ADVERTISEMENT
TechEconomy
Thursday, May 15, 2025
No Result
View All Result
Advertisement
  • News
  • Tech
    • DisruptiveTECH
    • ConsumerTech
      • Accessories
      • Phones
      • Laptop
      • Gadgets and Appliances
      • Apps
    • How To
    • TechTAINMENT
  • Business
    • Telecoms
      • Broadband
    • Mobility
    • Environment
    • Travel
    • Commerce
    • StartUPs
    • TE Insights
    • Security
  • Partners
  • Economy
    • Finance
    • Fintech
    • Digital Assets
    • Personal Finance
    • Insurance
  • Features
    • IndustryINFLUENCERS
    • Guest Writer
    • Appointment
    • EventDIARY
    • Editorial
  • Apply
  • TecheconomyTV
  • Techeconomy Events
  • BusinesSENSE For SMEs
  • TBS
  • News
  • Tech
    • DisruptiveTECH
    • ConsumerTech
      • Accessories
      • Phones
      • Laptop
      • Gadgets and Appliances
      • Apps
    • How To
    • TechTAINMENT
  • Business
    • Telecoms
      • Broadband
    • Mobility
    • Environment
    • Travel
    • Commerce
    • StartUPs
    • TE Insights
    • Security
  • Partners
  • Economy
    • Finance
    • Fintech
    • Digital Assets
    • Personal Finance
    • Insurance
  • Features
    • IndustryINFLUENCERS
    • Guest Writer
    • Appointment
    • EventDIARY
    • Editorial
  • Apply
  • TecheconomyTV
  • Techeconomy Events
  • BusinesSENSE For SMEs
  • TBS
No Result
View All Result
Tech | Business | Economy
No Result
View All Result
Podcast

Home » Using HTML Attachments Allows Phishers to Avoid Detection – Report

Using HTML Attachments Allows Phishers to Avoid Detection – Report

Yinka Okeowo by Yinka Okeowo
May 16, 2022
in Security
0

RelatedPosts

Scattered Spider Behind UK Retail Attacks Now Eyeing U.S. Targets — Google Warns

Hackers Behind UK Retail Attacks Now Eyeing U.S. Targets — Google Warns

May 15, 2025

Sophos Accelerates Business Growth and Profitability for MSPs with the Launch of MSP Elevate Program

May 15, 2025

Kaspersky experts warn users about the growing threat coming from the increased numbers of phishing emails containing HTML files.

From January to April 2022, Kaspersky researchers blocked nearly 2 million phishing emails containing HTML attachments.

https://techeconomy.ng/2022/05/introducing-new-version-of-kaspersky-safe-kids-solution-for-youtube-monitoring-on-ios/

Using HTML files in phishing letters is one of the latest and popular tricks abused by fraudsters.

Usually, such links are easily detected by anti-spam engines or antivirus software but using HTML attachments has allowed cybercriminals to avoid detection.

Many users aren’t even aware that files in phishing emails can be insecure, so they unsuspectingly open these HTML attachments, which turn out to be dangerous and targeted weapons used by cybercriminals.

Fraudsters can stylise HTML attachments to make them look identical to the pages on a company’s official website.

They target the official website’s users and copy its style, images, scripts and other multimedia components, using it as bait to trick their victims into entering vulnerable data in the phishing form.

HTML Attachments
United BANK
| Cybercriminals lure victims into opening malicious HTML attachments, claiming that the file is only safe through this link (Source: Kaspersky)

There are two main types of HTML attachments used by cybercriminals: HTML files with a phishing link or entire malicious pages. In the first case, attackers will send an HTML file with text inside, claiming to have important data, such as a bank’s notification about a large transfer attempt.

The user is prompted to click on a link to the bank’s site, to stop the transaction, which instead leads to a phishing page.

In some cases, the victim doesn’t even have to click the link. When the user tries to open the HTML attachment, it will automatically redirect them to a malicious site.

Once on this page, victims are requested to fill out a data-entry form to review business-related files, protect their bank account or even receive a government payment.

It is only later that the victim finds out they’ve had their personal data and bank details stolen.

United BANK

The second type of HTML attachments are entire phishing pages. These files allow cybercriminals to save on hosting fees and avoid using websites because the phishing form and the script used to collect data are fully contained within the attachment.

Used as a phishing site, the HTML file can also be personalised, depending on the intended target and the attack vector used to gain the victim’s trust.

For example, a fraudster could distribute a phishing email among the employees of a company, appearing as though it’s asking to verify a contract, but is actually a malicious HTML file.

Such attachments will have all the visual attributes of that company: logo, style and even the name of the boss as its sender. Inside the file, the victim is requested to enter the login and password for their corporate account in order to access the document.

This data then falls directly into the hands of the cybercriminal, who can use this information to break into the company’s corporate network.

HTML Attachments
| An example of a phishing page in the HTML attachment (Source: Kaspersky)

While security solutions can already block emails containing HTML attachments with malicious scripts or phishing links in plain text, cybercriminals are now using different tactics to avoid being blocked.

For example, fraudsters often distort the phishing link or the whole HTML file with muddled or garbage code.

Although this junk and incoherent text doesn’t appear on the user’s screen, it still makes it harder for anti-spam engines to detect and consequently block the email.

“Cybercriminals use cleverly disguised requests for login credentials to dupe unsuspecting victims into entering their usernames and passwords. Every year we block millions of phishing pages and this number is only expected to grow, meaning users must stay alert and be aware of the danger that these emails can bring. Cybercriminals have created a complex and advanced infrastructure where even novice scammers can create thousands of phishing pages, using ready-made templates, then target a vast range of users. With any amateur now able to create his own phishing page, you have to be particularly careful when opening any links from an email or messaging service”, comments Roman Dedenok, security researcher at Kaspersky.

To protect yourself from phishing, Kaspersky recommends:

  • Checking every link before clicking. Hover over it to preview the URL and look out for misspellings or any other irregularities.
  • Only entering a username and password over a secure connection. Look for the HTTPS prefix before the site URL, indicating the connection to the site is secure.
  • Remembering that even if a message or a letter appears to come from one of your best friends, their account might have been hacked. Remain cautious in all situations and scrutinise all links and attachments even if they seem to come from a friendly source.
  • Paying special attention to messages that appear to be from official organisations, such as banks, tax agencies, online shops, travel agencies, airlines and so on. Even internal messages from your own office. It’s not hard for criminals to fabricate a fake letter that looks legitimate.
  • Avoid opening any unexpected files sent by online gaming friends or other online buddies. They may contain ransomware or even spyware, just like attachments from official-looking e-mails.
  • Providing your staff with basic cybersecurity hygiene training. Conduct a simulated phishing attack to ensure that they know how to distinguish phishing emails from real ones.
  • Using a protection solution for endpoints and mail servers with anti-phishing capabilities, such as Kaspersky Endpoint Security for Business, to decrease the chance of infection through phishing emails.
  • Protecting your Microsoft 365 cloud service, if using it. Kaspersky Security for Microsoft Office 365 has a dedicated anti-spam and anti-phishing function as well as protection for SharePoint, Teams and OneDrive apps to keep business communications secure. 

Loading

Author

  • Yinka Okeowo
    Yinka Okeowo

    View all posts
0Shares

Tags: HTML attachmentsKaspersky
Previous Post

Kenya’s Twiga Launches ‘Twiga Fresh’, Includes Farming, Distribution of Own-Produce in Offerings 

Next Post

[Opinion] Pantami: A Continental Change Icon

Yinka Okeowo

Yinka Okeowo

Related Posts

Scattered Spider Behind UK Retail Attacks Now Eyeing U.S. Targets — Google Warns
Security

Hackers Behind UK Retail Attacks Now Eyeing U.S. Targets — Google Warns

by Joan Aimuengheuwa
May 15, 2025
0

This loosely organised network is made up of hackers of varying skill levels

Read more
Sophos MSP Elevate

Sophos Accelerates Business Growth and Profitability for MSPs with the Launch of MSP Elevate Program

May 15, 2025
CyberDome and Cato Networks

CyberDome and Cato Networks Collaborate to Deliver SASE in West Africa

May 12, 2025
Sophos warning about Chinese Cars -

Sophos Warns of Risk of Data Theft as Chinese Cars Flood France

May 7, 2025
FG Launches Data Privacy Academy

Nigeria Virtual Privacy Academy: FG to Train Youth on Cybersecurity, Data Governance

May 7, 2025
Future of multi-cloud by Samson Aligba -

Securing the Future of AI Integration: Why an Enterprise-Grade Model Context Protocol Framework is Crucial

May 5, 2025
Next Post

[Opinion] Pantami: A Continental Change Icon

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

I agree to the Terms & Conditions and Privacy Policy.

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Techeconomy Podcast

Techeconomy Podcast
Techeconomy Podcast

Infowave is brought to you by TechEconomy. Every week we will bring new stories from startups and influencers who are shaping and changing the world we live in. We’ll also bring you reports on topics you should know.

Follow us @techeconomyng for more.

CYBERSECURITY ESSENTIALS
byTecheconomy

BUILDING STRONGER NETWORKS AND COMMUNITIES

CYBERSECURITY ESSENTIALS
CYBERSECURITY ESSENTIALS
April 24, 2025
Techeconomy
Digital Marketing Trends and strategies for 2025 and beyond
February 27, 2025
Techeconomy
Major Lesson for Techies in 2024 and Projections for 2025
December 6, 2024
Techeconomy
Major Lessons for Techies in an AI-Driven World | Techeconomy Business Series Highlights
November 26, 2024
Techeconomy
Maximizing Profitability Through Seasonal Sales: Strategies For Success
November 8, 2024
Techeconomy
Techeconomy Business Series
October 15, 2024
Techeconomy
PRIVACY IN THE ERA OF AI: GETTING YOUR BUSINESS READY
May 30, 2024
Techeconomy
Unravel the Secrets of Marketing Everywhere All At Once with Isaac Akanni from Infobip | Infowave Podcast Episode 1
February 9, 2024
Techeconomy
The Role of Ed-tech in Life Long Learning and Continuous Education
October 19, 2023
Techeconomy
Filmmaking and Technology: A chat with Micheal Chineme Ike
June 7, 2023
Techeconomy
Search Results placeholder

WHAT IS TRENDING

https://www.youtube.com/watch?v=g_MCUwS2woc&list=PL6bbK-xx1KbIgX-IzYdqISXq1pUsuA4dz
uba

Follow Us

  • About Us
  • Contact Us
  • Careers
  • Privacy Policy

© 2025 Techeconomy - Designed by Opimedia.

No Result
View All Result
  • News
  • Tech
    • DisruptiveTECH
    • ConsumerTech
      • Accessories
      • Phones
      • Laptop
      • Gadgets and Appliances
      • Apps
    • How To
    • TechTAINMENT
  • Business
    • Telecoms
      • Broadband
    • Mobility
    • Environment
    • Travel
    • Commerce
    • StartUPs
    • TE Insights
    • Security
  • Partners
  • Economy
    • Finance
    • Fintech
    • Digital Assets
    • Personal Finance
    • Insurance
  • Features
    • IndustryINFLUENCERS
    • Guest Writer
    • Appointment
    • EventDIARY
    • Editorial
  • Apply
  • TecheconomyTV
  • Techeconomy Events
  • BusinesSENSE For SMEs
  • TBS

© 2025 Techeconomy - Designed by Opimedia.

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.