T1534 Internal Spearphishing
Adversaries may use internal spearphishing to gain access to additional information or exploit other users within the same organization after they already have access to accounts or systems within the environment. Internal spearphishing is multi-staged campaign where an email account is owned either by controlling the user’s device with previously installed malware or by compromising the account credentials of the user. Adversaries attempt to take advantage of a trusted internal account to increase the likelihood of tricking the target into falling for the phish attempt.1
Adversaries may leverage Spearphishing Attachment or Spearphishing Link as part of internal spearphishing to deliver a payload or redirect to an external site to capture credentials through Input Capture on sites that mimic email login interfaces.
There have been notable incidents where internal spearphishing has been used. The Eye Pyramid campaign used phishing emails with malicious attachments for lateral movement between victims, compromising nearly 18,000 email accounts in the process.1 The Syrian Electronic Army (SEA) compromised email accounts at the Financial Times (FT) to steal additional account credentials. Once FT learned of the campaign and began warning employees of the threat, the SEA sent phishing emails mimicking the Financial Times IT department and were able to compromise even more users.2
Item | Value |
---|---|
ID | T1534 |
Sub-techniques | |
Tactics | TA0008 |
Platforms | Google Workspace, Linux, Office 365, SaaS, Windows, macOS |
Permissions required | User |
Version | 1.2 |
Created | 04 September 2019 |
Last Modified | 08 March 2022 |
Procedure Examples
ID | Name | Description |
---|---|---|
G0047 | Gamaredon Group | Gamaredon Group has used an Outlook VBA module on infected systems to send phishing emails with malicious attachments to other employees within the organization.6 |
G1001 | HEXANE | HEXANE has conducted internal spearphishing attacks against executives, HR, and IT personnel to gain information and access.4 |
G0094 | Kimsuky | Kimsuky has sent internal spearphishing emails for lateral movement after stealing victim information.3 |
G0065 | Leviathan | Leviathan has conducted internal spearphishing within the victim’s environment for lateral movement.5 |
C0022 | Operation Dream Job | During Operation Dream Job, Lazarus Group conducted internal spearphishing from within a compromised organization.7 |
Detection
ID | Data Source | Data Component |
---|---|---|
DS0015 | Application Log | Application Log Content |
DS0029 | Network Traffic | Network Traffic Content |
References
-
Chris Taylor. (2017, October 5). When Phishing Starts from the Inside. Retrieved October 8, 2019. ↩↩
-
THE FINANCIAL TIMES. (2019, September 2). A sobering day. Retrieved October 8, 2019. ↩
-
KISA. (n.d.). Phishing Target Reconnaissance and Attack Resource Analysis Operation Muzabi. Retrieved March 7, 2022. ↩
-
SecureWorks 2019, August 27 LYCEUM Takes Center Stage in Middle East Campaign Retrieved. 2019/11/19 ↩
-
CISA. (2021, July 19). (AA21-200A) Joint Cybersecurity Advisory – Tactics, Techniques, and Procedures of Indicted APT40 Actors Associated with China’s MSS Hainan State Security Department. Retrieved August 12, 2021. ↩
-
Boutin, J. (2020, June 11). Gamaredon group grows its game. Retrieved June 16, 2020. ↩
-
ClearSky Research Team. (2020, August 13). Operation ‘Dream Job’ Widespread North Korean Espionage Campaign. Retrieved December 20, 2021. ↩