Skip to main content
U.S. Department of Energy
Office of Scientific and Technical Information

Omen: identifying potential spear-phishing targets before the email is sent.

Technical Report ·
DOI:https://doi.org/10.2172/1093687· OSTI ID:1093687

We present the results of a two year project focused on a common social engineering attack method called "spear phishing". In a spear phishing attack, the user receives an email with information specifically focused on the user. This email contains either a malware-laced attachment or a link to download the malware that has been disguised as a useful program. Spear phishing attacks have been one of the most effective avenues for attackers to gain initial entry into a target network. This project focused on a proactive approach to spear phishing. To create an effective, user-specific spear phishing email, the attacker must research the intended recipient. We believe that much of the information used by the attacker is provided by the target organization's own external website. Thus when researching potential targets, the attacker leaves signs of his research in the webserver's logs. We created tools and visualizations to improve cybersecurity analysts' abilities to quickly understand a visitor's visit patterns and interests. Given these suspicious visitors and log-parsing tools, analysts can more quickly identify truly suspicious visitors, search for potential spear-phishing targeted users, and improve security around those users before the spear phishing email is sent.

Research Organization:
Sandia National Laboratories (SNL-NM), Albuquerque, NM (United States)
Sponsoring Organization:
USDOE National Nuclear Security Administration (NNSA)
DOE Contract Number:
AC04-94AL85000
OSTI ID:
1093687
Report Number(s):
SAND2013-5511; 463319
Country of Publication:
United States
Language:
English

Similar Records

Phishing in the Wild: An Ecologically Valid Study of the Phishing Tactics and Human Factors that Predict Susceptibility to a Phishing Attack
Journal Article · Tue Feb 28 23:00:00 EST 2023 · Journal of Information Warfare · OSTI ID:1996328

Hybrid methods for cybersecurity analysis :
Technical Report · Tue Dec 31 23:00:00 EST 2013 · OSTI ID:1147641

Dead Phish: An Examination of Deactivated Phishing Sites
Conference · Thu Dec 31 23:00:00 EST 2009 · OSTI ID:984774

Related Subjects