New BI.ZONE CESP protects against quishing, takes into account employee cyber awareness levels
Now adversaries won’t be able to conceal phishing links with QR codes, uncommon punctuation marks, HTML anchors, or query parameters. The updated BI.ZONE CESP also reveals attempts to hide large numbers of mailing recipients. Thanks to integration with BI.ZONE Security Fitness, the service helps to improve the protection of the most vulnerable employees.
This year, QR code phishing (quishing) and various ways of hiding malicious links (behind HTML anchors, query parameters, uncommon characters and punctuation marks) were among the most popular ways of disguising unwanted content.
New methods to hide dangerous links
QR code links generally lead to websites mimicking those of well‑known companies or services. For example, in Q1 2024, BI.ZONE CESP detected and blocked a quishing mailout where the QR code redirected to a fake authorization page of a popular mail service. The page is designed in such a way that the credentials go directly to the attackers as soon as the user hits Enter. Once it is done, the page returns an error message.
HTML anchors and query parameters were used to hide malicious links in 30% of phishing emails (source: BI.ZONE CESP, Q1 2024). In regular links, HTML anchors allow the user to go directly to a specific section of a website. Query parameters simplify search and navigation as well as enable collection and systematization of website visit data.
According to the RFC 3986 standard that regulates URL structure and syntax, browsers should not process characters if they are behind special delimiters. In practice, this regulation is often overlooked to the advantage of scammers: they add hidden malicious elements to a seemingly legitimate link.
Attackers may also add uncommon characters or punctuation marks to malicious links to prevent security tools from recognizing URLs. Another popular method involves mass mailing to a concealed number of recipients, with the expectation that a larger audience will increase the chances of success.
Protection against social engineering techniques and software vulnerabilities
The new BI.ZONE CESP can better counter social engineering techniques. This is achieved through an extensive integration with BI.ZONE Security Fitness, a platform for raising employee cyber awareness. By training with BI.ZONE Security Fitness each user generates an individual rating reflecting vulnerability to social engineering attacks. For more vulnerable employees, the message quarantine rules will be stricter and cover even slightly suspicious emails. This will reduce the risk of compromising the entire corporate infrastructure as a result of opening a phishing email.
In addition to the tactics and techniques used by attackers, the BI.ZONE CESP team keeps track of new vulnerabilities in the software that engages in the SMTP dialog. If a vulnerability requires manipulation of the email traffic, our specialists promptly create security rules to protect its users before the patches become available.
In the last 10 months alone, our experts have resolved two critical vulnerabilities: CVE-2024-21413 (CVSS score 9.8 out of 10) and CVE-2023-34192 (CVSS score 9 out of 10). In addition, BI.ZONE CESP has stood the test against a number of SMTP Smuggling medium vulnerabilities (CVE-2023-51764, CVE-2023-51765, CVE-2023-51766), which are actively exploited for sending spoof emails.
Additional administration capabilities
An important part of the BI.ZONE CESP update is the expansion of client‑side administration capabilities, including message log management. Now the administrator can email the output for any filter of the message log. The CSV document for each message contains the date, time, connection and message identifiers, sender IP address, sender and recipient email addresses, subject line, message size in bytes, spam rating, delivery status, and BI.ZONE CESP actions.
The message log has become more detailed. The updated cards show whether the message’s sender, recipient, or IP address are whitelisted or blacklisted. If the message has links, the cards will reflect web categories of the corresponding domains. Similarly, if an extended list rule is triggered by the message, the rule will also be logged. Each property can be examined in detail. Furthermore, there is advanced filtering by delivery status, URL category, mail server response during delivery, and protected domain.
The process of configuring protected domains has become more transparent. Now that the process is on the BI.ZONE side, you can see which of the four stages it is going through: synchronization, SMTP server verification, test email sending, or pending change of MX records. At each stage, you can run the check and see the actual status.