SEC504: Hacker Tools, Techniques, and Incident Handling

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usConnect, learn, and share with other cybersecurity professionals
Engage, challenge, and network with fellow CISOs in this exclusive community of security leaders
Become a member for instant access to our free resources.
Sign UpMission-focused cybersecurity training for government, defense, and education
Explore industry-specific programming and customized training solutions
Sponsor a SANS event or research paper
We're here to help.
Contact UsCyber attackers have continued to adapt their phishing methods to the changing technological and social landscape.
Note: This blog post was inspired by a social media post in which I was demonstrating the value of leveraging Cyber Threat Intelligence (CTI) to guide your security awareness program. In the post I demonstrate how a Proofpoint monthly report can help you better understand how threats are targeting you with Phishing, and how they are not.
Phishing has been and continues to be one of the most common methods (TTPs) cyber attackers use because it is so effective. Phishing is a simple attack vector that enables cyber attackers to easily scale their attacks, customize for their intended targets, and bypass many security controls. Reports like the Verizon DBIR or the Microsoft Digital Defense continue to identify phishing as a top risk. While technologies like email filtering (example Proofpoint) and EDR (example Crowdstrike) make it much more difficult to succeed, cyber attackers have continued to adapt.
Over the past several years phishing has continued to evolve. While many of the emotional lures used to get people to click and fall victim remain the same (covered in more detail below), we have seen changes in both cyber attacker modalities and goals. Here are some of the most common phishing trends we are seeing.
Traditionally phishing was done through email. However, we have seen a dramatic shift where messaging technologies are also being used, to include Apple iMessage, WhatsApp, and standard SMS functionality. Texting has become increasing popular, as many phones lack any type of filtering capability, which means the scams and attacks are far more likely to get through. Also, since text messages tend to be much shorter with little context, it’s much harder to confirm what is legitimate versus what is an attack. As such, when training your workforce emphasize that phishing attacks happen not just over email, but via any messaging technology.
The goal with phishing attacks traditionally was for people to install malware on their computer and infect their systems for the cyber attacker. However, malware infections are becoming easier and easier for security teams to detect, so that behavior has radically changed. In today’s world we are seeing three different goals of phishing attacks:
One way you can determine what type of phishing attacks your organization is seeing is to check with your Cyber Threat Intelligence team, your Email Support team, or anyone responsible for your email filtering or perimeter defenses. If you have some type of anti-phishing solutions (such as Proofpoint) your security team can log and categorize the type of phishing attacks your organization is seeing. Below is an example of a real report generated by Proofpoint for a real company. In this chart we see the following:
We do not recommend that you try to teach people about every different type of phishing attack and every lure possible. Not only is this most likely to be overwhelming to your workforce, but cyber attackers are constantly changing their lures and techniques. Instead, focus on the most commonly shared indicators and clues of an attack. This way your workforce will be trained and enabled regardless of the method or lures that cyber attackers use.
In addition, emphasize that phishing attacks are no longer just email but use different messaging technologies. That is why these indicators are so effective: They are common in almost every phishing attack, regardless of whether it's via email or messaging. The most common indicators include:
These are typical indicators that have been recommended in the past but we no longer recommend them:
To learn more about leveraging Cyber Threat Intelligence and more effectively managing human risk, consider the three-day SANS MGT433 Managing Human Risk course.
Learn more about the SANS Phishing Awareness Training
Lance revolutionized cyber defense by founding the Honeynet Project. Over the past 25 years, he has helped 350+ organizations worldwide build resilient security cultures, transforming human risk management into a cornerstone of modern cybersecurity.
Read more about Lance Spitzner