🎯 Advanced Phishing Defense — Module 3
1) Theory — Modern phishing: beyond bad English
Today’s phishing is polished and multi-channel: email (BEC/spear/whaling), SMS (smishing), voice (vishing), QR codes (QRishing), and consent-phishing via OAuth. Attackers spoof brands and executives, abuse look-alike domains (homograph attacks), and bypass MFA with adversary-in-the-middle (AitM) kits. Effective defense is identity-first, content-aware, and behavior-driven — not just “hover over the link.”
- BEC & spear: tailored messages to finance/execs for payment or data fraud.
- MFA bypass: AitM proxies, push-fatigue, and session token theft.
- Consent-phishing: users grant OAuth scopes; no password is stolen.
- HTML smuggling: payload hides inside HTML/JS and reconstructs on the endpoint.
- Defense: phishing-resistant MFA, mail authentication (SPF/DKIM/DMARC), sandboxing, DLP, user drills.
1.1 Common techniques
- Brand impersonation & look-alike domains: typos, homoglyphs, subdomain tricks.
- Adversary-in-the-middle (AitM): reverse-proxy captures credentials and MFA tokens.
- QRishing: QR codes in emails/posters leading to malicious portals.
- Thread hijacking: reply-chain abuse from compromised mailboxes.
- HTML smuggling: downloads assembled client-side to evade gateways.
1.2 Targets & psychology
- Urgency & authority: “CEO needs this now,” “past-due invoice.”
- Curiosity & fear: “missed delivery,” “account disabled,” “unusual login.”
- Financial ops: AP/AR, payroll, procurement — highest BEC impact.
1.3 Technical controls that actually help
- SPF/DKIM/DMARC: authenticate mail; quarantine/reject failed or unauthenticated spoofing.
- Phishing-resistant MFA: FIDO2/Passkeys, number-matching prompts; limit SMS.
- Secure mail gateway / sandbox: detonate attachments/URLs; rewrite and time-of-click analysis.
- URL defense & blocklists: strip/mangle known malicious TLDs/shorteners; intelligence feeds.
- Attachment policy: block dangerous types; convert office docs to safe formats.
- Mailbox rules guard: alert on suspicious forwarding and hidden rules.
- Browser isolation (high-risk roles): isolate unknown sites for finance/execs.
1.4 Human layer & process
- Report button: one-click report to security; reward reporting, not perfection.
- Out-of-band verification: phone/Teams call on payment or bank-detail changes.
- Just-in-time nudges: banners on external email, financial requests, or new domains.
- Playbooks & drills: quarterly phishing simulations; tabletop for BEC escalation.
1.5 Incident playbook (suspected phish/BEC)
- Preserve & report: don’t forward to colleagues; use the report button or forward to security mailbox.
- If clicked/credentialed: reset password; revoke sessions; enforce MFA re-enrollment; check inbox rules.
- If money requested: halt payments; verify via independent channel; notify bank if transfer sent.
- Scope & contain: review sign-ins, OAuth consents, file sharing, mail forwarding; disable risky apps.
- Communicate: brief finance/executives; coordinate with legal on notifications if data accessed.
- Improve: tune gateway rules, DMARC policy, and user training based on the event.
2) Real-world example
Vendor email compromise (VEC) to invoice fraud: Attackers phished a small supplier’s mailbox, studied real threads, then sent a “bank details update” to a customer’s AP team using the ongoing thread. The email passed SPF/DKIM because it came from the real supplier domain. The customer wired €142,000 to the attacker’s IBAN. The loss was stopped only after finance added out-of-band verification for any bank-detail change and mail rules were added to alert on payment-keyword threads.
3) Assessment — 18 Professional Questions
Choose the best answer for each question. Answers and feedback appear after you submit.
4) Finish
When you’re done, mark this module as completed to update your Premium Hub progress.
