Advice for HackerNewsPenetration TestingSecurity

Phishing Attack Prevention: Don’t Get Fooled By These Phishing Techniques

Phishing Attackers are the most common security challenges faced by both individuals and companies from keeping their information secure or getting infected by malware. Most commonly attackers target users through phishing emails which are identified by experienced users by spelling errors, absurd scenarios, and dubious attachments.

However, not all phishing attacks are as obvious and assuming that they can lead to a misleading sense of security. These are so well-crafted that they can trick even the most experienced users. When phishing emails get some of the advanced tactics discussed in this post, they become even more compelling.

Exploiting Common Web Vulnerabilities to Create Malicious Links, When we think of website flaws, photos of large-scale attacks and tragic data breaches come to mind. The most prominent security flaws, on the other hand, are much more mundane.

Don’t Miss: Popular Browsers Vulnerable To URL Address Bar Spoofing Attacks

They rarely result in a full takeover of a website, but often provide attackers with a minor victory, such as access to privileged data or the ability to inject malicious code into a page.

Certain types of vulnerabilities cause a web domain to be used to generate a URL that appears to come from the site page but is secretly under the control of the hackers.

These “legitimate” URLs are particularly useful for email scammers as they’re more likely to circumvent filtering or evade victim notification.

Open Redirects

Open redirections vulnerabilities don’t get enough attention from developers because they don’t directly impact the website. However, this doesn’t mean it’s not a security threat instead the attackers can use that opportunity to make phishing attacks look more credible and effective.

For example, if your domain is, the attacker may create the following URL:

The attacker sends the URL as part of a phishing attempt to redirect the victim to a malicious website The attacker would be hoping that at the beginning will have a trustworthy appearance and make them fall for the phishing scam.

Redirect in Google Search

Google search has a variant of this issue. Every link you see in a search result page is actually a redirect from Google that looks something like this:<some parameters>&ved=<some token>&url=<site's url>&usg=<some token>

This allows you to keep track of clicks for analytics, but can also help you create an override connection from the domain of Google, which can be used for phishing on any website indexed by Google.

This has been used many times before in the wild, but Google does not consider the redirect feature to be a flaw enough.

Cross-Site Scripting

Cross-site scripting (XSS) happens when a site fails to sanitize input from the user, allowing hackers to inject malicious JavaScript code.

You can change or rewrite the content of a page with JavaScript.

XSS Takes A Few Different Shapes:

  • Reflected XSS: Malicious code is included in the page submission. This could take the form of a URL such as<script src=evil.js>
  • Stored XSS: The code of the JavaScript is stored on the webserver directly. In this scenario, the phishing connection may be a legal URL with nothing in the address itself questionable.

Don’t Be Fooled

In order to avoid being tricked by one of these malicious links, read the URL destination carefully you came across in your emails and pay attention to anything that might look like a redirect or JavaScript code.

URL Encoding in Malicious Links

URL encoding is a way of representing characters using the percent sign and a pair of hexadecimal characters, used for characters in URLs that could confuse your browser. For example, / (forward slash) is encoded as %2F.

Consider the following address:

It resolves to after the URL encoding is decoded.

It’s an open redirect, to be sure!

An attacker may take advantage of this in several ways:

  • Some email protection filters aren’t programmed well enough to correctly decipher URLs before checking them, causing malicious links to slip through.
  • The strange-looking shape of the URL has the potential to mislead you as a customer.

It resolves to after the URL encoding is decoded.

An Intruder May Reap The Benefits of This in Several Ways:

Some email protection filters aren’t programmed well enough to correctly decipher URLs before checking them, causing malicious links to slip through.

The strange-looking shape of the URL has the potential to mislead you as a customer.

In addition to one of these methods for generating a malicious connection from a trustworthy domain, this technique may be especially useful.

To stop being duped, follow these steps: Examine the URLs of any connections you find in emails again, with particular attention to possible URL-encoded characters. Any connections with several percent signals can be avoided. If you’re unsure, use a URL decoder to see the URL’s true type.

Advanced Techniques for Bypassing Filters

In particular, such methods are designed to fool e-mail filtering and ransomware rather than the victims themselves.

Modifying Brand Logos to Bypass Filters

Hackers also distribute their logo in phishing emails to trustworthy businesses. To counter this, certain authentication filters can search and match the photos of incoming emails to a database of recognized business logos.

This works well enough if the picture is not altered, but it also takes some small changes to the logo to circumvent the filter.

Obfuscated Code in Attachments

Any attachment for viruses or known malware would be scanned using an excellent email protection scheme, but these controls are also not easy to avoid. One way to do this is to obscure the code: The assailant changes the malicious code into a complex and intricate mess. The output is identical, but coding is difficult to decrypt.

Here are a few tips to prevent these tactics from being caught:

  • Don’t trust any images in emails automatically. In your email app, consider blocking photos together.
  • Do not download attachments unless you have confidence in the sender.
  • Know that even by scanning a virus, a file is not clean.

Phishing Isn’t Going Anywhere

The truth is that phishing attempts are not always easy to spot. Spam filtering and device testing continue to develop, but many spam emails are still cracked. Even experienced power users could be fooled by an attack, especially if its techniques are particularly advanced.

So there’s a lot of understanding. You will of the risk of becoming a victim by familiarizing yourself with the tactics of scammers and practicing good safety procedures.

Noor Eeman

Hey, Noor here. Just a passionate student sharing tech bits of life, currently studying to become a languages interpreter from NUML. Passionate about words, writings, and languages regarding trends, technology, and social media.

Related Articles

Back to top button