Attack Overview

Step 1: Email

The attacker sends a spoofed phishing email claiming to contain information about salary updates. The message includes a DOCX attachment and minimal contextual information to reduce suspicion.

Status Bar Dots
Attack Library Repo 14 21 Feb Image 1
  • The subject references salary increments.
  • The email includes a document attachment (.docx).
  • The message relies on implied urgency rather than detailed body text.

Step 2: Malicious Document with Embedded MHT

The attached document contains a hidden MHT (web archive) file. This MHT file includes a base64-encoded image that appears harmless but contains a QR code.

Status Bar Dots
Attack Library Repo 14 21 Feb Image 2
  • MHT file is embedded within the DOCX attachment.
  • Encoded image hides the QR code from static scans.
  • The QR code is not visible until the document is opened.

Step 3: QR Code Leads to Phishing Page

When the recipient scans the QR code (often using a mobile device), they are directed to a phishing page disguised as a login portal, where credentials can be harvested.

Status Bar Dots
Attack Library Repo 14 21 Feb Image 3
  • QR code bypasses email body URL scanning.
  • Targets are taken to a fake login page.
  • Designed to capture user credentials on mobile.

How Does This Attack Bypass Email Defenses?

This email attack bypasses traditional security solutions for several reasons, including:

  • The phishing link is embedded in a QR code rather than the email body.
  • The MHT file is embedded in a DOCX, avoiding detection.
  • Encoded images hide malicious content from static analysis.

How Did Abnormal Detect This Attack?

This attack was detected using AI and ML by analyzing various factors, including:

  • Unusual sender behavior and document-sharing patterns.
  • Minimal email context paired with suspicious attachments.
  • NLP identifies financial themes and urgency despite lack of body content.

By recognizing established normal behavior and detecting these abnormal indicators, a modern email security solution has the ability to prevent this attack from reaching inboxes.

Please note the exact detection mechanism from Abnormal Security's system might include proprietary techniques and methodologies not disclosed here.

Analysis Overview

Vector

Payload-based

Goal

Credential Theft

Tactic

Obfuscated Email Content
Legitimate Hosting Infrastructure

Theme

Fake Document
Employee Benefits

Impersonated Party

Internal System

See How Abnormal Stops Emerging Attacks

See a Demo