analyst @ nohacky :~/mitre $
cat / mitre / t1566.001
analyst@nohacky:~/mitre/t1566001-spearphishing-attachment.html
reading mode 10 min read
technique_id T1566.001
category MITRE ATT&CK
tactics
Initial Access
parent_technique T1566 Phishing
published April 2026

T1566.001: Spearphishing Attachment

Adversaries send precisely targeted emails carrying weaponized file attachments — Office documents, PDFs, executables disguised as documents, and password-protected archives — relying on the recipient to open the file and trigger the embedded payload. It is one of the most consistently documented initial access vectors in nation-state and cybercriminal campaigns alike.

T1566.001 is a sub-technique of T1566 (Phishing) and sits exclusively within the Initial Access tactic. Where generic phishing casts a wide net, spearphishing is surgical: the adversary has conducted reconnaissance on the target, understands their role and context, and crafts a lure that feels credible enough to act on. The attachment is the delivery vehicle, and execution depends on the target opening it — typically through T1204 (User Execution).

The technique has been a fixture of advanced persistent threat operations for well over a decade and remains heavily used in 2025 because it scales, evades many automated defenses, and exploits a vulnerability that patches cannot fix: human judgment under pressure. The MITRE ATT&CK entry for T1566.001 lists over one hundred threat groups and campaigns that have leveraged it, spanning government espionage, critical infrastructure attacks, ransomware delivery, and financial crime.

How Spearphishing Attachment Works

The attack chain begins well before the email is sent. The adversary collects targeting information — job title, organizational role, recent projects, trusted colleagues and vendors — through open-source intelligence, prior breaches, or reconnaissance infrastructure. This intelligence shapes both the lure content and the choice of attachment format.

The attachment itself can take several forms, each with different execution paths. Macro-enabled Office documents (.docm, .xlsm) were the dominant vehicle for years, relying on victims enabling macros or exploiting macro execution policy weaknesses. Microsoft's 2022 decision to block macros by default in files downloaded from the internet forced adversaries to adapt, leading to a marked shift toward ISO images, .lnk files, and HTML smuggling techniques that bypass the Mark of the Web (MotW) attribute. PDF files with embedded JavaScript or exploit code targeting reader vulnerabilities remain common, particularly when the adversary wants to appear more professional. Archives — ZIP, RAR, 7z — serve two purposes: they can contain executables or scripts, and when password-protected, they prevent automated email gateway inspection of the contents. Executables with spoofed icons and double extensions (e.g., Invoice.pdf   .exe) exploit the Windows default behavior of hiding known file extensions.

The email body typically provides a plausible pretext: a contract requiring signature, an invoice from a known vendor, a job posting, a security alert, or urgent HR correspondence. Instructions to enable macros, enter an archive password, or disable security warnings are framed as routine steps the target must take to view the document. In more sophisticated campaigns, the lure references specific real-world events, names colleagues, or spoofs a sender address within the target's own organization.

defense note

Microsoft's 2022 block on macros in internet-sourced Office files significantly reduced one delivery vector, but adversaries responded with container formats (ISO, VHD) that strip MotW from enclosed files, and with LNK-based loaders. Defenders should not assume macro restrictions alone close this technique.

Real-World Case Studies

Sandworm and the 2015 Ukraine Power Grid Attack

One of the most consequential uses of T1566.001 on record involved Russia-linked Sandworm Team (APT44) targeting Ukrainian energy distribution companies beginning in mid-2014. The adversaries sent spearphishing emails to utility staff with malicious Microsoft Office attachments; when opened, the documents used macros to install the BlackEnergy3 backdoor. The malware persisted on operational networks for roughly six months before Sandworm triggered simultaneous breaker openings on December 23, 2015, cutting power to approximately 230,000 customers across multiple regions. The attachment-based initial access was the first link in a chain that ended in the first publicly confirmed cyberattack to cause a physical power outage.

APT28 and Weaponized Office Lures Against Government Targets

Russia-linked APT28 (Fancy Bear) has employed T1566.001 extensively across its operations against NATO governments, defense organizations, and political targets. In a documented 2018 campaign, APT28 sent spearphishing emails spoofed to appear from a legitimate defence industry publication, attaching an Excel spreadsheet disguised as an events calendar. The document contained a macro that, when enabled by the target, changed the displayed font color to reveal apparent content while silently deploying an implant. Similar campaigns targeting European governmental organizations used RAR attachments containing exploit documents for CVE-2017-0199 and related Microsoft Office flaws. APT28 has continued refining these lures through 2024, adapting pretexts to current geopolitical events including the BRICS Summit and ongoing conflict in Ukraine.

Lazarus Group Weaponized Documents Against Defense and Nuclear Targets

North Korea-linked Lazarus Group has sustained a multi-year campaign, tracked in part as Operation DreamJob (DeathNote), that uses spearphishing attachments disguised as job offer packages and skills assessments from credible aerospace, defense, and technology organizations. In campaigns active through 2024 and into 2025, Lazarus sent archive files containing Word documents to employees at defense contractors and nuclear-sector organizations in Brazil, Vietnam, and South Korea. Opening the documents initiated a multi-stage infection chain delivering variants of backdoors including Comebacker and CookiePlus. Kaspersky researchers confirmed that at least two employees at the same nuclear-related organization were targeted within a single month, with archive lures impersonating prominent aerospace companies including Airbus and IIT Kanpur.

Detection Strategies

Detection for T1566.001 spans the email delivery layer, the endpoint, and network telemetry. No single control is sufficient; layered visibility across all three is necessary to reliably surface this technique.

Email Gateway and Attachment Analysis

# Splunk — identify emails with high-risk attachment extensions
# Adjust field names for your mail log source (e.g. O365, Proofpoint, Mimecast)
index=email_logs
| where match(attachment_name, "(?i)\.(doc[mx]?|xls[mx]?|ppt[mx]?|pdf|iso|lnk|vhd|7z|rar|zip)$")
| eval risk=case(
    match(attachment_name,"(?i)\.(lnk|iso|vhd)$"), "high",
    match(attachment_name,"(?i)\.(doc[mx]|xls[mx]|ppt[mx])$"), "medium",
    true(), "low"
  )
| where risk="high" OR (risk="medium" AND NOT like(sender_domain, "%known-domain.com"))
| stats count by sender, recipient, attachment_name, risk
| sort - count

Behavioral Indicators

Indicator What It Means
Office application spawning cmd.exe, powershell.exe, or wscript.exe Classic macro or exploit execution pattern; legitimate Office use rarely produces these child processes
PDF reader process initiating outbound network connection Indicative of embedded JavaScript or exploit code contacting a C2 or staging server
Archive tool (7z, WinRAR) extracting directly to %TEMP% or %APPDATA% Common staging behavior when an archive-based lure unpacks a payload to a writable system directory
File with MotW attribute absent despite having been received via email Suggests the file was delivered inside a container format (ISO, VHD) that strips MotW from enclosed content
Newly created .lnk file in user-writable directory executing unusual target paths LNK-based loaders are increasingly used as a post-macro-block delivery method
detection note

Sysmon Event ID 1 (process creation) and Event ID 3 (network connection) are high-value data sources for detecting post-open activity. Enriching these with parent process name and command line arguments substantially reduces false positives when hunting for Office-spawned shells.

Known Threat Actors Using T1566.001

T1566.001 appears in the documented TTPs of a significant number of tracked threat groups. The following represent some of the most consistently documented users of this technique across nation-state and cybercriminal categories.

  • APT28 / Fancy Bear (Russia, GRU Unit 26165) — Sustained use of macro-enabled Office documents and RAR attachments against NATO governments, political organizations, and defense targets; active through 2024 with lures tied to current geopolitical events
  • Sandworm / APT44 (Russia, GRU Unit 74455) — Used BlackEnergy3-laden Office attachments in the 2015 Ukraine power grid attack; continued spearphishing operations against Ukrainian and NATO-aligned organizations
  • Lazarus Group (North Korea, RGB) — Operation DreamJob and related campaigns use job-offer archives and weaponized Word documents against defense, nuclear, financial, and cryptocurrency targets globally
  • Mustang Panda / Earth Preta (China) — Prolific use of Office documents and archive lures against government, diplomatic, and NGO targets across Asia, Europe, and Australia; active with evolved tooling through 2025
  • Kimsuky (North Korea) — Spearphishing with malicious attachments targeting South Korean government entities, think tanks, and academics; frequently impersonates known institutions and individuals
  • TA505 / Cl0p (cybercriminal) — High-volume campaigns deploying malicious Office attachments at scale to deliver ServHelper, FlawedGrace, and ultimately ransomware payloads across financial and healthcare sectors

Defensive Recommendations

  1. Block macros from internet-sourced files at the policy level: Apply Group Policy or Intune configuration to enforce macro blocking for files with the Mark of the Web attribute across all Office applications. This follows Microsoft's own 2022 default change and should be explicitly enforced rather than relying on user consent prompts.
  2. Implement attachment sandboxing at the email gateway: Route all inbound attachments through a detonation sandbox before delivery. Focus on high-risk extensions (Office documents, PDFs, archives, LNK, ISO, VHD) and inspect both static properties and dynamic behavior during detonation.
  3. Restrict dangerous file types at the perimeter: Configure email gateway policies to quarantine or reject ISO, VHD, and LNK attachments, which have become primary delivery vehicles since macro blocking became widespread. Archive password prompts in the email body should trigger additional scrutiny.
  4. Enable and tune process creation logging: Deploy Sysmon or equivalent EDR telemetry with rules alerting on Office applications, PDF readers, and archive utilities spawning shell interpreters or making outbound network connections. Correlate with email delivery events where possible.
  5. Conduct targeted security awareness training: Standard phishing awareness training is insufficient against well-crafted spearphishing lures. Supplement with role-specific simulations that reflect the actual pretexts used against your sector — job offers for technical staff, contract documents for finance, and policy updates for administrators.
  6. Apply attack surface reduction rules: On Windows endpoints, enable Microsoft Defender ASR rules that block Office applications from creating child processes, block Office applications from injecting into other processes, and block executable content from email and webmail clients.
  7. Enforce least-privilege for end-user accounts: Reducing the privileges available to a user who opens a malicious attachment limits the blast radius. Standard users cannot install persistent mechanisms, write to system directories, or escalate privileges without additional exploitation steps that introduce additional detection opportunities.

MITRE ATT&CK Mapping

Field Value
Technique IDT1566.001
Technique NamePhishing: Spearphishing Attachment
Parent TechniqueT1566 Phishing
TacticInitial Access (TA0001)
PlatformsLinux, Windows, macOS
Data SourcesApplication Log: Application Log Content; Network Traffic: Network Traffic Content; Network Traffic: Network Traffic Flow
MitigationsM1049 Antivirus/Antimalware, M1031 Network Intrusion Prevention, M1021 Restrict Web-Based Content, M1054 Software Configuration, M1017 User Training
Version2.2 (Last Modified: October 24, 2025)
MITRE Referenceattack.mitre.org/techniques/T1566/001

Frequently Asked Questions

What is T1566.001 Spearphishing Attachment?

T1566.001 is a MITRE ATT&CK sub-technique under Initial Access in which adversaries send targeted emails with malicious file attachments — typically weaponized Office documents, PDFs, or archives — designed to execute a payload when opened by the recipient.

How do adversaries use spearphishing attachments?

Adversaries craft convincing lure emails tailored to the target's role or organization, attach a weaponized file such as a macro-enabled Word document or a PDF with an embedded exploit, and rely on the target opening the file to execute the payload. They frequently manipulate file extensions, use password-protected archives to evade email gateway scanning, and include persuasive instructions to bypass security warnings.

How can organizations detect spearphishing attachments?

Detection relies on monitoring email gateways for suspicious attachment types and macro-enabled documents, correlating process creation events where Office applications or PDF readers spawn child processes such as cmd.exe or PowerShell, alerting on unusual outbound network connections from document-rendering processes, and reviewing SIEM logs for Mark of the Web bypass indicators.

Sources and References

  • MITRE ATT&CK — T1566.001 Phishing: Spearphishing Attachment: attack.mitre.org
  • CISA — ICS Alert IR-ALERT-H-16-056-01 Cyber-Attack Against Ukrainian Critical Infrastructure: cisa.gov
  • Kaspersky GReAT — Lazarus targets nuclear organization with CookiePlus malware: kaspersky.com
  • Picus Security — Inside Sandworm: Decade of Cyber Sabotage and Espionage Activity: picussecurity.com
  • GBHackers — Lazarus Group Deploys Weaponized Documents Against Aerospace & Defense: gbhackers.com
  • Red Canary — Atomic Red Team T1566.001 Test Procedures: github.com/redcanaryco