)
Settings
Log out
Blackeye, or as they themselves claim, “The most complete Phishing Tool”, is a bash script that offers 32 templates to choose from, and allows you to select which social media website to emulate.
Websites included in the templates are Facebook, Twitter, Google, PayPal, Github, Gitlab and Adobe, among others. Once you choose a template, BlackEye will create a phishing website that can be connected to the target’s device, to collect credentials and redirect them to the legitimate website.
While it may not be the most complete or ultimate phishing tool around, BlackEye is a great addition to your phishing toolkit.
The following illustrates a common phishing scam attempt:
Several things can occur by clicking the link. For example:
Email phishing is a numbers game. An attacker sending out thousands of fraudulent messages can net significant information and sums of money, even if only a small percentage of recipients fall for the scam. As seen above, there are some techniques attackers use to increase their success rates.
For one, they will go to great lengths in designing phishing messages to mimic actual emails from a spoofed organization. Using the same phrasing, typefaces, logos, and signatures makes the messages appear legitimate.
In addition, attackers will usually try to push users into action by creating a sense of urgency. For example, as previously shown, an email could threaten account expiration and place the recipient on a timer. Applying such pressure causes the user to be less diligent and more prone to error.
Lastly, links inside messages resemble their legitimate counterparts, but typically have a misspelled domain name or extra subdomains. In the above example, the myuniversity.edu/renewal URL was changed to myuniversity.edurenewal.com. Similarities between the two addresses offer the impression of a secure link, making the recipient less aware that an attack is taking place.
Spear phishing targets a specific person or enterprise, as opposed to random application users. It’s a more in-depth version of phishing that requires special knowledge about an organization, including its power structure.
An attack might play out as follows:
By providing an attacker with valid login credentials, spear phishing is an effective method for executing the first stage of an APT.
Phishing attack protection requires steps be taken by both users and enterprises.
For users, vigilance is key. A spoofed message often contains subtle mistakes that expose its true identity. These can include spelling mistakes or changes to domain names, as seen in the earlier URL example. Users should also stop and think about why they’re even receiving such an email.
For enterprises, a number of steps can be taken to mitigate both phishing and spear phishing attacks: