Threat Spotlight: Proportion of malicious HTML attachments doubles within a year
The legitimate use of HTML
HTML stands for Hypertext Markup Language, and it is used to create and structure content that is displayed online. HTML is also commonly used in email communication — for example in automated reports that users might be receiving on regular basis, such as newsletters, marketing materials, and more. In many cases, reports are attached to an email in HTML format (with the file extension .html, .htm or .xhtml, for example).
If the communication appears to come from a known or trusted brand, the recipient is unlikely to be suspicious.
The malicious use of HTML
However, attackers can successfully leverage HTML as an attack technique by using well-crafted messages and/or compromised websites and malicious HTML file attachments to trick users.
This approach is used by attackers to conceal malicious intentions such as phishing and credential theft, and more.
Protection against malicious HTML- based attacks should take into account the entire email carrying HTML attachments, looking at all redirects and analyzing the content of the email for malicious intent. More on that below.
Recent examples of malicious HTML attachments are often similar to those seen in the past.
For example, the following phishing attachment that looks like a Microsoft login has been popular for some years, but their continued and widespread use in attacks suggests attackers remain successful in trapping victims.
Proportion of unique attacks
If you compare the total number of malicious HTML detections to how many different (unique) files were detected, it becomes clear that the growing volume of malicious files detected is not simply the result of a limited number of mass attacks, but the result of many different attacks each using specially crafted files.
For example, daily detection data for the three months from January to March 2023 reveals two significant attack peaks, on March 7 and March 23.
On March 7, there were 672,145 malicious HTML artifacts detected in total, comprising 181,176 different items. This means that around a quarter (27%) of the detected files were unique and the rest were repeat or mass deployments of those files.
However, on March 23, almost nine in ten (405,438 — 85%) of the total 475,938 malicious HTML artefacts were unique ― which means that almost every single attack was different.
HTML attachments continue to dominate the list of file types used for malicious purposes
Barracuda analysis further shows that not only is the overall volume of malicious HTML attachments increasing, nearly a year on from our last report, HTML attachments remain the file type most likely to be used for malicious purposes.
When it comes to attack tactics and tools, the fact that something has been around for a while doesn’t appear to make it any less potent. Malicious HTML is still being used by attackers because it works. Getting the right security in place is as important now as it has ever been, if not more so.
How to protect against malicious HTML attachments
- Email protection – It is essential is to have effective email protection in place and ensure that your security scanning can identify and block malicious HTML attachments. Because these are not always easy to identify for the reasons above, the best solutions will include machine learning and static code analysis that will evaluate the content of an email and not just an attachment.
- User education and awareness – Train people to spot and report potentially malicious HTML attachments. Given the volume and diversity of these type of attacks, it’s probably good to be wary of all HTML attachments, especially those coming from sources they haven’t seen before. Remind people not to share their login credentials with anyone, ever.
- Robust authentication and access controls – Multifactor authentication (MFA) remains a good access control, but attackers are increasingly turning to advanced social engineering techniques, such as MFA fatigue to bypass many types of MFA protection. Consider turning to Zero Trust Access measures to enhance security. An effective Zero Trust solution such as Barracuda CloudGen Access dynamically monitors multiple parameters — user, device, location, time, resources being accessed, and more — which makes it much more difficult for attackers to compromise your network using stolen credentials.
- If a malicious HTML file does get through – Make sure you have post-delivery remediation tools to quickly identify and remove malicious emails from all user inboxes. An automated incident response can help to do this before the attack spreads through an organization. In addition, account takeover protection can monitor and alert you to any suspicious account activity if login credentials were to be compromised.
Barracuda has identified 13 email threat types, and published a guide explaining how they target and compromise victims, and how to defend against them.