{"id":22935,"date":"2021-06-15T08:12:56","date_gmt":"2021-06-15T07:12:56","guid":{"rendered":"https:\/\/www.kaspersky.co.uk\/blog\/phishing-on-picture\/22935\/"},"modified":"2021-06-15T08:13:16","modified_gmt":"2021-06-15T07:13:16","slug":"phishing-on-picture","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.uk\/blog\/phishing-on-picture\/22935\/","title":{"rendered":"Phishing for Office 365 credentials in images"},"content":{"rendered":"<p>Modern antiphishing and antispam solutions increasingly draw on a variety of machine-learning technologies. Using neural networks to analyze text makes them hard to fool, so attackers have turned to a simple but effective trick: placing the text in a picture. They then embed the image in a message body using Base64 encoding (typically, images in e-mail messages are hosted on an external website, and mail clients don\u2019t load pictures in letters from outside the company). Most such letters are after users\u2019 Microsoft Office 365 credentials.<\/p>\n<h2>Phishing letter<\/h2>\n<p>The letter is basically a picture on a white background (so it blends in with Outlook\u2019s default interface). Here is a typical example of a phishing letter of this sort:<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2021\/06\/15081304\/phishing-on-picture-letter.jpg\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2021\/06\/15081304\/phishing-on-picture-letter.jpg\" alt=\"Imitation of an automatically generated letter.\" width=\"780\" height=\"765\" class=\"aligncenter size-full wp-image-22936\"><\/a><\/p>\n<p>As always, we should consider whether each element of the message is appropriate, normal, and plausible. One aspect that leaps out is the format. There is no legal reason for this (or just about any) letter to be a picture. In particular, automatically generated letters such as account verifications use text. Checking whether the letter is a picture or text is simple: Hover over a hyperlink or button and see if the mouse cursor changes \u2014 with normal text, it will. In this case, however, clicking anywhere on the picture will open the hyperlink because the target URL is attached to the picture, so basically the whole picture is one button\/hyperlink.<\/p>\n<p>If any doubt remains, try highlighting a portion of the text or resizing your mail client window. If it\u2019s a picture, you won\u2019t be able to highlight any words in it, and resizing the window won\u2019t cause the lines of text to rewrap or change in length.<\/p>\n<p>The general style of the letter hardly adds credibility \u2014 the varying fonts and line spacing, improper use of punctuation, and awkward language are all signs of a scam. Of course, people make mistakes, but Microsoft\u2019s templates don\u2019t tend to have any. If you see this many blatant errors in any letter, it is most likely phishing.<\/p>\n<p>One last thing: The claim that the account must be verified within 48 hours should also ring an alarm bell. Scammers often try to rush users into taking careless actions.<\/p>\n<h2>Phishing site<\/h2>\n<p>Moving past the letter, the site to which it refers looks even less convincing. A legal site belonging to Microsoft would be hosted on a Microsoft domain, but the \u201cCreate your website with WordPress.com\u201d banner clearly communicates that the site was built on the free hosting platform WordPress.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2021\/06\/15081313\/phishing-on-picture-website.jpg\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2021\/06\/15081313\/phishing-on-picture-website.jpg\" alt=\"Poor imitation of a Microsoft web page.\" width=\"1460\" height=\"513\" class=\"aligncenter size-full wp-image-22938\"><\/a><\/p>\n<p>On the whole, a website of this design looks like a real one \u2014 maybe 25 years ago. Here\u2019s the modern Microsoft services sign-in page, for comparison: <a href=\"https:\/\/login.microsoftonline.com\/\" target=\"_blank\" rel=\"nofollow noopener\">https:\/\/login.microsoftonline.com\/<\/a>.<\/p>\n<h2>How to stay safe<\/h2>\n<p>A reliable protective solution detects phishing letters based on several factors, not text analysis alone. We therefore recommend using modern mail protection mechanisms such as those in <a href=\"https:\/\/www.kaspersky.com\/small-to-medium-business-security\/microsoft-office-365-security?icid=gb_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder____kso365___\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Security for Microsoft Office 365<\/a>.<\/p>\n<p>Every employee workstation and connected device needs <a href=\"https:\/\/www.kaspersky.co.uk\/small-to-medium-business-security?icid=gb_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener\">additional security<\/a> as well, to serve as an extra barrier against phishing and other tricks.<\/p>\n<p>Finally, don\u2019t forget our constant refrain: Keep promoting cybersecurity awareness among staff through <a href=\"https:\/\/k-asap.com\/en\/?icid=gb_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder____kasap___\" target=\"_blank\" rel=\"noopener\">training<\/a>. The better people understand the ways of modern cybercriminals, the less likely they are to fall victim to phishing.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kesb-trial\">\n","protected":false},"excerpt":{"rendered":"<p>To bypass text-analysis mechanisms, attackers are distributing phishing letters in images. How to avoid the danger. <\/p>\n","protected":false},"author":2598,"featured_media":22940,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1836,2361],"tags":[1640,76],"class_list":{"0":"post-22935","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-e-mail","10":"tag-phishing"},"hreflang":[{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/phishing-on-picture\/22935\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/phishing-on-picture\/22981\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/phishing-on-picture\/18463\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/phishing-on-picture\/9186\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/phishing-on-picture\/24913\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/phishing-on-picture\/22129\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/phishing-on-picture\/25478\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/phishing-on-picture\/24949\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/phishing-on-picture\/30911\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/phishing-on-picture\/9747\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/phishing-on-picture\/40260\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/phishing-on-picture\/17127\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/phishing-on-picture\/17626\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/phishing-on-picture\/14933\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/phishing-on-picture\/26939\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/phishing-on-picture\/27190\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/phishing-on-picture\/24015\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/phishing-on-picture\/29358\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/phishing-on-picture\/29151\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.uk\/blog\/tag\/phishing\/","name":"phishing"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/22935","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/users\/2598"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=22935"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/22935\/revisions"}],"predecessor-version":[{"id":22939,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/22935\/revisions\/22939"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/media\/22940"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=22935"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=22935"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=22935"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}