ADVERTISEMENT
Thursday, April 30, 2026
Tech | Business | Economy
No Result
View All Result
  • Technology
    • Trends
    • Telecoms
      • Broadband
    • ConsumerTech
      • Gadgets and Appliances
      • Apps
      • Accessories
      • Reviews
      • Unboxing
    • EnterpriseTECH
    • Security & Data Protection
    • How To
    • GameTech
  • Business
    • Company News
    • StartUPs
      • Founder’s Story
      • Funding
    • Deals
    • People & Moves
    • SME & Entrepreneur Focus
    • BUSINESS SENSE FOR SMEs
    • Competition & Market Positioning
    • Commerce & Mobility
    • Travel
    • WomenPreneurs
  • Economy
    • Macroeconomic Trends
      • Macro Monday
      • TE Insights
    • Finance
      • Banks
      • Fintech
      • Insurance
      • Digital Assets
      • Personal Finance
    • Policies
      • Tech & Society
    • Market Analysis
    • Jobs & Workforce Economy
  • Features
    • Guest Writer
      • Chidiverse
      • Digital Assets
    • EventDIARY
    • IndustryINFLUENCERS
    • MarkTECH
    • TBS
    • NewsEXTRA
  • Editorial
  • Brand Content
  • TECHECONOMY TV
Thursday, April 30, 2026
Tech | Business | Economy
No Result
View All Result
Tech | Business | Economy
No Result
View All Result

Home » Using HTML Attachments Allows Phishers to Avoid Detection – Report

Using HTML Attachments Allows Phishers to Avoid Detection – Report

Yinka Okeowo by Yinka Okeowo
May 16, 2022
in Security & Data Protection
Reading Time: 5 mins read
0

Kaspersky experts warn users about the growing threat coming from the increased numbers of phishing emails containing HTML files.

From January to April 2022, Kaspersky researchers blocked nearly 2 million phishing emails containing HTML attachments.

https://techeconomy.ng/2022/05/introducing-new-version-of-kaspersky-safe-kids-solution-for-youtube-monitoring-on-ios/

Using HTML files in phishing letters is one of the latest and popular tricks abused by fraudsters.

Usually, such links are easily detected by anti-spam engines or antivirus software but using HTML attachments has allowed cybercriminals to avoid detection.

Many users aren’t even aware that files in phishing emails can be insecure, so they unsuspectingly open these HTML attachments, which turn out to be dangerous and targeted weapons used by cybercriminals.

Subscribe to our Telegram channel for the latest updates.

Follow the latest developments with instant alerts on breaking news, top stories, and trending headlines.

Join Channel

Fraudsters can stylise HTML attachments to make them look identical to the pages on a company’s official website.

They target the official website’s users and copy its style, images, scripts and other multimedia components, using it as bait to trick their victims into entering vulnerable data in the phishing form.

HTML Attachments
| Cybercriminals lure victims into opening malicious HTML attachments, claiming that the file is only safe through this link (Source: Kaspersky)

There are two main types of HTML attachments used by cybercriminals: HTML files with a phishing link or entire malicious pages. In the first case, attackers will send an HTML file with text inside, claiming to have important data, such as a bank’s notification about a large transfer attempt.

The user is prompted to click on a link to the bank’s site, to stop the transaction, which instead leads to a phishing page.

In some cases, the victim doesn’t even have to click the link. When the user tries to open the HTML attachment, it will automatically redirect them to a malicious site.

Once on this page, victims are requested to fill out a data-entry form to review business-related files, protect their bank account or even receive a government payment.

It is only later that the victim finds out they’ve had their personal data and bank details stolen.

The second type of HTML attachments are entire phishing pages. These files allow cybercriminals to save on hosting fees and avoid using websites because the phishing form and the script used to collect data are fully contained within the attachment.

Used as a phishing site, the HTML file can also be personalised, depending on the intended target and the attack vector used to gain the victim’s trust.

For example, a fraudster could distribute a phishing email among the employees of a company, appearing as though it’s asking to verify a contract, but is actually a malicious HTML file.

Such attachments will have all the visual attributes of that company: logo, style and even the name of the boss as its sender. Inside the file, the victim is requested to enter the login and password for their corporate account in order to access the document.

This data then falls directly into the hands of the cybercriminal, who can use this information to break into the company’s corporate network.

HTML Attachments
| An example of a phishing page in the HTML attachment (Source: Kaspersky)

While security solutions can already block emails containing HTML attachments with malicious scripts or phishing links in plain text, cybercriminals are now using different tactics to avoid being blocked.

For example, fraudsters often distort the phishing link or the whole HTML file with muddled or garbage code.

Although this junk and incoherent text doesn’t appear on the user’s screen, it still makes it harder for anti-spam engines to detect and consequently block the email.

“Cybercriminals use cleverly disguised requests for login credentials to dupe unsuspecting victims into entering their usernames and passwords. Every year we block millions of phishing pages and this number is only expected to grow, meaning users must stay alert and be aware of the danger that these emails can bring. Cybercriminals have created a complex and advanced infrastructure where even novice scammers can create thousands of phishing pages, using ready-made templates, then target a vast range of users. With any amateur now able to create his own phishing page, you have to be particularly careful when opening any links from an email or messaging service”, comments Roman Dedenok, security researcher at Kaspersky.

To protect yourself from phishing, Kaspersky recommends:

  • Checking every link before clicking. Hover over it to preview the URL and look out for misspellings or any other irregularities.
  • Only entering a username and password over a secure connection. Look for the HTTPS prefix before the site URL, indicating the connection to the site is secure.
  • Remembering that even if a message or a letter appears to come from one of your best friends, their account might have been hacked. Remain cautious in all situations and scrutinise all links and attachments even if they seem to come from a friendly source.
  • Paying special attention to messages that appear to be from official organisations, such as banks, tax agencies, online shops, travel agencies, airlines and so on. Even internal messages from your own office. It’s not hard for criminals to fabricate a fake letter that looks legitimate.
  • Avoid opening any unexpected files sent by online gaming friends or other online buddies. They may contain ransomware or even spyware, just like attachments from official-looking e-mails.
  • Providing your staff with basic cybersecurity hygiene training. Conduct a simulated phishing attack to ensure that they know how to distinguish phishing emails from real ones.
  • Using a protection solution for endpoints and mail servers with anti-phishing capabilities, such as Kaspersky Endpoint Security for Business, to decrease the chance of infection through phishing emails.
  • Protecting your Microsoft 365 cloud service, if using it. Kaspersky Security for Microsoft Office 365 has a dedicated anti-spam and anti-phishing function as well as protection for SharePoint, Teams and OneDrive apps to keep business communications secure. 

0Shares

Previous Post

Kenya’s Twiga Launches ‘Twiga Fresh’, Includes Farming, Distribution of Own-Produce in Offerings 

Next Post

[Opinion] Pantami: A Continental Change Icon

Yinka Okeowo

Yinka Okeowo

My call is report on technology, innovation and the business of the digital economy.

Related Posts

Oluwole Asalu on data and privacy, Personalisation and AI | infrastructure in Nigeria | Nigeria digital defences

Why Nigeria’s Digital Defences Must Evolve or Risk Being Overwhelmed

April 30, 2026
Dr Vincent Olatunji - Nigeria Data Protection Commission - NDPC speaks on DPCOs | Nigeria records cyber attacks

Nigeria Records 4,000 Weekly Attacks amid $10.5tn Global Cybercrime – Olatunji

April 30, 2026

DG NITDA Calls for Urgent Action on AI-Driven Cyber Threats

April 23, 2026
Load More
Next Post

[Opinion] Pantami: A Continental Change Icon

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

I agree to the Terms & Conditions and Privacy Policy.

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Techeconomy Podcast
Techeconomy Podcast

The Techeconomy Podcast is a thought-leadership show exploring the powerful intersection of technology, business, and the economy, with a strong focus on Africa’s fast-evolving digital landscape.

PROTECTING INNOVATION IN AFRICA’S STARTUP ECOSYSTEM
byTecheconomy

Protecting Innovation in Africa’s Startup Ecosystem . A timely conversation for the future of African entrepreneurship.

PROTECTING INNOVATION IN AFRICA’S STARTUP ECOSYSTEM
PROTECTING INNOVATION IN AFRICA’S STARTUP ECOSYSTEM
April 29, 2026
Techeconomy
BUILDING TRUST IN AFRICA ECOSYSTEM
February 27, 2026
Techeconomy
Navigating a Career in Tech Sales
January 29, 2026
Techeconomy
How Technology is Transforming Education, Health, and Business
November 27, 2025
Techeconomy
INNOVATION IN MOBILE BANKING
October 30, 2025
Techeconomy
Search Results placeholder
  • About Us
  • Careers
  • Contact Us
  • Privacy Policy

© 2026 TECHECONOMY.

No Result
View All Result
  • Technology
  • Business
  • Economy
  • Features
  • Editorial
  • Brand Content
  • TECHECONOMY TV

© 2026 TECHECONOMY.

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.