Search
Close this search box.

How Phishing Works: Behind the Scenes of Recent Cybercriminal Tactics

Phishing attacks are surging in both sophistication and frequency – trending up at a rate of over 700% in 2024 – leaving businesses vulnerable to identity-based threats and costly data breaches. As defenders, understanding phishing trends and tactics to proactively defend against the potential consequences is critical.

At SpyCloud, we specialize in recapturing stolen data from phishing campaigns, malware infections, and breaches, to empower organizations with much-needed defense levers. Here, we’ll review how phishing works, the types of data cybercriminals target in phishing campaigns, and strategies to protect your business.

What is phishing and why does it matter for businesses?

Phishing is a social engineering tactic where attackers trick individuals into providing sensitive information – like login credentials or financial details – through fraudulent emails, fake websites, or SMS messages. For businesses, falling victim to phishing can lead to account takeover, online fraud, ransomware attacks, and business email compromise (BEC).

Cybercriminals are increasingly targeting businesses due to the lucrative nature of stolen corporate credentials and other valuable identity data, like PII. Credential leaks from phishing attacks often serve as gateways to larger, more damaging cybercrimes. A single compromised account can provide attackers access to critical systems, enabling them to deploy ransomware or exfiltrate private data to sell on underground markets.

In fact, in our most recent ransomware research, we asked security professionals who had been affected by ransomware to share the entry points attackers used to gain initial access. The top entry point on the list? Phishing.

The threat posed by phishing emphasizes the need for defense strategies that are proactive in nature, which is why we focus on recapturing the data stolen in phishing attacks to help defenders prevent follow-on attacks like ransomware.

How phishing works and what bad actors are after

Phishing campaigns are more than just random emails – they are often meticulously designed criminal operations. Unfortunately, the phishing problem is now being fueled by AI, increased personalization tactics, and the opportunity presented to bad actors by the proliferation of user devices (including mobile devices). Together, these factors give criminals a leg up when it comes to tricking even the most discerning victims.

But let’s pause a second and revisit some basics.

Anatomy of a phishing attack

Generally speaking, a phishing attack is composed of:

Successful phishing attacks rely on social engineering. In phishing campaigns, criminals try to exploit human emotions like fear, urgency, or curiosity, to prompt a person to act quickly without thinking critically. For instance, a phishing email may threaten account suspension if immediate action is not taken, leveraging the victim’s anxiety to bypass their usual caution.

Breaking down the phishing attack lifecycle

Cybercriminals general rely on cybercrime enablement services – in this case phishing kits – to then carry out a phishing attack.

The types of data cybercriminals target in phishing attacks

Phishing attacks aim to capture a range of sensitive data:
SpyCloud has recaptured tens of millions of stolen data records from phishing attacks, and billions from third party breaches and malware, underscoring the critical need for businesses to monitor and remediate compromised accounts proactively. While criminals can take various pieces of data to perpetrate a number of attacks, employee logins are particularly valuable to bad actors, as they can be direct keys to access corporate networks and sensitive data and commit account takeover (and worse).

What happens to data stolen in phishing attacks?

Once stolen, phishing data is often sold or used to fuel further attacks. Here’s how:

Stolen credentials are used to infiltrate systems and encrypt data, demanding a ransom.

Access to corporate accounts can lead to unauthorized access to sensitive systems.

Stolen customer data can be used to create new accounts or to fraudulently log in to user accounts to conduct financial theft, including cashing out or liquidating victim accounts.

Attackers impersonate executives or employees to defraud companies and customers.

Imagine a scenario where stolen employee credentials grant attackers access to a cloud environment, enabling them to exfiltrate sensitive data, deploy malware, or escalate attacks across the supply chain.

Don’t let stolen data fuel the next attack on your business. Learn how SpyCloud mitigates risks.

Real or ph-ake: Recent phishing campaign examples

SpyCloud has investigated cases where phishing campaigns impersonate social media, telecommunications, and information technology providers. Here are a few examples of recent phishing campaigns.

Social Media

Screenshot of phishing campaign targeting Meta application users.

This phishing campaign targets users of Meta applications such as Facebook, Instagram, and Threads. The page, which was hosted at repportproblemscopyright[.]cloud, contains a fake warning apparently from Meta that tells the user that their fanpage has violated Meta’s “Terms of Service and Community guidelines.” It prompts the user to input their Meta account information to “request a review” of the TOS violation.

This phishing campaign impersonates a trusted brand – Meta – and attempts to create a sense of frustration and urgency by telling users that their Meta account has been restricted. This sense of urgency is meant to distract users from noticing inconsistencies, such as the fact that the page is not hosted on any of Meta’s well known domains like meta.com or facebook.com.

Software

Fraudulent landing page with legitimate Microsoft branding used to perpetrate a phishing attack.

This phishing page, which was hosted at lagencecom[.]github[.]io, uses Microsoft branding and has a simple user interface that prompts a user to input an email address to access a “secure Organization Office.” Then, this initial landing page validates the user-provided email address against a standard regular expression to make sure it is in a valid email format. The source code for the page also appears to have an option to check it against a targeting list of email addresses, so that only victims that the phishing page operators care about get through to the next page and are prompted to input more sensitive information and PII. However, in this deployment of the page, this useVerifiedEmailList option appears to be toggled off.

Similarly to the Meta campaign, this page impersonates a trusted well-known brand—Microsoft. While it does not explicitly prey on users’ sense of urgency, it does pique their curiosity by using phrases like “sensitive information” to entice victims by implying that the files are confidential and therefore might contain interesting material.

Telecom Provider

Screenshot of imposter Deutsche Telekom consumer webmail service used for Phishing attempt.

This phishing page, which was hosted at chartreuse-midnight-mambo[.]glitch[.]me, impersonates the Deutsche Telekom brand. Specifically, this page appears to impersonate their Telekom Mail consumer webmail service. Deutsche Telekom is a large German telecommunications company that operates subsidiaries around the world including T-Mobile.

In Germany, Deutsche Telekom also operates as an ISP and mobile phone carrier. Therefore if a phishing victim whose credentials are stolen by this page maintains the same username and password for all of their Deutsche Telekom accounts, a malicious user could gain access to a user’s accounts for their mobile phone service, internet service, and email all at once. 

How SpyCloud helps neutralize phished data

SpyCloud’s solutions are designed to disrupt the lifecycle of follow-on attacks that leverage phished data through:

Actionable steps to leverage SpyCloud solutions include:

Regularly monitoring for identity exposures to detect risks early, and automatically resetting stolen credentials.

Aiding investigations of financial crime, insider risk, ransomware attacks, identity theft, supply chain exposures, and malware-infected hosts.

How to beat threats from phished data

Phishing remains one of the most pervasive cyber threats to businesses, because the data collected in the phish attack is so useful for the more malicious follow-on attack. Understanding its mechanics and impact can help organizations stay ahead. By recognizing the types of data targeted, mitigating stolen credential risks, and adopting SpyCloud’s proactive defenses, you can reduce your exposure to identity-based attacks that use phished data.

SpyCloud is at the forefront of phishing mitigation – helping businesses neutralize threats and protect employee and customer identities.

Keep reading

Criminals are ramping up to take advantage of retailers and customer accounts during peak holiday shopping season. Here’s what to have on your radar.
The impacts of account takeover can affect your customer base and business long into the future, which is why prevention is so key. Here’s how SpyCloud helps organizations reduce ATO fraud.
Table of Contents
Check your darknet exposure

Check Your Company's Exposure

See your real-time exposure details powered by SpyCloud.

Go beyond credential monitoring this year: Discover holistic identity threat protection

X
Search
Close this search box.