Tag Archives: phishing attacks

Email Security: Learn how to hunt phishing/spam emails?

Threat Hunting Through Email Headers

DKIM: Everything You Need to Know About Digital Signatures

Understanding SPF, DKIM and DMARC

Put simply, SPF, DKIM and DMARC are ways to authenticate your mail server and to prove to ISPs, mail services and other receiving mail servers that senders are truly authorized to send email. When properly set up, all three prove that the sender is legitimate, that their identity has not been compromised and that they’re not sending email on behalf of someone else.

These antispam measures are becoming increasingly important, and will one day be required by all mail services and servers. ISPs and mail services, such as Gmail and Office 365, are getting more and more stringent in the types of email they’ll accept, so having all three checks configured ensures that email gets delivered and isn’t rejected outright or otherwise delayed.

https://www.smartertools.com/blog/2019/04/09-understanding-spf-dkim-dmarc

Phishing – Email Header Analysis

Abstract

Email Headers hold a lot of information. Much of this information is never displayed to the user. The email reader only sees a select few pieces of information like the subject, date, and the sender’s email and info. The surprising part is that the information that is actually displayed to a user can be easily forged!

Read more in..https://mlhale.github.io/nebraska-gencyber-modules/phishing/email-headeranalysis/

Email & Email Headers Checking Tools:

To Analyze Email Headers, User Google Apps https://toolbox.googleapps.com/apps/messageheader/

This Email Checker Tests The Validity & Reachability Of An Email Address https://network-tools.com/email-tests/

Good Read: What Twitter Attack Says on Human Nature, Social Engineering

Abstract

While investigations are ongoing, Twitter reported it was the victim of a “coordinated social engineering attack.” The company confirmed that threat actors targeted and successfully manipulated a small group of employees and used their credentials to gain unauthorized access to an administrative tool that is “only available to internal support teams.”

According to Chako social engineering attacks like this one are “so effective because they use psychological manipulation to convince a person to take an action or divulge sensitive information that they shouldn’t. In fact, cyber attackers are the ultimate psychologists.”

Using these psychological tricks, the attackers were able to hijack Twitter accounts then post messages to dupe social media users into donating Bitcoin payments to fraudulent causes.

Read More:

https://www.cyberark.com/resources/blog/what-twitter-attack-says-on-human-nature-social-engineering

5 tips to avoid spear-phishing attacks

Abstract

Phishing, very briefly defined, is where a cybercriminal tricks you into revealing something electronically that you ought to have kept to yourself. The good news is that most of us have learned to spot obvious phishing attacks these days.

The bad news is that you can’t reliably spot phishing attacks just by watching out for obvious mistakes, or by relying on the crooks saying “Dear Customer” rather than using your name.

Read more in