ID | Name |
---|---|
T1566.001 | Spearphishing Attachment |
T1566.002 | Spearphishing Link |
T1566.003 | Spearphishing via Service |
T1566.004 | Spearphishing Voice |
Adversaries may send spearphishing emails with a malicious attachment in an attempt to gain access to victim systems. Spearphishing attachment is a specific variant of spearphishing. Spearphishing attachment is different from other forms of spearphishing in that it employs the use of malware attached to an email. All forms of spearphishing are electronically delivered social engineering targeted at a specific individual, company, or industry. In this scenario, adversaries attach a file to the spearphishing email and usually rely upon User Execution to gain execution.[1] Spearphishing may also involve social engineering techniques, such as posing as a trusted source.
There are many options for the attachment such as Microsoft Office documents, executables, PDFs, or archived files. Upon opening the attachment (and potentially clicking past protections), the adversary's payload exploits a vulnerability or directly executes on the user's system. The text of the spearphishing email usually tries to give a plausible reason why the file should be opened, and may explain how to bypass system protections in order to do so. The email may also contain instructions on how to decrypt an attachment, such as a zip file password, in order to evade email boundary defenses. Adversaries frequently manipulate file extensions and icons in order to make attached executables appear to be document files, or files exploiting one application appear to be a file for a different one.
ID | Name | Description |
---|---|---|
C0028 | 2015 Ukraine Electric Power Attack |
During the 2015 Ukraine Electric Power Attack, Sandworm Team obtained their initial foothold into many IT systems using Microsoft Office attachments delivered through phishing emails. [2] |
G0018 | admin@338 |
admin@338 has sent emails with malicious Microsoft Office documents attached.[3] |
S0331 | Agent Tesla |
The primary delivered mechanism for Agent Tesla is through email phishing messages.[4] |
G0130 | Ajax Security Team |
Ajax Security Team has used personalized spearphishing attachments.[5] |
G0138 | Andariel |
Andariel has conducted spearphishing campaigns that included malicious Word or Excel attachments.[6][7] |
S0622 | AppleSeed |
AppleSeed has been distributed to victims through malicious e-mail attachments.[8] |
G0099 | APT-C-36 |
APT-C-36 has used spearphishing emails with password protected RAR attachment to avoid being detected by the email gateway.[9] |
G0006 | APT1 |
APT1 has sent spearphishing emails containing malicious attachments.[10] |
G0005 | APT12 |
APT12 has sent emails with malicious Microsoft Office documents and PDFs attached.[11][12] |
G0073 | APT19 |
APT19 sent spearphishing emails with malicious attachments in RTF and XLSM formats to deliver initial exploits.[13] |
G0007 | APT28 |
APT28 sent spearphishing emails containing malicious Microsoft Office and RAR attachments.[14][15][16][17][18][19][20][21] |
G0016 | APT29 |
APT29 has used spearphishing emails with an attachment to deliver files with exploits to initial victims.[22][23][24][25] |
G0013 | APT30 |
APT30 has used spearphishing emails with malicious DOC attachments.[26] |
G0050 | APT32 |
APT32 has sent spearphishing emails with a malicious executable disguised as a document or spreadsheet.[27][28][29][30][31][32] |
G0064 | APT33 |
APT33 has sent spearphishing e-mails with archive attachments.[33] |
G0067 | APT37 |
APT37 delivers malware using spearphishing emails with malicious HWP attachments.[34][35][36] |
G0082 | APT38 |
APT38 has conducted spearphishing campaigns using malicious email attachments.[37] |
G0087 | APT39 |
APT39 leveraged spearphishing emails with malicious attachments to initially compromise victims.[38][39][40] |
G0096 | APT41 |
APT41 sent spearphishing emails with attachments such as compiled HTML (.chm) files to initially compromise their victims.[41] |
S0373 | Astaroth |
Astaroth has been delivered via malicious e-mail attachments.[42] |
S0642 | BADFLICK |
BADFLICK has been distributed via spearphishing campaigns containing malicious Microsoft Word documents.[43] |
S0234 | Bandook |
Bandook is delivered via a malicious Word document inside a zip file.[44] |
S0268 | Bisonal |
Bisonal has been delivered as malicious email attachments.[45] |
G1002 | BITTER |
BITTER has sent spearphishing emails with a malicious RTF document or Excel spreadsheet.[46][47] |
G0098 | BlackTech |
BlackTech has used spearphishing e-mails with malicious password-protected archived files (ZIP or RAR) to deliver malware.[48][49] |
S0520 | BLINDINGCAN |
BLINDINGCAN has been delivered by phishing emails containing malicious Microsoft Office documents.[50] |
G0060 | BRONZE BUTLER |
BRONZE BUTLER used spearphishing emails with malicious Microsoft Word attachments to infect victims.[51][52] |
S1039 | Bumblebee |
Bumblebee has gained execution through luring users into opening malicious attachments.[53][54][55][56] |
C0011 | C0011 |
During C0011, Transparent Tribe sent malicious attachments via email to student targets in India.[57] |
C0015 | C0015 |
For C0015, security researchers assessed the threat actors likely used a phishing campaign to distribute a weaponized attachment to victims.[58] |
S0631 | Chaes |
Chaes has been delivered by sending victims a phishing email containing a malicious .docx file.[59] |
S0660 | Clambling |
Clambling has been delivered to victim's machines through malicious e-mail attachments.[60] |
G0080 | Cobalt Group |
Cobalt Group has sent spearphishing emails with various attachment types to corporate and personal email accounts of victim organizations. Attachment types have included .rtf, .doc, .xls, archives containing LNK files, and password protected archives containing .exe and .scr executables.[61][62][63][64][65][66][67][68] |
G0142 | Confucius |
Confucius has crafted and sent victims malicious attachments to gain initial access.[69] |
G1012 | CURIUM |
CURIUM has used phishing with malicious attachments for initial access to victim environments.[70] |
S1014 | DanBot |
DanBot has been distributed within a malicious Excel attachment via spearphishing emails.[71] |
S1111 | DarkGate |
DarkGate can be distributed through emails with malicious attachments from a spoofed email address.[72] |
G0012 | Darkhotel |
Darkhotel has sent spearphishing emails with malicious RAR and .LNK attachments.[73][74] |
G0079 | DarkHydrus |
DarkHydrus has sent spearphishing emails with password-protected RAR archives containing malicious Excel Web Query files (.iqy). The group has also sent spearphishing emails that contained malicious Microsoft Office documents that use the "attachedTemplate" technique to load a template from a remote server.[1][75][76] |
S1066 | DarkTortilla |
DarkTortilla has been distributed via spearphishing emails containing archive attachments, with file types such as .iso, .zip, .img, .dmg, and .tar, as well as through malicious documents.[77] |
S0673 | DarkWatchman |
DarkWatchman has been delivered via spearphishing emails that contain a malicious zip file.[78] |
G0035 | Dragonfly |
Dragonfly has sent emails with malicious attachments to gain initial access.[79] |
G0066 | Elderwood |
Elderwood has delivered zero-day exploits and malware to victims via targeted emails containing malicious attachments.[80][81] |
S0367 | Emotet |
Emotet has been delivered by phishing emails containing attachments. [82][83][84][85][86][87][88][89][90] |
S0634 | EnvyScout |
EnvyScout has been distributed via spearphishing as an email attachment.[91] |
G1011 | EXOTIC LILY |
EXOTIC LILY conducted an e-mail thread-hijacking campaign with malicious ISO attachments.[92][53] |
G0137 | Ferocious Kitten |
Ferocious Kitten has conducted spearphishing campaigns containing malicious documents to lure victims to open the attachments.[93] |
G0085 | FIN4 |
FIN4 has used spearphishing emails containing attachments (which are often stolen, legitimate documents sent from compromised accounts) with embedded malicious macros.[94][95] |
G0037 | FIN6 |
FIN6 has targeted victims with e-mails containing malicious attachments.[96] |
G0046 | FIN7 |
FIN7 sent spearphishing emails with either malicious Microsoft Documents or RTF files attached.[97][98][99][100][101] |
G0061 | FIN8 |
FIN8 has distributed targeted emails containing Word documents with embedded malicious macros.[102][103][104] |
S0696 | Flagpro |
Flagpro has been distributed via spearphishing as an email attachment.[49] |
C0001 | Frankenstein |
During Frankenstein, the threat actors likely used spearphishing emails to send malicious Microsoft Word documents.[105] |
G0084 | Gallmaker |
Gallmaker sent emails with malicious Microsoft Office documents attached.[106] |
G0047 | Gamaredon Group |
Gamaredon Group has delivered spearphishing emails with malicious attachments to targets.[107][108][109][110][111][112][113] |
G0078 | Gorgon Group |
Gorgon Group sent emails to victims with malicious Microsoft Office documents attached.[114] |
S0499 | Hancitor |
Hancitor has been delivered via phishing emails with malicious attachments.[115] |
G0126 | Higaisa |
Higaisa has sent spearphishing emails containing malicious attachments.[116][117] |
S0483 | IcedID |
IcedID has been delivered via phishing e-mails with malicious attachments.[118][119] |
G0100 | Inception |
Inception has used weaponized documents attached to spearphishing emails for reconnaissance and initial compromise.[120][121][122][123] |
G0136 | IndigoZebra |
IndigoZebra sent spearphishing emails containing malicious password-protected RAR attachments.[124][125] |
S0528 | Javali |
Javali has been delivered as malicious e-mail attachments.[42] |
S0648 | JSS Loader |
JSS Loader has been delivered by phishing emails containing malicious Microsoft Excel attachments.[100] |
S0585 | Kerrdown |
Kerrdown has been distributed through malicious e-mail attachments.[32] |
G0094 | Kimsuky |
Kimsuky has used emails containing Word, Excel and/or HWP (Hangul Word Processor) documents in their spearphishing campaigns.[126][127][128][129][130][8][131][132] |
S0669 | KOCTOPUS |
KOCTOPUS has been distributed via spearphishing emails with malicious attachments.[133] |
S0356 | KONNI |
KONNI has been delivered via spearphishing campaigns through a malicious Word document.[134] |
S1075 | KOPILUWAK |
KOPILUWAK has been delivered to victims as a malicious email attachment.[135] |
S1160 | Latrodectus |
Latrodectus has been distributed through reply-chain phishing emails with malicious attachments.[136] |
G0032 | Lazarus Group |
Lazarus Group has targeted victims with spearphishing emails containing malicious Microsoft Word documents.[137][138][139][140] |
G0140 | LazyScripter |
LazyScripter has used spam emails weaponized with archive or document files as its initial infection vector.[133] |
G0065 | Leviathan |
Leviathan has sent spearphishing emails with malicious attachments, including .rtf, .doc, and .xls files.[141][142] |
S0447 | Lokibot |
Lokibot is delivered via a malicious XLS attachment contained within a spearhpishing email.[143] |
G0095 | Machete |
Machete has delivered spearphishing emails that contain a zipped file with malicious contents.[144][145][146] |
G1026 | Malteiro |
Malteiro has sent spearphishing emails containing malicious .zip files.[147] |
G0045 | menuPass |
menuPass has sent malicious Office documents via email as part of spearphishing campaigns as well as executables disguised as documents.[148][149][150][151] |
S0455 | Metamorfo |
Metamorfo has been delivered to victims via emails with malicious HTML attachments.[152][153] |
G0103 | Mofang |
Mofang delivered spearphishing emails with malicious documents, PDFs, or Excel files attached.[154] |
G0021 | Molerats |
Molerats has sent phishing emails with malicious Microsoft Word and PDF attachments.[155][156][157] |
G1036 | Moonstone Sleet |
Moonstone Sleet delivered various payloads to victims as spearphishing attachments.[158] |
G0069 | MuddyWater |
MuddyWater has compromised third parties and used compromised accounts to send spearphishing emails with targeted attachments to recipients.[159][160][161][162][163][164] [165][166] |
G0129 | Mustang Panda |
Mustang Panda has used spearphishing attachments to deliver initial access payloads.[167][168][169] |
G0019 | Naikon |
Naikon has used malicious e-mail attachments to deliver malware.[170] |
S0198 | NETWIRE |
NETWIRE has been spread via e-mail campaigns utilizing malicious attachments.[171][172] |
G0133 | Nomadic Octopus |
Nomadic Octopus has targeted victims with spearphishing emails containing malicious attachments.[173][174] |
S0346 | OceanSalt |
OceanSalt has been delivered via spearphishing emails with Microsoft Office attachments.[175] |
S0340 | Octopus | |
G0049 | OilRig |
OilRig has sent spearphising emails with malicious attachments to potential victims using compromised and/or spoofed email accounts.[176][177][178] |
C0022 | Operation Dream Job |
During Operation Dream Job, Lazarus Group sent emails with malicious attachments to gain unauthorized access to targets' computers.[179][180] |
C0016 | Operation Dust Storm |
During Operation Dust Storm, the threat actors sent spearphishing emails that contained a malicious Microsoft Word document.[181] |
C0005 | Operation Spalax |
During Operation Spalax, the threat actors sent phishing emails that included a PDF document that in some cases led to the download and execution of malware.[182] |
S1017 | OutSteel |
OutSteel has been distributed as a malicious attachment within a spearphishing email.[183] |
G0040 | Patchwork |
Patchwork has used spearphishing with an attachment to deliver files with exploits to initial victims.[184][185][186][187] |
G0068 | PLATINUM |
PLATINUM has sent spearphishing emails with attachments to victims as its primary initial access vector.[188] |
S0428 | PoetRAT | |
S0453 | Pony | |
S0650 | QakBot |
QakBot has spread through emails with malicious attachments.[191][192][193][194][195][196][197][198][199] |
S0458 | Ramsay |
Ramsay has been distributed through spearphishing emails with malicious attachments.[200] |
G0075 | Rancor |
Rancor has attached a malicious document to an email to gain initial access.[201] |
G1039 | RedCurl |
RedCurl has used phishing emails with malicious files to gain initial access.[202][203] |
S0496 | REvil |
REvil has been distributed via malicious e-mail attachments including MS Word Documents.[204][205][206][207][208] |
S0433 | Rifdoor |
Rifdoor has been distributed in e-mails with malicious Excel or Word documents.[209] |
S0240 | ROKRAT |
ROKRAT has been delivered via spearphishing emails that contain a malicious Hangul Office or Microsoft Word document.[210] |
S0148 | RTM |
RTM has been delivered via spearphishing attachments disguised as PDF documents.[211] |
G0048 | RTM |
RTM has used spearphishing attachments to distribute its malware.[212] |
G1031 | Saint Bear |
Saint Bear uses a variety of file formats, such as Microsoft Office documents, ZIP archives, PDF documents, and other items as phishing attachments for initial access.[183] |
S1018 | Saint Bot |
Saint Bot has been distributed as malicious attachments within spearphishing emails.[213][183] |
G0034 | Sandworm Team |
Sandworm Team has delivered malicious Microsoft Office and ZIP file attachments via spearphishing emails.[214][215][216][217][218][219] |
G1008 | SideCopy |
SideCopy has sent spearphishing emails with malicious hta file attachments.[220] |
G0121 | Sidewinder |
Sidewinder has sent e-mails with malicious attachments often crafted for specific targets.[221] |
G0091 | Silence |
Silence has sent emails with malicious DOCX, CHM, LNK and ZIP attachments. [222][223][224] |
S1086 | Snip3 |
Snip3 has been delivered to victims through malicious e-mail attachments.[225] |
S1030 | Squirrelwaffle |
Squirrelwaffle has been distributed via malicious Microsoft Office documents within spam emails.[226] |
G1033 | Star Blizzard |
Star Blizzard has sent emails with malicious .pdf files to spread malware.[227] |
S1064 | SVCReady |
SVCReady has been distributed via spearphishing campaigns containing malicious Mircrosoft Word documents.[228] |
G1018 | TA2541 |
TA2541 has sent phishing emails with malicious attachments for initial access including MS Word documents.[229][230] |
G0062 | TA459 |
TA459 has targeted victims using spearphishing emails with malicious Microsoft Word attachments.[231] |
G0092 | TA505 |
TA505 has used spearphishing emails with malicious attachments to initially compromise victims.[232][233][234][235][236][237][238][239][240] |
G0127 | TA551 |
TA551 has sent spearphishing attachments with password protected ZIP files.[241][242][243] |
S0011 | Taidoor |
Taidoor has been delivered through spearphishing emails.[244] |
G0089 | The White Company |
The White Company has sent phishing emails with malicious Microsoft Word attachments to victims.[245] |
G0027 | Threat Group-3390 |
Threat Group-3390 has used e-mail to deliver malicious attachments to victims.[60] |
S0665 | ThreatNeedle |
ThreatNeedle has been distributed via a malicious Word document within a spearphishing email.[138] |
G0131 | Tonto Team |
Tonto Team has delivered payloads via spearphishing attachments.[246] |
G0134 | Transparent Tribe |
Transparent Tribe has sent spearphishing e-mails with attachments to deliver malicious payloads.[247][248][249][250][251] |
S0266 | TrickBot |
TrickBot has used an email with an Excel sheet containing a malicious macro to deploy the malware[252] |
G0081 | Tropic Trooper |
Tropic Trooper sent spearphishing emails that contained malicious Microsoft Office and fake installer file attachments.[253][254][255][256][257] |
S0476 | Valak |
Valak has been delivered via spearphishing e-mails with password protected ZIP files.[241] |
S0670 | WarzoneRAT |
WarzoneRAT has been distributed as a malicious attachment within an email.[258][69] |
C0037 | Water Curupira Pikabot Distribution |
Water Curupira Pikabot Distribution attached password-protected ZIP archives to deliver Pikabot installers.[259] |
G0112 | Windshift |
Windshift has sent spearphishing emails with attachment to harvest credentials and deliver malware.[260] |
G1035 | Winter Vivern |
Winter Vivern leverages malicious attachments delivered via email for initial access activity.[261][262][263] |
G0090 | WIRTE |
WIRTE has sent emails to intended victims with malicious MS Word and Excel attachments.[264] |
G0102 | Wizard Spider |
Wizard Spider has used spearphishing attachments to deliver Microsoft documents containing macros or PDFs containing malicious links to download either Emotet, Bokbot, TrickBot, or Bazar.[265][266][267] |
S1065 | Woody RAT |
Woody RAT has been delivered via malicious Word documents and archive files.[268] |
S1013 | ZxxZ |
ZxxZ has been distributed via spearphishing emails, usually containing a malicious RTF or Excel attachment.[46] |
ID | Mitigation | Description |
---|---|---|
M1049 | Antivirus/Antimalware |
Anti-virus can also automatically quarantine suspicious files. |
M1047 | Audit |
Enable auditing and monitoring for email attachments and file transfers to detect and investigate suspicious activity. Regularly review logs for anomalies related to attachments containing potentially malicious content, as well as any attempts to execute or interact with these files. This practice helps identify spearphishing attempts before they can lead to further compromise. |
M1031 | Network Intrusion Prevention |
Network intrusion prevention systems and systems designed to scan and remove malicious email attachments can be used to block activity. |
M1021 | Restrict Web-Based Content |
Block unknown or unused attachments by default that should not be transmitted over email as a best practice to prevent some vectors, such as .scr, .exe, .pif, .cpl, etc. Some email scanning devices can open and analyze compressed and encrypted formats, such as zip and rar that may be used to conceal malicious attachments. |
M1054 | Software Configuration |
Use anti-spoofing and email authentication mechanisms to filter messages based on validity checks of the sender domain (using SPF) and integrity of messages (using DKIM). Enabling these mechanisms within an organization (through policies such as DMARC) may enable recipients (intra-org and cross domain) to perform similar message filtering and validation.[269][270] |
M1018 | User Account Management |
Apply user account management principles to limit permissions for accounts interacting with email attachments, ensuring that only necessary accounts have the ability to open or execute files. Restricting account privileges reduces the potential impact of malicious attachments by preventing unauthorized execution or spread of malware within the environment. |
M1017 | User Training |
Users can be trained to identify social engineering techniques and spearphishing emails. |
ID | Data Source | Data Component | Detects |
---|---|---|---|
DS0015 | Application Log | Application Log Content |
Monitor for third-party application logging, messaging, and/or other artifacts that may send spearphishing emails with a malicious attachment in an attempt to gain access to victim systems. Filtering based on DKIM+SPF or header analysis can help detect when the email sender is spoofed.[269][270] Anti-virus can potentially detect malicious documents and attachments as they're scanned to be stored on the email server or on the user's computer. Monitor for suspicious descendant process spawning from Microsoft Office and other productivity software.[271] |
DS0022 | File | File Creation |
Monitor for newly constructed files from a spearphishing emails with a malicious attachment in an attempt to gain access to victim systems. |
DS0029 | Network Traffic | Network Traffic Content |
Monitor and analyze SSL/TLS traffic patterns and packet inspection associated to protocol(s) that do not follow the expected protocol standards and traffic flows (e.g extraneous packets that do not belong to established flows, gratuitous or anomalous traffic patterns, anomalous syntax, or structure). Consider correlation with process monitoring and command line to detect anomalous processes execution and command line arguments associated to traffic patterns (e.g. monitor anomalies in use of files that do not normally initiate connections for respective protocol(s)). Filtering based on DKIM+SPF or header analysis can help detect when the email sender is spoofed.[269][270] |
Network Traffic Flow |
Monitor network data for uncommon data flows. Processes utilizing the network that do not normally have network communication or have never been seen before are suspicious. |