• Link to Rss this site
  • Link to LinkedIn
  • Link to Youtube
  • Link to X
  • Link to Instagram
  • English English English en
  • Deutsch Deutsch German de
Sales: +49 5251 304-800 | Support: +49 5251 304-636
NoSpamProxy
  • PRODUCT
    • NoSpamProxy Cloud
    • NoSpamProxy Protection
    • NoSpamProxy Encryption
    • NoSpamProxy Large Files
    • NoSpamProxy Disclaimer
  • SOLUTIONS
    • M365 Mail Security
    • Managed Certificates
    • 32Guards
    • AS4
  • RESOURCES
    • Documentation
    • Forum
    • Webcast Training
    • Training Courses
    • Support
    • Software Download
  • PARTNERS
    • Finding Resellers
    • Becoming Reseller
    • Partner Portal
    • NFR Licenses
  • COMPANY
    • Contact
    • Testimonials
    • Team
    • Career
    • Events
    • Awards
  • PRICES
  • BLOG
    • Blog
    • Newsletter Subscription
  • FREE TRIAL VERSION
    • Price Request
    • Free Trial Version
  • English
    • Deutsch
  • Click to open the search input field Click to open the search input field Search
  • Menu Menu
  • Phishing-Mails mit gefälschten Rechnungen

Phishing with fake invoices: Hijacked mail logins are used for new phishing attacks

Antonia Scherz
Autorin: Antonia ScherzData Scientisthttps://www.linkedin.com/in/antonia-scherz-7b4740178/–Connect on LinkedIn

Cyber criminals are currently using phishing to spread a malware called Strela Stealer via German-language emails. Strela Stealer harvests login data from Outlook and Thunderbird accounts. The criminals then use originally legitimate emails containing invoices, which they forward and send to their victims. These victims then receive what appear at first glance to be identical emails, with only the recipient address and the attachment having been changed. Instead of the invoice, the criminals send .zip files with the same name that contain malware. Our data based on the meta information collected in 32Guards shows the approach of the spammers as well as the distinctive features of phishing emails – and how you can protect your email address from misuse.

11.02.2025|last edited:11.02.2025

Beware of unexpected invoices in a business context

Since October 2024, phishing emails with legitimate sender addresses have been spreading in large quantities. Invoices are particularly frequently used as an attachment, with this attachment being attached as a .zip file with the same name. However, what would be quickly noticed in other circumstances is lost in the flood of working day spam.

Nevertheless, the combination of the word ‘invoice’ and an unknown sender in a business environment harbours the risk of attachments being opened carelessly, as many employees regularly receive invoices from unknown sources.

This risk increases further because invoices offer attackers a high success rate due to their urgency and structure. Around 43% of emails contain the word ‘invoice’ in the file name, and in 95% of cases an ‘R’ appears together with a number – indicating a deliberate tactic by the attackers to increase the credibility of the email. This is precisely why it is crucial to exercise particular caution with unexpected attachments and to carry out thorough checks before opening files.

  • Example 1: Phishing email

    Phishing Mail Invoice
  • Example 2: Phishing email

    Example 2: Phishing Mail
  • Example 3: Phishing email

    Example 3: Phishing Mail
Previous Previous Previous Next Next Next
123

Attackers rely on automation to send a large volume of emails efficiently. Since mid-October, we have been able to track a significant number of emails with suspicious attachments. Interestingly, the sending times are concentrated in the typical working hours during the week. At weekends and at night, the volume of phishing drops significantly. This is reminiscent of the so-called ‘working day spammers’ and shows a professional approach in which details such as the time of dispatch are integrated into the automated processes in order to deceive attentive recipients.

  • Phishing Mails Heatmap

    Phishing Emails Heatmap

The heatmap above shows the number of phishing emails sent from our 32Guards customer base. The darker the colour, the more emails were sent in this time frame. The x-axis shows the time of day, while the y-axis shows the days of the week. It can be clearly seen that most phishing emails were sent on Thursdays at 2 pm, while the lowest number of phishing emails were sent at the weekend, especially at night.

The (corrected) anomalies of the attachments

During spam detection by NoSpamProxy, 32Guards thoroughly analyses the metadata of attached archives, such as .zip files, in order to identify conspicuous patterns. In the first analysis phase, 32Guards primarily categorises suspicious file types. In the current case, the .zip archives contained JavaScript files with the extension .js, in which the malware was hidden. As JavaScript files are on the list of blocked file types in Outlook, for example, they could be considered particularly suspicious. However, a conspicuous file type alone is not a clear indication of criminal activity.

Another conspicuous feature was the unusual size of the packaged invoices and JavaScript files, which reached a size of up to 5 MB. However, these conspicuously large files have not been observed since the beginning of December. Instead, the attackers are now focussing on much smaller and more common file sizes, which makes detection more difficult.

  • Emails with malware: Development Size of JavaScript files

    Emails with malware Development Size of JavaScript files

The figure shows the time course from October to January on the x-axis and the size of the malware attachments sent on the y-axis. The colour highlights the size category of the attached JavaScript files. The malware, which was initially packaged in huge JavaScript files, has now found a place in smaller JavaScript files.

New phishing emails are sent in waves

The spammers’ approach of sending masses of attachments with the same name allows us to date different waves of spam based on the first appearance of a specific file name. It becomes clear that within the recipients from the NoSpamProxy customer base, stolen emails are sent in waves of varying duration and with different numbers of recipients per email.

  • First appearance Usage duration and number of emails of an attachment

    First appearance Usage duration and number of emails of an attachment

The graph shows the time at which a file was first seen on the x-axis and the number of phishing recipients per unique attachment name (dots) on the y-axis. The colouring indicates the duration for which the corresponding attachment name was observed. The accumulation of new observed file names at certain times, here at the end of October, beginning of November and beginning of December, reveals when the spammers have prepared a new wave of stolen emails. The reduction in the number of recipients per new email from October to November could indicate an adjustment aimed at circumventing mechanisms that use frequency analyses for spam detection.

Analysing the size of the packed JavaScript files and the adjustment of the sending time and volume in the new spam waves indicates an increasingly sophisticated tactic that suggests a high degree of professionalism. This assumption is further supported by analysing the IP addresses from which the emails are sent. A visualisation of these IP addresses shows the typical characteristics of an internationally operating botnet, which is also confirmed by other technical analyses of the malware sent.

  • The map shows the localisation of the IP addresses used by the phishers.

    Cyberkriminelle Lokalisation

A correctly set SPF entry can protect your email from misuse

The large number of ‘incorrectly’ set SPF records has attracted attention in the context of spam detection. An SPF record is a special DNS record that specifies which servers are authorised to send emails on behalf of a particular domain. When an email is sent, the receiving server can check the SPF record to ensure that the email actually comes from an authorised sender. If this is not the case, the email can be categorised as suspicious or rejected. In around 96% of the cases of phishing attempts, an SPF entry with ‘+all’ at the end was set for the sender’s domain. This allows all IP addresses to send emails in the name of the registered domain. If you want to prevent your own domain from being misused for sending phishing emails, you should ensure that the SPF entry is correct.

Summary and protective measures

The recurring wave of spam shows how important it is to watch out for suspicious emails and attachments. Organisations and individuals should regularly review their email security policies and ensure that the right filters are in place to block malicious files.

Another important protection mechanism is to train employees in the handling of emails, especially in terms of recognising phishing attempts and suspicious attachments. However, the example above shows that detection with the naked eye becomes more difficult.

We therefore recommend the following additional measures:

Recommended protective measures

  • Powerful email protection

    Use email protection that analyses metadata (sender email hygiene, IP address information, etc.).

  • Email Firewall

    Maintain an ‘email firewall’. More details on this in this article.

  • Content filter for email attachments

    Configure a content filter with which you can block dangerous .js files, for example.

  • Sender reputation

    Secure your email communication by checking the sender’s reputation.

In addition, we recommend further protective measures that you can implement with Microsoft solutions.

  • Suitable standard applications

    Select a suitable standard application for opening certain file types. For example, on Windows, .js files are opened with the Windows Script Host by default. This can lead to the execution of potentially malicious code. A text editor that only displays the content is recommended as the default application.

  • Microsoft Defender with Attack Surface Reduction

    Use Microsoft Defender as EDR technology with Attack Surface Reduction to block unsafe executable files or prevent executable content from being reloaded, for example via JavaScript.

Not yet using NoSpamProxy with 32Guards?

With NoSpamProxy you can reliably protect your company from cyber attacks. Request your free trial version now!

Get your free NoSpamProxy trial now
  • share 
  • share 
  • share 
  • email 

SEARCH

PRODUCT

  • All Topics
  • NoSpamProxy Cloud
  • NoSpamProxy Protection
  • NoSpamProxy Encryption
  • NospamProxy Large Files

You need support?

You can find more information about NoSpamProxy in our documentation and forum.

CATEGORY

  • All Topics
  • News
  • Product
  • Tech & Support
  • Events

NoSpamProxy Newsletter

Subscribe to Newsletter
RSS Feed Logo RSS Feed Logo Subscribeto RSS Feed

NoSpamProxy

  • NoSpamProxy Cloud
  • NoSpamProxy Encryption
  • NoSpamProxy Large Files
  • NoSpamProxy Disclaimer
  • Price request
  • Team
  • Career
  • General terms and conditions
  • Data Protection Information for Business Partners and Applicants
  • Cybersecurity (PSIRT)

Partners

  • Becoming a reseller
  • Partners
  • Order Certificates
  • Newsletter

Categories

  • All topics
  • News
  • Support
  • Updates
  • Order certificates

Latest News

  • Warum Sie ARC in NoSpamProxy jetzt aktivieren sollten Preview
    Why you should activate ARC in NoSpamProxy now11.07.2025 - 12:08
  • SVG files in email attachments: Danger by malicious code preview
    Attached SVG file: Danger from malicious code04.07.2025 - 10:00
  • NoSpamProxy Update
    NoSpamProxy Cloud June update: Rollout started30.06.2025 - 06:00
IMPRINT • EULA • Privacy Policy • • © 2025 Net at Work GmbH
  • Link to Rss this site
  • Link to LinkedIn
  • Link to Youtube
  • Link to X
  • Link to Instagram
Link to: DMARC Policy: Why p=none is a bad choice Link to: DMARC Policy: Why p=none is a bad choice DMARC Policy: Why p=none is a bad choiceDMARC-Policy Warum p=none keine gute Idee ist Preview Link to: End-to-End Encryption or Gateway-to-Gateway Encryption? Link to: End-to-End Encryption or Gateway-to-Gateway Encryption? Was ist Ende-zu-Ende-Verschlüsselung PreviewEnd-to-End Encryption or Gateway-to-Gateway Encryption?
Scroll to top Scroll to top Scroll to top