Longlining: the new phishing attack targeting businesses
Posted on 8 Jul 2013 at 10:00
Davey Winder reveals the latest style of phishing attack, "longlining"
Targeted spear-phishing and traditional mail-bombing attacks are merging to create yet another new genre in the email scam game – longlining.
This name isn’t simply another fishing pun, but rather a literal description of how this technique works.
Longline fishing is a commercial practice that employs a single line several miles long, baited with thousands of individual hooks. Longline phishing gets around traditional security systems by a process of "mass customisation", employing a rapid bombardment of thousands of uniquely targeted messages.
Find out moreProtecting your business from phishing attacks
Many security gateway filters will be looking for identical or similar messages from a single source, so they won’t detect a longline attack, the messages of which have widely differing subject lines, content and, most importantly, originating IP addresses.
This multiple-hook analogy applies to the body content of the messages themselves, which will contain multiple variations of the embedded malware target URL, the ultimate destination of which will almost always be a trusted site that’s been compromised in some way (which helps evade reputational filtering on the URL).
Think of longlining as a parallel phishing delivery system and you’re in the right ballpark.
Armed with the capability to send hundreds of thousands of these malicious URL hooks in a matter of hours, plus the ability to bypass many corporate gateway filtering systems, the bad guys increase their chance of exploiting a zero-day vulnerability before the IT department has been able to patch it.
I’ve heard longlining described as "combining the effectiveness of spear-phishing with the speed and scale of a virus attack" – and that scares me, even if it doesn’t scare you.
It would certainly encourage me to make sure my IT security education programme was up to date.
Did you mean "longlining".
That's the term used in this article by Proofpoint.
By simnfs on 9 Jul 2013
Typo in the headline?
By Pantagoon on 9 Jul 2013
Davey is a contributing editor to PC Pro, having covered the internet as a topic since the magazine started in 1994. Since that time he's won numerous awards for his journalism, but remains a small-business consultant specialising in privacy, security and usability issues.
- The importance of load balancing
- Windows Phone App Studio: an easy way to create your first Windows Phone 8 app
- The end of Windows XP support: what it really means for businesses
- Don't rely on Chrome's password vault
- Using Buffer to manage your social media
- Microsoft needs its own Steve Jobs
- Forget credit cards: hackers want your Facebook account
- Can't get fast enough broadband? Here's what to do
- Leap Motion and the battle against UI stagnation
- How to build a really bad network
- Tech City: Easy to score when you move the goalposts
- How to remove SkyDrive from the Windows 8.1 Explorer
- Switching from iPhone to Android? Switch off iMessage
- Why is Google pumping more money into Firefox?
- Sky Broadband Shield review
- Samsung Galaxy S4: how to double your battery life
- Motorola Moto G review: first look
- IBM Watson meets Willy Wonka
- Google’s support policies shove users towards Chrome
- Lenovo Yoga Tablet review: first look
- Microsoft patches TIFF flaw in next Patch Tuesday
- Microsoft expands encryption over NSA spying "threat"
- UK Cloud Awards 2014: nominations now open
- BlackBerry says "we're still alive" as sales hit new low
- Has HP turned a corner?
- Adobe admits it's struggling to notify hack victims
- Microsoft rolls out Office 365 admin app for mobile
- Office 2013 Service Pack 1 to arrive early next year
- Backup the best defence against CryptoLocker
- UK SMBs can now buy ads on Twitter