The Adversarial Phishing Simulation Kill-Chain
Real-World Threat Actor Tactics
Reconnaissance
We replicate how threat actors gather intelligence - understanding job roles, technology stacks, suppliers and partners and leveraging public data.
Pretext Development
We create realistic narratives that feel credible to your organisation - use realistic branding, relevant context, familiar language and tone, and exploit current events.
Delivery Mechanism
Phishing today is more than just inboxes - we deploy emails, SMS messages, AI-voice calls and QR codes.
Bypass Technical Controls
Our simulations find ways around technical security measures - lookalike domains, embedded links, redirection tactics, and polymorphic attacks.
Exploit Human Behaviour
Our simulations tap into human emotions to test employees' critical thinking skills under pressure - creating urgency, concern/fear, or curiosity.
Payload Delivery
Simulated collection of credentials, the triggering of a simulated download, or the recording of information provided during an AI-powered voice call.
Detection and Reporting
Phase One - Strategising the Approach
Reconnaissance
-
Understanding Job Roles - different roles within an organisation have varying levels of access and responsibilities, making them potential targets for different types of phishing attacks.
-
Analysing Technology Stacks - awareness of the technologies an organisation uses can inform the creation of technical lures and which phishings forms would be most effective.
-
Identifying Suppliers and Partners - we consider your key suppliers and partners to create simulations that mimic communications from these entities.
-
Leveraging Public Data - simulating spear-phishing, we conduct Open Source Intelligence (OSINT) to uncover information available online to enable highly convincing, personalised attacks.
Crafting Believable and Relevant Pretexts
-
Realistic Branding - using the actual logos, colour schemes, and language of familiar companies, services, and internal communications.
-
Contextual Relevance - tailoring the subject lines and content to industry trends, departmental operations or internal organisational announcements that employees might expect to see.
-
Familiar Language and Tone - adopting the communication style commonly used by the impersonated entity, whether it's formal business language or a more casual tone from a colleague.
-
Exploiting Current Events - leveraging timely topics or news items that might make a phishing attempt seem more legitimate or urgent.
Different Types of Lures
- Financial - exploiting organisations' financial operations or individuals' financial anxieties or desire for gains by mimicking urgent payment requests, fraudulent invoices, investment opportunities, or tax-related scams.
- Technical - preys on organisations' digital operations and users' fear of security breaches by posing as IT support or a Managed-Service Provider with software updates, warnings about compromised accounts, or by notifying them of critical system errors.
- Social - builds rapport or creates a sense of obligation through impersonating colleagues, managers, or HR.
Phase Two - Simulation Delivery
Dynamic Stages
-
Initial Contact - first communication designed to pique interest or create urgency.
-
Action Trigger - based on the attackers' goals - a link to a fake login page, or a prompt to provide sensitive information.
-
Follow-Up Communication - additional correspondence to verify the initial contact and action request.
Multiple Methods of Delivery
- Email Phishing - the traditional and still most prominent method, involving impersonation through email communications that may include malicious attachments and links or urge action or information from the recipient.
- Smishing - SMS messages containing malevolent links or requests for sensitive information, often leveraging a sense of urgency or authority.
- Vishing - Phone calls where attackers impersonate trusted entities to extract information or persuade users to take specific actions.
- Quishing - Malicious QR codes that can lead to phishing websites or trigger malware downloads when scanned.
Bypassing Technical Controls
-
Lookalike Domains - using dedicated domains that are very similar to the real ones (e.g., echoesecure.co.uk instead of echosecure.co.uk) to see if employees notice subtle discrepancies.
-
Embedded Links - hiding malicious links behind seemingly legitimate text or buttons.
-
Redirection Tactics - simulating scenarios where a user clicks a seemingly safe link but is then redirected to a phishing site.
-
Social Engineering Bypasses - crafting scenarios that puts time-sensitive pressure on employees to bypass standard security protocols.
-
Polymorphic Attacks - dynamically changes their characteristics, such as email content, links, or attachments, with each attempt to evade detection by security filters.
Exploiting Human Behaviour
-
Urgency - crafting scenarios that demand immediate action to bypass careful consideration.
-
Concern/Fear - simulating threats of data breaches or operational disruption if specific actions aren't taken.
-
Curiosity - using intriguing or sensationalised subject lines and content to entice users to click links or open attachments without proper scrutiny.
Adapting Tactics
-
Regularly Conduct Simulations - we recommend conducting simulations on an ongoing basis to track progress, reinforce learning, and identify new emerging vulnerabilities.
-
Evolving Content and Focus - with each subsequent Adversarial Phishing Simulation (APS), we adapt the content, complexity, and focus based on the lessons learned from previous campaigns and the latest intelligence on real-world threats. This ensures your employees are constantly challenged and prepared for the current threat landscape.
Phase Three - Outcomes
Results Analysis
-
Identify Susceptible Groups and Individuals - pinpoint specific departments, roles, or even individuals who may require additional focused training.
-
Recognise Prevalent Patterns of Behaviour - understand which types of lures, behavioural triggers, or attack vectors were most successful within your organisation.
-
Highlight Areas of Weakness in Awareness - determine specific attack vectors where employees demonstrated a lack of understanding or vigilance.
Training Webinars
-
Highlight Common Vulnerabilities - based on our extensive experience analysing real-world attacks and simulation results, we pinpoint recurring weaknesses that make organisations susceptible to phishing.
-
Explain the Risks - we clearly articulate the potential impact of these vulnerabilities, translating technical jargon into understandable business risks.
-
Provide Step-by-Step Remediation Guidance - we offer practical, actionable steps that organisations can take to address these common weaknesses, including policy adjustments, configuration changes, and employee training strategies.
-
Answer Questions and Facilitate Discussion - these interactive sessions provide a platform for customers to ask specific questions and share their own challenges.
-
Role-Based Training - we can tailor specific training content for departments to focus on the phishing pretexts they are most likely to see in the real-world.
-
Bespoke Sessions - we offer the option for organisations to have bespoke webinars based on the results and analysis of their simulation campaigns