Methods
phone email sms voicemail chatbot physical
Payloads
doc docx xls xlsx ppt pptx pdf hta exe bat zip xss csrf click-once phishing page ole drive-by-download usb drop cloud hosted file
Goals
cred harvest malware physical access info gather bec
Description

This one is less pretext and more of a specific tactic, but it deserves its entry. The idea is the attacker emails the target and includes an "attachment" in the email. The email references the attachment in a way that entices the user to double-click the "attachment" to view it. The email is HTML-based and the "attachment" is actually just cleverly coded CSS obfuscating a link. When the victim double-clicks the "attachment", it opens up a web page, which could be used in a drive-by-download, thus avoiding your real attachment triggering any AV scanners in email delivery. The actual email could be about any topic, but should entice the victim to click on the "attachment". A few examples are: signed contracts, invoices, photos, etc.

Example Email(s)

Source: https://twitter.com/troyhunt/status/1296215917932630016

Example Payload Ideas

User double clicks the fake "attachment", which opens up a browser and auto-downloads some malware.

Analysis

Placing a malicious file in a victim's inbox can be extremely difficult with modern AV scanners. This tactic presents an opportunity for attackers to trick victim's into downloading a file onto their computer, without having to worry about secure email gateways catching it.