This new 'linkless' phishing scam is even tricking tech experts
Cybercriminals are bypassing email security by including phishing links as HTML attachments
The antivirus firm Sophos has observed two new phishing campaigns in the wild that use a new trick to help them avoid detection.
Email phishing scams typically employ a three-stage process to get potential targets to give up their credentials which begins with an email that contains a URL they want users to click through. Clicking on this link will bring potential victims to a fake login page where their credentials are harvested and then sent to another site where the cybercriminals behind the campaign will use them to takeover user accounts.
However, these two new phishing campaigns, one of which Sophos received directly and one was reported by a reader, also use this same three-stage process but with a slight twist.
- We've put together a list of the best malware removal software
- These are the best internet security suites on the market
- Also check out our roundup of the best endpoint protection software
The cloned website in step two wasn't reached by clicking a link in an email. Instead, the fake website was attached to the email itself as an HTML attachment.
HTML attachments versus links
By attaching the URL of their phishing sites to emails, the cybercriminals behind these new campaigns are increasing the likelihood that a victim would open their fake web pages. This is because opening an attachment doesn't feel nearly as dangerous since it's not a document that could contain macros, a PowerShell file or an executable program.
Theoretically, opening an HTML attachment should simply open up the enclosed web page in the safety of a browser's sandbox just as if a victim had clicked on a link. However, by using an HTML attachment, users are unable to check out the link in advance to look for a fake or suspicious domain name and the URL in the address bar appears as if it were a local filename.
Sophos warned about the dangers of opening HTML attachments in a new blog post, saying:
Are you a pro? Subscribe to our newsletter
Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!
“There are other reasons not to open HTML attachments, notably to do with JavaScript. For safety’s sake, script code inside HTML emails is stripped or blocked when any modern email reader displays the message. That’s a precaution that email software introduced decades ago when self-spreading script viruses such as Kakworm literally spread everywhere. Kakworm’s script code would activate and the virus would spread as soon as the email was displayed, without waiting for you to click any further. When you open an HTML attachment, however, it is no longer under the strict controls of your email client software, and any JavaScript inside the HTML will be allowed to run by default by your browser.”
To avoid falling victim to these new phishing campaigns, Sophos recommends that users avoid HTM or HTML attachments altogether, never log in to web pages that you arrived at from an email, turn on 2FA when possible, change passwords once you believe you've been phished and use a web filter.
- We've also highlighted the best antivirus software
After working with the TechRadar Pro team for the last several years, Anthony is now the security and networking editor at Tom’s Guide where he covers everything from data breaches and ransomware gangs to the best way to cover your whole home or business with Wi-Fi. When not writing, you can find him tinkering with PCs and game consoles, managing cables and upgrading his smart home.