Longlining: the new phishing attack targeting businesses
Posted on 8 Jul 2013 at 10:00
Davey Winder reveals the latest style of phishing attack, "longlining"
Targeted spear-phishing and traditional mail-bombing attacks are merging to create yet another new genre in the email scam game – longlining.
This name isn’t simply another fishing pun, but rather a literal description of how this technique works.
Longline fishing is a commercial practice that employs a single line several miles long, baited with thousands of individual hooks. Longline phishing gets around traditional security systems by a process of "mass customisation", employing a rapid bombardment of thousands of uniquely targeted messages.
Find out moreProtecting your business from phishing attacks
Many security gateway filters will be looking for identical or similar messages from a single source, so they won’t detect a longline attack, the messages of which have widely differing subject lines, content and, most importantly, originating IP addresses.
This multiple-hook analogy applies to the body content of the messages themselves, which will contain multiple variations of the embedded malware target URL, the ultimate destination of which will almost always be a trusted site that’s been compromised in some way (which helps evade reputational filtering on the URL).
Think of longlining as a parallel phishing delivery system and you’re in the right ballpark.
Armed with the capability to send hundreds of thousands of these malicious URL hooks in a matter of hours, plus the ability to bypass many corporate gateway filtering systems, the bad guys increase their chance of exploiting a zero-day vulnerability before the IT department has been able to patch it.
I’ve heard longlining described as "combining the effectiveness of spear-phishing with the speed and scale of a virus attack" – and that scares me, even if it doesn’t scare you.
It would certainly encourage me to make sure my IT security education programme was up to date.
Did you mean "longlining".
That's the term used in this article by Proofpoint.
By simnfs on 9 Jul 2013
Typo in the headline?
By Pantagoon on 9 Jul 2013
Davey is a contributing editor to PC Pro, having covered the internet as a topic since the magazine started in 1994. Since that time he's won numerous awards for his journalism, but remains a small-business consultant specialising in privacy, security and usability issues.
- Windows Server 2012 R2: how the Datacenter edition could change SMBs
- Invoices and VAT: how to set up your documents correctly
- Nexus 5 vs Samsung Galaxy S4 Active: the best phone for avoiding screen burn
- How much is a social user worth?
- The key to choosing a secure password
- Thunderbolt Bridge: a fast Mac migration tool
- Should you advertise on Twitter?
- How to track a lost smartphone
- Self-publishing success: the best way to sell your book
- 1.6TB SSD: why would you need one?
- Move over Delia: IBM Watson is cooking tonight
- Eric Schmidt on the double-edged smartphone: friend and foe
- Getty joins the race to the bottom
- Hour of Code: five steps to learn how to code
- Sony Xperia Z2 Tablet review: first look
- Sony Xperia Z2 review: first look
- Samsung Galaxy Gear 2 review: first look
- Nokia XL review: first look
- Samsung Galaxy S5 review: first look
- Nokia X review: first look
- IDC: iPad intertia opens door for Windows tablets
- Office 365 goes social with "Oslo" news feed
- Windows XP: upgrading 30,000 PCs in 30 days
- LibreOffice: ignore Microsoft's "nonsense" on government's open source plans
- Intel Xeon E7 v2 servers support 6TB of RAM
- Microsoft promises video calls between Skype and Lync
- Office for iPad due before July
- Windows 7 on business PCs gets an extension
- Windows apps land on Chromebooks with VMware
- Office 365 gets two-factor authentication