{"id":9841,"date":"2013-01-18T09:52:49","date_gmt":"2013-01-18T17:52:49","guid":{"rendered":"http:\/\/www.intego.com\/mac-security-blog\/?p=9841"},"modified":"2013-04-03T11:48:05","modified_gmt":"2013-04-03T18:48:05","slug":"new-phish-tries-to-evade-researchers","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/new-phish-tries-to-evade-researchers\/","title":{"rendered":"New Phish Tries to Evade Researchers"},"content":{"rendered":"<p>Malware has been employing anti-researcher and detection-evading tactics, almost since the beginning of malicious code. And while phishing and spam have been using detection-evading techniques for ages, anti-researcher tactics seem to be a new tool in their arsenal. Both phishing and spam seemed to prefer the shotgun approach, preferring quantity to quality when it came to finding victims.<\/p>\n<p>According to an <a href=\"http:\/\/www.scmagazine.com\/phishers-hang-a-velvet-rope-to-keep-their-attacks-quiet\/article\/276377\/\">article in SC Magazine<\/a>, this is beginning to change. This change employs a simple tactic that\u2019s commonly used in emails sent by companies to existing customers \u2013 it includes a link that can only be accessed by the user him or herself. Anyone else accessing the link will be given an error message. By using this technique, they make it difficult for anyone who isn\u2019t the targeted user to view the phishing email, and it makes adding the phish to anti-phishing detection potentially more difficult.<\/p>\n<p>But if the history of anti-malware has taught us anything, \u201cmore difficult\u201d does not by any stretch of the imagination mean \u201cimpossible.\u201d Sometimes, the evasion itself can give detection methods a solid hint that something is up to no good. In the case of polymorphic viruses, AV software can often use the code that generates the virus\u2019 changes to identify it. Legitimate software seldom tries to do such squirrelly things as changing their own code. Because companies commonly use dynamic mass emails, it might be difficult to exclude this behavior generically. But phishing emails that lead to a unique site and push the sort of code that would be useful for a zero-day exploit would be very clearly problematic.<\/p>\n<p>Have you seen any of this new phishing behavior? Or are all of the questionable emails you receive caught in spam filters or by security software?<\/p>\n<p><span style=\"font-size: x-small;\">photo credit: <a href=\"http:\/\/www.flickr.com\/photos\/28288673@N07\/6457165789\/\">ivanpw<\/a> via <a href=\"http:\/\/photopin.com\">photopin<\/a> <a href=\"http:\/\/creativecommons.org\/licenses\/by\/2.0\/\">cc<\/a><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Malware has been employing anti-researcher and detection-evading tactics, almost since the beginning of malicious code. And while phishing and spam have been using detection-evading techniques for ages, anti-researcher tactics seem to be a new tool in their arsenal. Both phishing and spam seemed to prefer the shotgun approach, preferring quantity to quality when it came [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":9849,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[5],"tags":[86,102],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Malware has been employing anti-researcher and detection-evading tactics, almost since the beginning of malicious code. And while phishing and spam have\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/new-phish-tries-to-evade-researchers\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"New Phish Tries to Evade Researchers - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Malware has been employing anti-researcher and detection-evading tactics, almost since the beginning of malicious code. And while phishing and spam have\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/new-phish-tries-to-evade-researchers\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2013-01-18T17:52:49+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2013-04-03T18:48:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/no-phishing-thumb.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lysa Myers\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/new-phish-tries-to-evade-researchers\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/no-phishing-thumb.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/no-phishing-thumb.jpg\",\"width\":\"400\",\"height\":\"260\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/new-phish-tries-to-evade-researchers\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/new-phish-tries-to-evade-researchers\/\",\"name\":\"New Phish Tries to Evade Researchers - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/new-phish-tries-to-evade-researchers\/#primaryimage\"},\"datePublished\":\"2013-01-18T17:52:49+00:00\",\"dateModified\":\"2013-04-03T18:48:05+00:00\",\"description\":\"Malware has been employing anti-researcher and detection-evading tactics, almost since the beginning of malicious code. And while phishing and spam have\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/new-phish-tries-to-evade-researchers\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/new-phish-tries-to-evade-researchers\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/new-phish-tries-to-evade-researchers\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"New Phish Tries to Evade Researchers\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/new-phish-tries-to-evade-researchers\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/new-phish-tries-to-evade-researchers\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a\"},\"headline\":\"New Phish Tries to Evade Researchers\",\"datePublished\":\"2013-01-18T17:52:49+00:00\",\"dateModified\":\"2013-04-03T18:48:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/new-phish-tries-to-evade-researchers\/#webpage\"},\"wordCount\":304,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/new-phish-tries-to-evade-researchers\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/no-phishing-thumb.jpg\",\"keywords\":[\"Malware\",\"Phishing\"],\"articleSection\":[\"Security News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/new-phish-tries-to-evade-researchers\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a\",\"name\":\"Lysa Myers\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g\",\"caption\":\"Lysa Myers\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/lysam\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Malware has been employing anti-researcher and detection-evading tactics, almost since the beginning of malicious code. And while phishing and spam have","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/new-phish-tries-to-evade-researchers\/","og_locale":"en_US","og_type":"article","og_title":"New Phish Tries to Evade Researchers - The Mac Security Blog","og_description":"Malware has been employing anti-researcher and detection-evading tactics, almost since the beginning of malicious code. And while phishing and spam have","og_url":"https:\/\/www.intego.com\/mac-security-blog\/new-phish-tries-to-evade-researchers\/","og_site_name":"The Mac Security Blog","article_published_time":"2013-01-18T17:52:49+00:00","article_modified_time":"2013-04-03T18:48:05+00:00","og_image":[{"width":"400","height":"260","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/no-phishing-thumb.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Lysa Myers","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/new-phish-tries-to-evade-researchers\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/no-phishing-thumb.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/no-phishing-thumb.jpg","width":"400","height":"260"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/new-phish-tries-to-evade-researchers\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/new-phish-tries-to-evade-researchers\/","name":"New Phish Tries to Evade Researchers - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/new-phish-tries-to-evade-researchers\/#primaryimage"},"datePublished":"2013-01-18T17:52:49+00:00","dateModified":"2013-04-03T18:48:05+00:00","description":"Malware has been employing anti-researcher and detection-evading tactics, almost since the beginning of malicious code. And while phishing and spam have","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/new-phish-tries-to-evade-researchers\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/new-phish-tries-to-evade-researchers\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/new-phish-tries-to-evade-researchers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"New Phish Tries to Evade Researchers"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/new-phish-tries-to-evade-researchers\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/new-phish-tries-to-evade-researchers\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a"},"headline":"New Phish Tries to Evade Researchers","datePublished":"2013-01-18T17:52:49+00:00","dateModified":"2013-04-03T18:48:05+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/new-phish-tries-to-evade-researchers\/#webpage"},"wordCount":304,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/new-phish-tries-to-evade-researchers\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/no-phishing-thumb.jpg","keywords":["Malware","Phishing"],"articleSection":["Security News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/new-phish-tries-to-evade-researchers\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a","name":"Lysa Myers","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g","caption":"Lysa Myers"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/lysam\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/no-phishing-thumb.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-2yJ","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/9841"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=9841"}],"version-history":[{"count":7,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/9841\/revisions"}],"predecessor-version":[{"id":13121,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/9841\/revisions\/13121"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/9849"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=9841"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=9841"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=9841"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}