IronSights
All insights

threat intelligence

Phishing in 2024: What Has Changed and What Has Not

Phishing remains the most common initial access vector for cyber attacks against Australian businesses. The techniques have evolved significantly — AI-generated lures, adversary-in-the-middle proxies, QR codes — but the underlying principle is unchanged.

By Ryan Balloot, Managing Director4 April 20241 min read

Phishing remains the entry point for the majority of cyber incidents affecting Australian businesses. What has changed significantly is the quality, targeting, and technical sophistication of phishing attacks.

AI-Generated Phishing

Large language models have dramatically lowered the barrier to creating convincing phishing content. Grammatically perfect, contextually relevant phishing emails — previously a signal that the attacker had invested significant effort — are now trivially generated at scale. The tell-tale signs of older phishing — awkward phrasing, grammatical errors, implausible scenarios — are no longer reliable detection signals.

Adversary-in-the-Middle Attacks

AiTM (Adversary-in-the-Middle) phishing proxies real authentication pages in real time. The victim enters their credentials and MFA code into what appears to be a legitimate login page; the attacker captures both and uses them immediately to authenticate to the real service. Standard TOTP-based MFA does not protect against AiTM. Phishing-resistant MFA — FIDO2 hardware keys, Windows Hello — does.

QR Code Phishing

QR codes in phishing emails bypass email security tools that scan URLs in email body text. The victim scans the QR code with their phone, opening a malicious URL in a mobile browser that may lack the same security controls as a corporate desktop. Mobile device management that extends email security controls to managed phones is the relevant mitigation.

What Has Not Changed

The goal: steal credentials, deliver malware, or initiate a fraudulent financial transaction. The delivery: email, SMS, and voice calls remain the primary vectors. The human vulnerability: urgency, authority, and fear are still the most effective triggers. Technical controls reduce the consequence of a successful phish. Awareness training reduces the likelihood.

Keep reading

More from the IronSights team.