Header Monthly Email Threat Review

Email Threat Review April 2022

Written by Security Lab / 17.05.2022 /
Home » Blog » Email Threat Review April 2022

Executive Summary

  • Around 2022-04-07, an obtrusive malspam campaign spreading the Formbook malware using malicious Word documents exploiting CVE-2017-11882 made Word documents this month’s most used file format in attacks.
  • On 2022-04-22, the Emotet botnet operators started using LNK files to spread via email. But at the end of the month, they switched back to XLS malicious documents.

Summary

In this installment of our monthly email threat review, we present an overview of the email-based threats observed in April 2022 and compare them to the previous month’s threats.

The report provides insights into:

Unwanted emails by category

The following table shows the distribution of unwanted emails per category.

Email category%
Rejected80.58
Spam13.88
Threat4.71
AdvThreat0.81
Content0.03

The following histogram shows the email volume per category per day.

The spike in rejected emails from 2022-04-07 to 2022-04-12 can be attributed to a large-scale sextortion email scam campaign in the German language.

Methodology

The listed email categories correspond to the email categories listed in the Email Live Tracking of Hornetsecurity’s Control Panel. So our users are already familiar with them. For others, the categories are:

CategoryDescription
SpamThese emails are unwanted and are often promotional or fraudulent. The emails are sent simultaneously to a large number of recipients.
ContentThese emails have an invalid attachment. The administrators define in the Content Control module which attachments are invalid.
ThreatThese emails contain harmful content, such as malicious attachments or links, or they are sent to commit crimes like phishing.
AdvThreatAdvanced Threat Protection has detected a threat in these emails. The emails are used for illegal purposes and involve sophisticated technical means that can only be fended off using advanced dynamic procedures.
RejectedOur email server rejects these emails directly during the SMTP dialog because of external characteristics, such as the sender’s identity, and the emails are not analyzed further.

File types used in attacks

The following table shows the distribution of file types used in attacks.

File type (used in malicious emails)%
Word47.2
Archive19.0
PDF11.5
HTML9.2
Excel6.1
Executable2.6
Disk image files2.4
Other1.3
Script file0.4
Email0.1
LNK file0.1

The following histogram shows the email volume per file type used in attacks per seven days.

The spike around 2022-04-07 can be attributed to a large and very obtrusive malspam campaign spreading the Formbook malware using malicious Word documents exploiting CVE-2017-11882.

Industry Email Threat Index

The following table shows our Industry Email Threat Index calculated based on the number of threat emails compared to each industry’s clean emails (in median).

IndustriesShare of threat in threat and clean emails
Manufacturing industry5.3
Healthcare industry5.2
Research industry5.0
Automotive industry4.9
Media industry4.5
Education industry4.3
Utilities4.1
Construction industry4.0
Professional service industry3.9
Mining industry3.9
Retail industry3.8

The following bar chart visualizes the email-based threat posed to each industry.

The Top 3 industries in our email threat index remain unchanged. However, the research industry has fallen from 1st to 3rd place.

Methodology

Different (sized) organizations receive a different absolute number of emails. Thus, we calculate the percent share of threat emails from each organization’s threat and clean emails to compare organizations. We then calculate the median of these percent values for all organizations within the same industry to form the industry’s final threat score.

Attack techniques

The following table shows the attack techniques used in attacks.

Attack technique%
Phishing37.7
Other29.8
URL9.8
Advance-fee scam8.1
Maldoc7.4
Extortion2.9
Executable in archive/disk-image2.8
Impersonation1.6

The following histogram shows the email volume per attack technique used per hour.

The increase in maldocs (malicious documents) used can be attributed to the aforementioned large-scale Formbook campaign. The maldocs of the Formbook campaign can also be clearly seen in the data plot around 2022-04-07.

Impersonated company brands and organizations

The following table shows which company brands and organizations our systems detected most in impersonation attacks.

Impersonated brand or organization%
Sparkasse77.3
Amazon5.0
Other7.2
LinkedIn3.0
Postbank2.2
Deutsche Post / DHL2.0
Dropbox1.1
Netflix0.7
Microsoft0.6
UPS0.5
Fedex0.4

The following histogram shows the email volume for company brands and organizations detected in impersonation attacks per hour.

The German bank Sparkasse continues as the most impersonated entity used in attacks.

Highlighted threat email campaigns

This month we want to highlight Emotet’s LNK file campaign. Emotet is malicious software that is used to steal personal information from infected computers. It is a type of Trojan horse that is spread through spam email messages. Emotet can also be used to install other types of malware on an infected computer, such as ransomware.

On 2022-04-22, the Emotet botnet operators started to use LNK files to spread the Emotet malware via emails. To this end, they replaced their previously used malicious XLS documents with an LNK file. LNK files are shortcuts that link to other files. However, these files can also inject commands into executable files. This can allow malware to be installed on the user’s computer without their knowledge. If a user receives a .lnk file from an untrusted source, they should not open it.

The emails containing Emotet’s malicious LNK files follow the same email conversation threat hijacking scheme as regular Emotet emails. The LNK malware was usually sent where the malicious XLS document would be placed, i.e., in some cases directly attached to the email but in others attached in a password-protected ZIP file with the password listed in the email.

The LNK files had different variations. All of them used Windows\system32\cmd.exe as the target file for the LNK. The command-line arguments of the LNK were then used to provide commands to cmd.exe to execute. In one variant, a VBS script was appended to the end of the LNK file, which was extracted via findstr and written to a .vbs file, and executed by the command line arguments in the LNK file.

Other variants used Powershell in the command line arguments of the LNK files to execute a download of the Emotet loader.

The following histogram shows the email volume for Emotet’s LNK email campaign per 3 hours, comparing it against its XLS campaign.

We assume that Emotet’s operators switched back to XLS files because their LNK files had a much higher detection rate across security vendors.

You might also be interested in: