Threat Intel

Analysis of Executive Impersonation Burst Attack

By

Charles Brook

24 May 2022

Analysis

Impersonation

Threat Overview

  Industry: Legal

  Size: 5,000 employees

  Platform: O365

 

 

In May 2021 Tessian Defender flagged a series of emails sent to a global law firm. The emails were attempting to impersonate a senior partner at the firm and targeted a list of other partners.

 

 

Reconnaissance 

 

The firm being targeted by the attacker operates globally, but the senior partner they were impersonating was based in Australia. All employees targeted in the attack – including their contact details – are featured on the firm’s website.

 

Eleven partners were targeted by the attacker. All of them were also based in Australia, indicating the attacker spent time considering who to target based on what they were able to learn from reconnaissance activities against the individual they wanted to impersonate. It is likely they chose targets they assumed would be in regular contact with the senior partner at the firm.

 

The attacker had registered an email address with Gmail containing the word “partner” at the beginning followed by a series of numbers. They also changed the display name associated with the address to match the name of a senior partner at the firm they were targeting.

 

 

Attack Deployed

 

In the email sent, the attacker asked questions about the targeted recipient’s availability, implying that part of the intention was to establish a dialog for social engineering. From the email headers, it also appears that the email was sent from a mobile device. 

 

There were no links or attachments included in any of the emails. It is likely the attacker was hoping to receive a response from any of the 11 targeted partners, with the intention of building a rapport and then socially engineering them into carrying out actions on the attacker’s behalf; for example, giving up sensitive information or unwittingly compromising the firm’s network infrastructure by further directing them to a malicious link or attachment. 

 

 

Threat Detected and Prevented

 

At the time the emails were sent, Tessian Defender was being trialed at the firm across a subset of users. Two of the users who received the email had Defender installed. For both users, Defender flagged the email as a possible impersonation of someone else at the firm based on the display name, and warned them there was something suspicious about it. See figure 1: Tessian Defender notification, as seen by Recipient in their inbox

 

Tessian-Executive-Burst-Attack-1.png

 

 

Both users who received the notification from Defender marked the email as malicious, which subsequently alerted the security team.

 

See figure 2: Tessian Defender Threat Intelligence, as seen by Security Team in the Tessian Portal

 

Tessian-Executive-Burst-Attack-2.png

 

 

See figure 3: Tessian Human Layer Security Intelligence, as seen by Security Team in the Tessian Portal

 

Tessian-Executive-Burst-Attack-3.png

 

 

This attack was not particularly sophisticated but could have easily gone unnoticed by busy employees – especially if viewed on a mobile phone, where sender addresses are often not visible. More importantly, this rudimentary attack was not detected by the firm’s Secure Email Gateway. 

 

Tessian Threat Intelligence in the portal drew the security team’s attention to the suspicious indicators:

 

  • “first time sender” – the recipients had never been emailed by this sender before
  • Keywords like “are you available” were highlighted; which coming from a first time sender signals risk

 

After the security team investigated the threat, they notified the other targeted users in the firm and the incident was resolved without any damage being done. 

Charles.png

Charles Brook

Threat Intelligence Specialist, Tessian

Charles is a Threat Intelligence Specialist with a strong background in providing threat analytics for managed security services. He also has experience working with threat monitoring teams to build security-focused use-cases aimed at monitoring network data for indicators of compromise, and is passionate about tracking security trends.

subscribe-newsletter.exe

Hear from the Security Team

Subscribe for Email Updates.

We will be rolling out new articles and guides on a regular basis. Sign up to get the latest delivered to you. Get new articles and guides, a curated list of events and job openings, and more.