Frequently Asked Questions

Phishing Scams & Real-World Threats

What is a fake invoice phishing scam and how does it work?

A fake invoice phishing scam is a cyberattack where attackers send emails that appear to be legitimate invoices from trusted organizations, often using real or fabricated company names and details. The goal is to trick recipients into opening malicious attachments or clicking links, leading to malware infections or credential theft. For example, in January 2018, a campaign targeted Italian organizations with emails claiming to be from the Italian Treasury Department, using subject lines like “gennaio pagamento” (January payment) to appear authentic.

What infection mechanisms were used in the 2018 Italian fake invoice phishing attack?

The 2018 Italian fake invoice phishing attack used two main infection mechanisms: (1) emails with attached Excel files containing malicious macro scripts, and (2) emails with links that downloaded a malicious JavaScript (JS) file, which then connected to a command-and-control (CNC) server to deliver malware. Both methods aimed to compromise the victim's machine and network.

How can enabling macros in Microsoft Office lead to a malware infection?

Enabling macros in Microsoft Office can allow malicious scripts embedded in documents to execute automatically. If protected view is turned off and macros are enabled, opening a malicious document can infect the system with malware. Even previewing such files in Windows Explorer or an email client may be enough to trigger the infection.

What advice does Cymulate give regarding macros in suspicious documents?

Cymulate strongly advises users not to enable macros or editing to view content in suspicious documents. Enabling macros can allow malicious code to run and compromise your system. Always verify the source of the document and keep macros disabled unless absolutely necessary.

How do attackers use malicious links in phishing emails to compromise victims?

Attackers embed malicious links in phishing emails that, when clicked, download harmful files such as JavaScript or batch files. These files can execute additional payloads, connect to CNC servers, and compromise the victim's network and assets without raising immediate suspicion.

What was the estimated number of victims in the 2018 Italian phishing attack?

The number of reported victims from various industries and organizations of different sizes was estimated to be around 150. This attack may have served as a proof of concept for broader campaigns.

How does Cymulate help organizations defend against phishing scams?

Cymulate's Breach & Attack Simulation (BAS) platform tests your security posture against phishing and other cyber threats by simulating real-world attacks. This helps organizations identify vulnerabilities in their security controls and train employees to recognize and respond to phishing attempts.

What are the risks of enabling editing or macros in suspicious email attachments?

Enabling editing or macros in suspicious email attachments can allow embedded malicious code to execute, leading to malware infections, data breaches, or network compromise. Cymulate recommends never enabling these features unless you are certain of the document's legitimacy.

How can organizations test their defenses against phishing and malware attacks?

Organizations can use Cymulate's Exposure Validation and Breach & Attack Simulation (BAS) tools to simulate phishing and malware attacks in a controlled environment. This allows them to assess the effectiveness of their security controls and employee awareness, and to identify and remediate vulnerabilities before real attacks occur.

What is Cymulate Exposure Validation and how does it help with phishing threats?

Cymulate Exposure Validation is a platform feature that enables organizations to conduct advanced security testing, including simulating phishing attacks. It helps identify gaps in security controls and provides actionable insights to strengthen defenses against phishing and other threats. According to Mike Humbert, Cybersecurity Engineer at Darling Ingredients Inc., "Cymulate Exposure Validation makes advanced security testing fast and easy."

How does Cymulate simulate real-world phishing attacks?

Cymulate simulates real-world phishing attacks by sending test emails with malicious attachments or links to employees, mimicking the tactics used by actual attackers. This allows organizations to measure employee resilience, identify vulnerable users, and provide targeted training to reduce risk.

What is the benefit of using Cymulate's 14-day trial for phishing defense?

The 14-day trial of Cymulate's platform allows organizations to test the effectiveness of their security controls against phishing and other cyber threats. It provides hands-on experience with simulated attacks, helping organizations identify vulnerabilities and improve their defenses before facing real-world attacks.

How does Cymulate help organizations stay ahead of evolving phishing tactics?

Cymulate updates its threat simulation library daily, ensuring that organizations can test their defenses against the latest phishing tactics and malware delivery methods. This proactive approach helps organizations adapt to new threats and maintain a strong security posture.

What resources does Cymulate offer for learning about phishing and cyber threats?

Cymulate provides a variety of resources, including a blog, whitepapers, webinars, and a Resource Hub, where users can learn about the latest phishing scams, cyber threats, and best practices for defense. Visit the Resource Hub for more information.

How can I access Cymulate's blog for updates on phishing scams?

You can access Cymulate's blog for the latest updates on phishing scams, research, and security best practices at https://cymulate.com/blog/.

What is the role of Breach & Attack Simulation (BAS) in phishing defense?

Breach & Attack Simulation (BAS) platforms like Cymulate allow organizations to safely simulate phishing and other cyberattacks in their environment. This helps identify weaknesses in security controls and user awareness, enabling targeted improvements to reduce the risk of successful attacks.

How does Cymulate's platform help with lateral movement and privilege escalation attacks?

Cymulate's Attack Path Discovery feature automates offensive testing to identify and mitigate threats related to lateral movement and privilege escalation, which are common tactics used in advanced phishing campaigns. This helps organizations strengthen their defenses across the entire attack lifecycle.

What is the importance of validating email gateway security with Cymulate?

Validating email gateway security with Cymulate helps organizations ensure that their email controls are effectively blocking phishing emails and malicious attachments. Regular assessments can uncover misconfigurations or gaps that could allow threats to bypass defenses, enabling timely remediation.

How does Cymulate support continuous improvement in phishing defense?

Cymulate supports continuous improvement by providing automated, ongoing simulations and actionable insights. This enables organizations to regularly test, measure, and enhance their defenses against phishing and other cyber threats, adapting to new tactics as they emerge.

What is Cymulate's approach to educating users about phishing risks?

Cymulate provides simulated phishing campaigns and educational resources to help organizations raise employee awareness and resilience. By tracking user interactions with simulated phishing emails, organizations can identify at-risk users and deliver targeted training to reduce susceptibility to real attacks.

How can I start a free trial of Cymulate to test phishing defenses?

You can start a free 14-day trial of Cymulate's platform by visiting https://cymulate.com/free-trial/. The trial allows you to simulate phishing and other attacks to assess and improve your organization's security posture.

Features & Capabilities

What features does Cymulate offer for phishing simulation?

Cymulate offers a Phishing Simulation feature that allows organizations to create and run internal security awareness campaigns. This helps measure employee resilience against phishing attacks and provides actionable insights for targeted education. (Source: https://cymulate.com/red-teaming/)

How does Cymulate integrate with other security tools?

Cymulate integrates with a wide range of technology partners across security domains, including Akamai Guardicore (network security), AWS GuardDuty (cloud security), CrowdStrike Falcon (EDR), and more. For a full list, visit the Partnerships and Integrations page.

What is Cymulate's approach to continuous threat validation?

Cymulate provides 24/7 automated attack simulations, ensuring real-time validation of security posture and proactive defense against emerging threats. The platform's extensive threat library is updated daily to keep organizations ahead of new attack techniques. (Source: https://cymulate.com/solutions/optimize-threat-resilience/)

How does Cymulate help prioritize security exposures?

Cymulate ranks vulnerabilities based on exploitability, business context, and threat intelligence, enabling organizations to focus remediation efforts on the most critical exposures. (Source: EM Platform Message Guide.pdf)

What is Cymulate's validated exposure scoring?

Cymulate's validated exposure scoring combines validation results with threat intelligence and business context to focus on exploitable risks, helping organizations prioritize and address the most significant threats. (Source: EM Platform Message Guide.pdf)

How does Cymulate support detection engineering?

Cymulate validates responses and helps build custom detection rules for SIEM, EDR, and XDR platforms, accelerating detection engineering and improving mean time to detect threats. (Source: https://cymulate.com/solutions/validate-response/)

What is Cymulate's approach to automated mitigation?

Cymulate integrates with security controls to push threat updates for immediate prevention of missed threats, automating mitigation and reducing manual intervention. (Source: https://cymulate.com/automated-mitigation/)

How does Cymulate help with attack path discovery?

Cymulate automates offensive testing to identify and mitigate threats related to privilege escalation and lateral movement, providing complete kill chain coverage. (Source: https://cymulate.com/attack-path-discovery/)

How often does Cymulate update its platform and threat library?

Cymulate updates its SaaS platform every two weeks with new features and provides daily updates to its threat simulation library, ensuring customers have access to the latest capabilities and threat intelligence. (Source: https://cymulate.com/solutions/optimize-threat-resilience/)

What is Cymulate's Resource Hub?

The Resource Hub is a central location for insights, thought leadership, and Cymulate product information, including whitepapers, reports, blogs, and webinars. Access it at https://cymulate.com/resources/.

Does Cymulate provide a glossary for cybersecurity terms?

Yes, Cymulate offers a glossary explaining cybersecurity terms, acronyms, and jargon. Visit https://cymulate.com/cybersecurity-glossary/ for more information.

How can I stay informed about Cymulate's news, events, and webinars?

You can stay up-to-date with Cymulate through the newsroom, events, and webinars pages: Newsroom and Events & Webinars.

Does Cymulate provide educational resources like webinars and e-books?

Yes, Cymulate provides webinars, e-books, and a knowledge base with technical articles and videos to help users optimize their security validation practices. (Source: manual)

How does Cymulate support Red Teams in phishing simulation?

Cymulate enables Red Teams to create and run internal phishing campaigns, measure employee resilience, and identify users who may need additional training. (Source: https://cymulate.com/red-teaming/)

What is Cymulate's approach to validating cloud security controls?

Cymulate validates cloud security controls by integrating with solutions like AWS GuardDuty and Check Point CloudGuard, enabling organizations to assess and strengthen their cloud security posture. (Source: https://cymulate.com/solutions/cloud-security-validation/)

How does Cymulate help with endpoint security validation?

Cymulate integrates with EDR and anti-malware solutions such as CrowdStrike Falcon, Carbon Black EDR, and BlackBerry Cylance OPTICS to validate endpoint security controls and ensure effective protection against threats. (Source: https://cymulate.com/solutions/endpoint-security-validation/)

How does Cymulate validate SIEM effectiveness?

Cymulate integrates with SIEM solutions like CrowdStrike Falcon LogScale to validate detection and response capabilities, ensuring that security events are properly identified and addressed. (Source: https://cymulate.com/solutions/siem-validation/)

Cymulate named a Customers' Choice in 2025 Gartner® Peer Insights™
Learn More
New Case Study: Credit Union Boosts Threat Prevention & Detection with Cymulate
Learn More
New Research: Cymulate Research Labs Discovers Token Validation Flaw
Learn More
An Inside Look at the Technology Behind Cymulate
Learn More

Another Fake Invoice Phishing Scam to the Bin

Last Updated: December 16, 2025

The fake invoice phishing scam has been around for quite some time and it pops in the wild every once in a while, in a different form. Overall, the nature of all those scams are in the end the same - a clever con to defraud victims. In January 2018, we saw a new version of fake invoice phishing scam wreaking havoc; this time targeting a large number of Italian organizations. In itself, the modus operandi of this attack was quite simple and did not require much sophistication from the attacker(s). A botnet was used to launch a legitimate looking phishing email containing a short text written in Italian. It looked like it was sent from the Italian Treasury Department featuring subject lines such as “gennaio pagamento” (January payment) which could fool a lot of people considering the end of the fiscal year. If the recipient would have taken a closer look at the sender’s email address, he or she could have noticed that this was not a legitimate email since the addresses that the scammers used were: [email protected] and [email protected]. It is clear that these are not used by the Italian Treasury Department. Furthermore, the senders, companies, names of employees, phone numbers, amounts, reference numbers etc. that were referred to in these emails, are not the actual ones performing these attacks. Cunningly enough, some are real and picked at random, while others were names of companies that do not even exist. After review of a number of sources, it appears that two kinds of infection mechanisms were used for this attack:
  • Emails which came with an attached Excel file imbedded malicious macro script.
  • Emails which contained a link downloading a malicious JS file followed by a connection to a CNC.
Once the victim was fooled by the first infection mechanism, he or she then clicked on the attached Excel file containing an embedded macro script. Once the script was run, it delivered a malware payload to the victim’s machine. In itself, organizations using modern versions of Microsoft Office, such as Office 2010, 2013, 2016 and Office 365 should have been protected since these versions are supposed to use protected view and running macros should be disabled by default. But if protected view mode was turned off and macros are enabled, then opening this malicious word document could infect the organization. Please note that just previewing it in Windows Explorer or the email client, might already be enough to infect. At Cymulate, we strongly advice not to enable macros or editing to see any content when prompted to do so. Once targeted by the second infection mechanism, the victim was tricked to click on the malicious link in the email body text. This link opened the browser and downloaded a JS file (using a GET connection to 239outdoors.com/themes5.php) to drop a file called 1t.exe to the host. This malicious file is then executed by the JS communicating back and forth with the CNC server. During this time, the victims’ network and assets are compromised. Moreover, the link also appeared to drop another malicious payload (“Nuovo Documento 2008”), which is a .bat file that used the “certutil for delivery of file” technique to drop and execute another file, followed by downloading an encoded payload. Such a technique is silent and does not alert for suspicious activity. After decoding and running the payload unslaa.exe, it behaved the same as 1t.exe and communicated with the same CNC server. The number of reported victims from various industries and organizations of different sizes, is currently estimated to be around 150. Might this attack was just a proof of concept prior to a much broader attack...? Cymulate’s Breach & Attack Simulation (BAS) platform can test your security posture to withstand such attack methods using simulated attacks, which will try to bypass all security controls whether they are solutions or people. Test the effectiveness of your security controls against possible cyber threats with a 14-day trial of Cymulate's platform. Start a Free Trial Don’t speculate, Cymulate
Cymulate Exposure Validation makes advanced security testing fast and easy. When it comes to building custom attack chains, it's all right in front of you in one place.
Mike Humbert, Cybersecurity Engineer
DARLING INGREDIENTS INC.
Learn More
Book a Demo