Criminals are using this stupidly simple tactic to send malicious links - and it's working

A fish hook is lying across a computer keyboard, representing a phishing attack on a computer system
(Image credit: weerapatkiatdumrong / Getty Images)

Criminals are using a remarkably straightforward tactic to try and direct victims to phishing links - but the bad news is that it appears to be working.

Usually, hackers would draft this elaborate email trying to convince the victims to click on a link found at the bottom of the message. These emails would either tell the recipients they urgently needed to download an antivirus or cancel a pending transaction that will leave them broke, or something similar.

However, cybersecurity researchers from Check Point Harmony Email have uncovered that some hackers are replacing all of that with a simple image. Instead of typing out a long email and risking being found out by typos or bad grammar, these attackers simply generate a promotional image - a flyer informing the recipients they’ve won a prize or are invited to participate in a some kind of competition.

Obvious scam

The picture would then be hyperlinked and would direct the victims to a phishing page where they’d give away sensitive information. Sometimes it’s just an email address, and sometimes it’s passwords, personally identifiable data that can be used in identity theft, and more.

Recipients with a keen eye would be able to quickly see through the fraud: all it takes is a hover of the mouse over the image for the hyperlink to appear. These links have nothing to do with the brands impersonated in the images, which is a clear red flag that a scam is afoot.

However, the researchers are saying the trick is working and that many people - instead of deleting the phishing email - end up clicking the image and falling prey to the attackers. 

Furthermore, by not displaying a link at all, hackers are succeeding in bypassing URL filters, one of the more popular methods of safeguarding inboxes.

To defend against such attacks, the researchers say IT teams should implement security that looks at all URLs and emulates the page behind it. They should also leverage URL protection that uses phishing techniques as an indicator of an attack, and deploy AI-based anti-phishing software capable of blocking such content across the entirety of the productivity suite.

Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.

Read more
A digital themed isometric showing a neon padlock in the foreground, and a technological diagram of a processor logic board in the background.
SVG files are offering cybercriminals an easy way in with new phishing attacks
Hacker Typing
This devious two-step phishing campaign uses Microsoft tools to bypass email security
Fraude en ligne phishing
Phishing clicks nearly tripled in 2024 as criminals aim for smarter attacks
Paper craft illustration of a suspicious email that contains a snake
How to spot a phishing email
email
Hidden text "salting" is letting hackers craft devious email attacks to evade detection
A fish hook is lying across a computer keyboard, representing a phishing attack on a computer system
Everything you need to know about phishing
Latest in Security
Hacker silhouette working on a laptop with North Korean flag on the background
North Korea unveils new military unit targeting AI attacks
An image of network security icons for a network encircling a digital blue earth.
US government warns agencies to make sure their backups are safe from NAKIVO security issue
Laptop computer displaying logo of WordPress, a free and open-source content management system (CMS)
This top WordPress plugin could be hiding a worrying security flaw, so be on your guard
Computer Hacked, System Error, Virus, Cyber attack, Malware Concept. Danger Symbol
Veeam urges users to patch security issues which could allow backup hacks
UK Prime Minister Sir Kier Starmer
The UK releases timeline for migration to post-quantum cryptography
Representational image depecting cybersecurity protection
Cisco smart licensing system sees critical security flaws exploited
Latest in News
L-mount alliance
Sirui joins L-Mount Alliance to deliver its superb budget lenses for Leica, DJI, Sigma and Panasonic cameras
Security padlock and circuit board to protect data
Trust in digital services around the world sees a massive drop as security worries continue
A Lego Pikachu tail next to a Pebble OS watch and a screenshot of Assassin's Creed Shadow
ICYMI: the week's 7 biggest tech stories from LG's excellent new OLED TV to our Assassin's Creed Shadow review
Samuel and Romy standing very close together in A24's Babygirl movie
Everything new on Max in April 2025, including A24's Babygirl and The Last of Us season 2
An AMD Radeon RX 9070 XT made by Sapphire on a table with its retail packaging
AMD’s secret weapon against Nvidia seems to be stock – way more RX 9070 GPUs are rumored to be hitting shelves than RTX 5000 models
Hacker silhouette working on a laptop with North Korean flag on the background
North Korea unveils new military unit targeting AI attacks