I read an article about ransomware affecting the public transportation service in Kansas, and I wanted to ask how this can happen. Wikipedia says these are “are typically carried out using a Trojan, entering a system through, for example, a malicious attachment, embedded link in a phishing email, or a vulnerability in a network service,” but how? Wouldn’t someone still have to deliberately click a malicious link to install it? Wouldn’t anyone working for such an agency be educated enough about these threats not to do so?

I wanted to ask in that community, but I was afraid this is such a basic question that I felt foolish posting it there. Does anyone know the exact process by which this typically can happen? I’ve seen how scammers can do this to individuals with low tech literacy by watching Kitboga, but what about these big agencies?

Edit: After reading some of the responses, it’s made me realize why IT often wants to heavily restrict what you can do on a work PC, which is frustrating from an end user perspective, but if people are just clicking links in emails and not following basic internet safety, then damn.

  • Rhynoplaz@lemmy.world
    link
    fedilink
    arrow-up
    56
    arrow-down
    1
    ·
    10 months ago

    It doesn’t matter how strong your defenses are and how skilled your IT team is, when fucking Linda in accounting opens EVERY SINGLE GODDAMN ATTACHMENT SHE GETS!!!

    • Oisteink@feddit.nl
      link
      fedilink
      arrow-up
      9
      ·
      10 months ago

      She’s had poor training I guess. SEBKAC! Security exists between keyboard and chair

    • unalivejoy@lemm.ee
      link
      fedilink
      English
      arrow-up
      4
      ·
      10 months ago

      Then the IT department sends everyone a Honeypot email and schedules more training and a meeting with a manager for anyone who clicks any links in the email.

      • noUsernamesLef7@infosec.pub
        link
        fedilink
        arrow-up
        1
        ·
        10 months ago

        It is a great step but it’s rare to have enough buy in from upper managent to enforce any real consequences for repeat offenders. I’ve seen good initial results from this kind of phishing testing, but the repeat offenders never seem to change their habits and your click rate quickly plateaus.

  • dotslashme@infosec.pub
    link
    fedilink
    English
    arrow-up
    32
    arrow-down
    1
    ·
    10 months ago

    People are by far the biggest security risk. I have seen personally tailored phising scams that were even able to fool experienced secops staff.

    • GombeenSysadmin@lemmy.world
      link
      fedilink
      arrow-up
      7
      ·
      10 months ago

      Company I used to work for got hit fairly bad. Am email came in from the contract agency to the accounts payable clerk, personally addressed to her and signed off all informal like, to the effect of “hey Marion, our local bank branch is closing so we’ve had to move our accounts, can you update the IBAN to the following for me?”

      €150,000 down a black hole, that wasn’t even noticed until a phone call came in a week later.

      • dotslashme@infosec.pub
        link
        fedilink
        English
        arrow-up
        1
        ·
        10 months ago

        My favorite personal anecdote was when one of our security educators send an email explaining how he managed to click a phishing link, log in and then realize it was a fake website login.

        Apparently he got an email telling him that the local scanner in the office had send him some material and he needed to authorize the transfer into his inbox by logging in.

      • DrownedRats@lemmy.world
        link
        fedilink
        arrow-up
        1
        ·
        10 months ago

        When I was in secondary school, I basically did exactly that with a random flash drive I found in the park. I’m blaming my school for never giving us that network security talk lol. Fortunately nothing came of it and it was a pretty boring flash drive but still. Would never ever do that now.

  • MajorHavoc@programming.dev
    link
    fedilink
    arrow-up
    32
    arrow-down
    2
    ·
    edit-2
    10 months ago

    Wouldn’t anyone working for such an agency be educated enough about these threats not to do so?

    Ahahhahhahha. Ahem. Hahahahahaha. Give me a moment to compose myself.

    Thank you for that moment.

    Anyway, the assumption is very reasonable. And, oh how I wish it were so.

    But the answer is no, they’re human, and even high tech organizations need specialists in other subjects (law, finance, book-keeping, etc) who aren’t at all technology savy.

    To be clear, education is such subjects is often mandatory. It just doesn’t always take. Largely because many staff watch the educational video, and think they understood it, but don’t really have any context for it. For example, they might learn it and still think, “Well, it clealy doesn’t apply to an email from our CEO. He wouldn’t send something nasty!”

    Edit: The solution I’ve seen is a lot of education. It’s not enough to say “don’t click suspicious links”, there’s got to be ongoing training on the definition of “suspicious”.

    • lightnsfw@reddthat.com
      link
      fedilink
      arrow-up
      11
      ·
      10 months ago

      The security team at the company I work for sends out test phishing emails and if you fall for it they make you change your password. I think this annoyance helps people learn to pay attention. It doesn’t seem like we have had to do as many resets due to these as time goes on.

      • Lifecoach5000@lemmy.world
        link
        fedilink
        English
        arrow-up
        4
        ·
        10 months ago

        This works IMO. Our company used to do this. Hell, I even fell for one once, which is some shameful shit considering I work in the tech industry. That shame enough though has kept me more on toes ever since.

        • lightnsfw@reddthat.com
          link
          fedilink
          arrow-up
          7
          ·
          10 months ago

          I almost fell for the last one they did. It was disguised as a link to a shared item on teams that that asked for your creds and I assumed it was another shitty half baked Microsoft thing that single sign in wasn’t working on. The only reason I didn’t log into it was because I was like “fuck it I’ll just open it from teams instead” only to find that it wasn’t in Teams.

      • kent_eh@lemmy.ca
        link
        fedilink
        English
        arrow-up
        4
        ·
        10 months ago

        I’ve flagged several suspicious looking but actually legit emails that were originated by internal groups but used very scammy sounding language (warning of dire consequences, extreme urgency, links to external websites as reference to something claimed to be internal process…)

        Hopefully those departments sending emails like that get some education too…

        • noUsernamesLef7@infosec.pub
          link
          fedilink
          arrow-up
          3
          ·
          10 months ago

          Stay suspicious. As a security guy, i’d way rather respond to 1,000 false positive reports than have an employee that doesn’t think about it and just clicks.

    • Mario_Dies.wav@lemmy.dbzer0.comOP
      link
      fedilink
      arrow-up
      6
      ·
      10 months ago

      Yes, this makes sense. I can also say from observing co-workers at different jobs, any training that’s provided virtually (e.g., you just watch a video and answer some questions), is mostly a waste of time. I can say that I and some others took these trainings seriously, but most people did not and would jump through the hoop as mindlessly as possible.

      I saw this a lot when I worked as a CNA. People would just answer the questions right, “pass” the training, and then continue doing things in the same wrong way they’d always done things.

  • Katzastrophe@feddit.de
    link
    fedilink
    arrow-up
    20
    ·
    10 months ago

    I once did a Phishing test for a customer during an internship. We had 50% of all employees click the Phishing link, and 30% of all employees input their login info.

    What was the form? A new data protection agreement (which was the current one copied from the firm’s site) which required a login to accept.

    These employees all got regular cybersecurity training, and yet they still fell for such an obvious fake login

    • Mario_Dies.wav@lemmy.dbzer0.comOP
      link
      fedilink
      arrow-up
      9
      ·
      10 months ago

      They just clicked it from within the email? Damn.

      Do you have any insight into how to make people more informed? I feel like everyone sees the average training as just a hoop to jump through.

        • Mario_Dies.wav@lemmy.dbzer0.comOP
          link
          fedilink
          arrow-up
          10
          ·
          10 months ago

          Thank you so much! I’ll ask our IT person if we can do something like this.

          One of my co-workers has been scammed so many times in her personal life that I feel anxious thinking of her clicking a malicious link in her email at work.

    • YaBoyMax@programming.dev
      link
      fedilink
      English
      arrow-up
      5
      ·
      10 months ago

      When these tests are conducted are they typically sent from an email with a non-company domain? I ask because a few months ago my partner received a test which she failed because it was sent from an email under her company’s normal domain name. I’m not in IT but I am in software dev and I thought this was pretty unreasonable, since in that scenario (AFAIK) either the company fucked up their email security or the attacker has control over the Exchange server in which case all bets are off anyway.

      • Katzastrophe@feddit.de
        link
        fedilink
        arrow-up
        9
        ·
        10 months ago

        Usually a domain gets rented for the test, using the in-house domain isn’t normal. But you can change the display name of an email adress to appear as if it was sent from a reputable source

        • YaBoyMax@programming.dev
          link
          fedilink
          English
          arrow-up
          2
          ·
          edit-2
          10 months ago

          Do you mean something like “Legitimate Company <[email protected]>”? In this case the company domain was in the actual sender address and not just the display name. Anyhow, ty for the insight!

          • Cinner@lemmy.worldB
            link
            fedilink
            arrow-up
            8
            ·
            10 months ago

            All it takes is one email account to be compromised via spearphishing, and the attacker can send domain wide emails to everyone, with proper DKIM, SPF and all.

    • TheInsane42@lemmy.world
      link
      fedilink
      English
      arrow-up
      4
      ·
      10 months ago

      Yep, same here, including colleagues in security. “You haven’t claimed your giftcard yet, log in here…”. Some were ‘smart’ enough to forward the link home and open it there (no direct internet access from the desktop) and the organizers of the test canceled the test as it was such a great success. (Almost everybody failed) Alas they killed the test before the email arrived in my mailbox, as I would have loved to see it. ;)

      • Katzastrophe@feddit.de
        link
        fedilink
        arrow-up
        4
        ·
        10 months ago

        In my case the employer got so angry that he personally delivered invitations to a “Cybersecurity in the workplace”-course

        • TheInsane42@lemmy.world
          link
          fedilink
          English
          arrow-up
          2
          ·
          10 months ago

          We already have an annual test and still… people will be people. This is the main reason the webbrowsers are sandboxed and everything that is downloaded is scanned. (An no direct acces to internet, never, ever)

  • originalucifer@moist.catsweat.com
    link
    fedilink
    arrow-up
    17
    ·
    edit-2
    10 months ago

    one of the primary tenets of IT is that end users do not read. they click things like crazy, even shit they shouldnt.

    the bigger the company the worse this is because volume.

    its almost always an attachment bomb, or a link to malicious packages on teh web.

    • Mario_Dies.wav@lemmy.dbzer0.comOP
      link
      fedilink
      arrow-up
      8
      ·
      10 months ago

      I’m in somewhat of a leadership position in an agency. I feel like I should talk to those above me about having more training for my co-workers. This is a nightmare scenario.

      • originalucifer@moist.catsweat.com
        link
        fedilink
        arrow-up
        16
        ·
        edit-2
        10 months ago

        the way we deal with this in my org is testing our own staff… we use a service that sends very well faked emails. They can look like they are from our own vendors/staff even… but they contain invalid links that an end user should know are not valid… these emails are technically ‘compromised’. when an end user clicks a link, they are informed they failed, and automatically enrolled in one of our mandatory security training classes. every time they click a bad link.

        the best part is we silently rolled this out and something like 80% of c-levels failed. they were soooo pissed… but what could they do?

        • Mario_Dies.wav@lemmy.dbzer0.comOP
          link
          fedilink
          arrow-up
          9
          ·
          10 months ago

          I’ve worked for places that do this, and I’ve seen the same people having to do the same training every time these emails went out. I feel like they never learned from it. They’d even get pissed that they had to keep retaking the training, but I feel like it never occurred to them that they should maybe change their own behavior.

          • originalucifer@moist.catsweat.com
            link
            fedilink
            arrow-up
            8
            ·
            10 months ago

            we do have an HR component attached to this. if youre consistently under-performing you will eventually be fired. hipaa and all that.

            keeping every user to minimum required access also helps a bit.

            • Mario_Dies.wav@lemmy.dbzer0.comOP
              link
              fedilink
              arrow-up
              4
              ·
              10 months ago

              It always amazed me that she could just keep doing it and then go to the training, yeah. I feel like that was a glaring flaw in our system.

              • NaN@lemmy.sdf.org
                link
                fedilink
                English
                arrow-up
                4
                ·
                10 months ago

                No hr component, no reason for her to take it seriously except for the annoyance of the training. Give her a little scare and maybe she doesn’t have to be terminated, or she’s just an idiot.

                Unfortunately a lot of companies treat IT as an annoying afterthought, so it isn’t uncommon for there to be no real enforcement mechanism.

                • Mario_Dies.wav@lemmy.dbzer0.comOP
                  link
                  fedilink
                  arrow-up
                  2
                  ·
                  10 months ago

                  I don’t work there anymore, but there were a lot of other problems with that place, so it doesn’t exactly surprise me that there was no teeth in their policy

          • FuglyDuck@lemmy.world
            link
            fedilink
            English
            arrow-up
            2
            ·
            10 months ago

            I suspect the appropriate response is to revoke their email….

            I mean, you know. If you could trust them to not go create a “mynamemycompany@evenworsethangmaildotcom”

        • frickineh@lemmy.world
          link
          fedilink
          arrow-up
          5
          ·
          10 months ago

          Wish you could get our IT to make ours good fakes instead of coming from “[email protected]” or some shit. It feels like they’re not even trying. Although I do work with one of the single dumbest people I’ve ever met, so maybe that’s to give her the teeeeniest chance at identifying it.

          • kent_eh@lemmy.ca
            link
            fedilink
            English
            arrow-up
            2
            ·
            10 months ago

            good fakes instead of coming from “[email protected]” or some shit. It feels like they’re not even trying.

            Then again, targeting the first wave of training to the low hanging fruit who fall for such obvious scams is a good place to start.

    • SzethFriendOfNimi@lemmy.world
      link
      fedilink
      arrow-up
      4
      ·
      10 months ago

      Sometimes because we’ve conditioned them to.

      Confirm dialogs are a perfect example of UI intertia.

      You hit confirm on a close dialog so many times that it doesn’t matter what it says. By the time you’ve registered what it is muscle memory has done it’s thing

  • lurch (he/him)@sh.itjust.works
    link
    fedilink
    arrow-up
    16
    ·
    10 months ago

    A classic is to just drop of 2 or 3 infected USB sticks, maybe with bait labels, on the parking lot before the first employees arrive. repeat a few times and just wait until someone plugs it in to investigate.

    another good trick is to infiltrate the cleaners.

          • Classy Hatter@sopuli.xyz
            link
            fedilink
            arrow-up
            10
            ·
            10 months ago

            I once heard this story about a company, that had a server room. The room was locked so no-one could get in without permission, which is a good practice. At some point, they started to wonder why one of their servers becomes unreachable every Friday at X o’clock. Eventually, they figured out that their new cleaner entered the server room every Friday and unplugged one of the power cables to plug the vacuum cleaner in to the outlet.

      • NoIWontPickaName@kbin.social
        link
        fedilink
        arrow-up
        13
        ·
        10 months ago

        Janitors and custodians get way more unrestricted access than most people realize.

        I used to deliver pizzas on a military base, and the amount of restricted areas I got in with no more than a pizza and a uniform shirt is ridiculous.

        Social hacking is the way to do it

        • lightnsfw@reddthat.com
          link
          fedilink
          arrow-up
          5
          ·
          10 months ago

          I did a hardware upgrade for a hospital a few years ago. People let me in all kinds of sensitive areas just because I had a PC in my hands and knew someone in their department’s name. The only time anyone bothered to verify I was supposed to be there was when I was doing an install in the maintenance guys’ office.

          • NaN@lemmy.sdf.org
            link
            fedilink
            English
            arrow-up
            5
            ·
            edit-2
            10 months ago

            This is always a fun experiment when you are doing contracted IT work. In my experience in large organizations with multiple facilities where everyone does not know everyone, looking the part and having confidence when you ask someone to let you in the server room is all it takes to get in. They aren’t surprised you don’t know where it is. Helps to have a Catalyst switch in one hand.

            For physical security though, badged entry to the building especially with a foyer where guests wait on a routine basis, and a strong anti-tailgating culture where everyone must badge in, will go a long way to getting normal people to pay attention. Not as easy in publicly accessible places like a hospital or some of the places I was working.

            • NoIWontPickaName@kbin.social
              link
              fedilink
              arrow-up
              3
              ·
              10 months ago

              That’s how we were at my last job.

              The tailgating thing was only allowed if you could see their badge, and with the exception of being on a clean suit, your badge was to be visible at all times, and we were trained and told to check for badges as we were walking around the facility.

              Forgetting your badge was a bitch though, there was literally only one door that could be opened from the outside without a badge and that was the front desk.

          • TheSanSabaSongbird@lemdro.id
            link
            fedilink
            English
            arrow-up
            3
            ·
            10 months ago

            That must be nice. My company does a lot of work for one of the world’s largest chip manufacturers and getting access to some of their facilities is like pulling teeth. Somebody forgot to submit the right paperwork, it didn’t go to the correct department or project manager, this facility is always locked down on the third Tuesday of every month, for reasons, you name it I’ve encountered it.

      • Facility management nowadays is outsourced to third party agencies. Usually the pay and working times are shit and they are consistently understaffed. At the same time they usually get access to most regular offices and they work before or after the offices fill.

        For a more concerted effort finding out which companies clean at which offices and enrolling there is not much of a thing. And voila you get access to all physical computers, can plant key loggers or other tools, or just malicious USB Sticks or similiar on the site.

        Not in the context of IT security, but for instance in Berlin Germany a group of robbers that stole the 100 kg gold maple leaf coin, hired someone a few month earlier with the security guard agency of the museum it was presented at.

          • NoIWontPickaName@kbin.social
            link
            fedilink
            arrow-up
            5
            ·
            10 months ago

            Or just get the job yourself.

            Most cleaning crews aren’t as rigorously checked as r&d even though they have more physical access than r&d

      • kent_eh@lemmy.ca
        link
        fedilink
        English
        arrow-up
        3
        ·
        10 months ago

        What do you mean by “the cleaners”?

        The people who push the brooms and empty the trash bins.

  • edgemaster72@lemmy.world
    link
    fedilink
    arrow-up
    15
    ·
    10 months ago

    Wouldn’t someone still have to deliberately click a malicious link to install it? Wouldn’t anyone working for such an agency be educated enough about these threats not to do so?

    lol, lmao even. I worked IT for a hospital network for about 4 years. Doctors aren’t any smarter than anyone else when it comes to using a computer, because it’s not what they spent all their years studying. People click on dumb shit they shouldn’t all the time, doesn’t matter how “smart” they’re supposed to be.

    • Mario_Dies.wav@lemmy.dbzer0.comOP
      link
      fedilink
      arrow-up
      3
      ·
      10 months ago

      Maybe you can frame it in a more relatable way like, “When you are performing surgery, you wouldn’t incise the first organ you see”

      • otp@sh.itjust.works
        link
        fedilink
        arrow-up
        3
        ·
        10 months ago

        The first organ I should be seeing is the one I cut open the body to look at! Otherwise, I cut the wrong spot…

  • Treczoks@lemmy.world
    link
    fedilink
    arrow-up
    15
    arrow-down
    1
    ·
    10 months ago

    Through the holy trinity of gaping holes: Windows, Office, and Exchange. And add lazy or stupid sysadmins on top who don’t care to update their stuff, they make break-ins even easier.

  • BandDad@lemm.ee
    link
    fedilink
    arrow-up
    13
    ·
    10 months ago

    I work in a public school. The older teachers are the ones that don’t even look at the sender address. “Oh, this email that sort of looks like its from an employee says to blindly open this file that I would realize is clearly fake if I took more than two seconds to look at it? I’m on it!”

    Our union negotiator didn’t understand different sheets in Excel files. Had a document he wanted to share out on sheet one. For some reason on sheet two he had every union employee’s name, birth date, social security number, address, etc. in plain text. Emailed to the entire school district. I caught it immediately and made them aware. The frantic emails to my friend the IT guy were hilarious. “I NEED YOU TO GO INTO EVERYONE’S EMAIL AND DELETE THE MESSAGE I JUST SENT.” Then when it was explained that you can’t just take it back, another frantic district email “DO NOT OPEN MY PREVIOUS EMAIL. JUST DELETE.” Again, not understanding that unless they empty their trash, its still recoverable for 30 days.

    • Mario_Dies.wav@lemmy.dbzer0.comOP
      link
      fedilink
      arrow-up
      6
      ·
      10 months ago

      There’s so much here, holy crap!

      But I’ve totally noticed the spontaneous mindless clicking among people with low tech literacy. Like, every single time I try to help someone navigate an application or web site, they’re fundamentally incapable of following step-by-step instructions and will randomly click on anything they see on screen. It’s so weird and frustrating.

      • Nfamwap@lemmy.world
        link
        fedilink
        arrow-up
        5
        ·
        edit-2
        10 months ago

        Dad: Hey son, next time you’re over, can you have a look at our laptop. it’s running slow for some reason.

        Me: Yeh no problem. Have you installed any new programs recently?

        Dad: No.

        Me: Opens program files, sort by date modified… Shocked Pikachu face

  • Hestia@lemmy.world
    link
    fedilink
    arrow-up
    11
    ·
    10 months ago

    Spearfishing is probably the lowest risk and easiest way to get access to a specific network. The attacker can get a bunch of info about an organization (technologies used, people employed, physical locations) through LinkedIn or whatever social media website, and then target a specific person.

    Once a target is identified, the next step would be getting that person to follow a link to type in a password, or getting them to install malware, or do whatever it is the attacker wants them to do. I read an article about a dude that got fairly big companies to pay him money by just sending fake bills.

    • Mario_Dies.wav@lemmy.dbzer0.comOP
      link
      fedilink
      arrow-up
      9
      ·
      10 months ago

      I read an article about a dude that got fairly big companies to pay him money by just sending fake bills

      I’m laughing so hard at this right now. That’s so funny.

  • Candelestine@lemmy.world
    link
    fedilink
    English
    arrow-up
    11
    arrow-down
    1
    ·
    10 months ago

    Since people are covering the more common options, I’ll point out a rarer one. If I remember right, (please correct me if I’m wrong) the Stuxnet virus was able to infiltrate a highly sensitive nuclear enrichment facility because someone planted a zip drive in the parking lot, and some employee went ahead and plugged it in at work to see what it was.

    • Mario_Dies.wav@lemmy.dbzer0.comOP
      link
      fedilink
      arrow-up
      6
      ·
      10 months ago

      some employee went ahead and plugged it in at work to see what it was

      Holy shit lmao. It just amazes me that someone working for such a facility would do this, but I suppose it’s the same as people who won’t wash their hands after using the toilet or who don’t use their blinker when driving.

      We’re just a bunch of shit-flinging primates, aren’t we? We just do thinks without thinking.

      And the worst part is, given the right circumstances (lack of sleep, extreme stress, illness), maybe that person could be me.

      • You already pointed out reasons, why people might lack the necessary judgement in one moment. The issue is that it is enough if one person fails to abide by the security rules once. So for the attacker all that is needed for a large enough organization is persistence.

          • NaN@lemmy.sdf.org
            link
            fedilink
            English
            arrow-up
            4
            ·
            edit-2
            10 months ago

            Phone and email scams work just the same. Only takes one grandma emptying her savings to make it worth it. And they get a lot of people who should otherwise know better.

            Phone scams especially use high pressure, unfamiliar situations, and fear to keep people from thinking about what’s actually happening, and you end up with otherwise intelligent people buying iTunes gift cards to get out of a warrant. Usually the victim figures out they’ve been scammed within minutes of the call ending, unless they have some cognitive decline.

      • Candelestine@lemmy.world
        link
        fedilink
        English
        arrow-up
        2
        ·
        10 months ago

        Also people often need to experience a problem before they realize its a problem. I doubt that specific individual will ever make that specific mistake again.

  • fidodo@lemmy.world
    link
    fedilink
    English
    arrow-up
    9
    ·
    10 months ago

    An advanced phishing attack can be incredibly hard to detect. Here’s an example of a browser vulnerability that allowed malicious sites to spoof legitimate looking domains. It’s been fixed since then, but it’s a constant battle between fixing exploits and new ones being found. A sophisticated operator can come up with ways to trick even the most tech savvy user, and most users will fall for more obvious tricks than that.

    • Mario_Dies.wav@lemmy.dbzer0.comOP
      link
      fedilink
      arrow-up
      4
      ·
      10 months ago

      Oh yes, the Latin vs. Cyrillic characters trick! Now that you mention it, I remember watching a YouTube video about this. Scary shit.

    • wahming@monyet.cc
      link
      fedilink
      English
      arrow-up
      2
      ·
      10 months ago

      How is this shit not fixed yet? That’s literally undetectable phishing

      • fidodo@lemmy.world
        link
        fedilink
        English
        arrow-up
        2
        ·
        edit-2
        10 months ago

        It is fixed, if you follow one of their example links you should see a warning now. I was using it as an example of how there can be hard to detect exploits.

        EDIT: it’s fixed in Chrome. Just tried Firefox and they don’t have a warning 😕

    • Classy Hatter@sopuli.xyz
      link
      fedilink
      arrow-up
      1
      ·
      edit-2
      10 months ago

      There’s a new similar phishing attack thanks to Google and their .zip domain. Web browsers support a feature that lets you use addresses of the form protocol://username:[email protected]. That feature allows you to log in to domain.tld with the given credentials. When you combine that with Unicode forward slashes, you can craft addresses that look like https://microsoft.com/files/@windowsupdate.zip, where the part between https:// and @ is a username and the part after @ is the actual address most likely used for malicious intends. My example uses normal slashes, so will lead to Microsoft’s website and page not found error. windowsupdate.zip is a domain someone has registered, but leads to no-where as of today. PSA: Don’t go to random web addresses you find on the Internet or elsewhere.