects | T1566.001 | Spearphishing Attachment | |
SI-3 | Malicious Code Protection | Protects | T1566.001 | Spearphishing Attachment | |
SI-4 | System Monitoring | Protects | T1566.001 | Spearphishing Attachment | |
SI-8 | Spam Protection | Protects | T1566.001 | Spearphishing Attachment |
Capability ID | Capability Description | Mapping Type | ATT&CK ID | ATT&CK Name | Notes |
---|---|---|---|---|---|
microsoft_antimalware_for_azure | Microsoft Antimalware for Azure | technique_scores | T1566.001 | Spearphishing Attachment |
Comments
This control may quarantine and/or delete any spearphishing attachment that has been downloaded and matches a malware signature. Customized malware without a matching signature may not generate an alert.
References
|
microsoft_antimalware_for_azure | Microsoft Antimalware for Azure | technique_scores | T1566.001 | Spearphishing Attachment |
Comments
This control may detect any spearphishing attachment that has been downloaded and matches a malware signature. Customized malware without a matching signature may not generate an alert.
References
|