<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Campaign Management &#8211; phishandchips.io</title>
	<atom:link href="https://phishandchips.io/category/framework/campaign-management/feed/" rel="self" type="application/rss+xml" />
	<link>https://phishandchips.io</link>
	<description>Discussing cybersecurity one byte at a time.</description>
	<lastBuildDate>Fri, 19 Jul 2024 17:51:54 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://phishandchips.io/wp-content/uploads/2023/09/cropped-phishandchips.io_-32x32.png</url>
	<title>Campaign Management &#8211; phishandchips.io</title>
	<link>https://phishandchips.io</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">223541256</site>	<item>
		<title>Understanding UTM Parameters</title>
		<link>https://phishandchips.io/understanding-utm-parameters/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Fri, 19 Jul 2024 17:48:25 +0000</pubDate>
				<category><![CDATA[Campaign Management]]></category>
		<category><![CDATA[Payload Delivery]]></category>
		<category><![CDATA[Tips & Advice]]></category>
		<guid isPermaLink="false">https://phishandchips.io/?p=977</guid>

					<description><![CDATA[A crucial yet often overlooked aspect of phishing campaigns is the use of UTM (Urchin Tracking Module) parameters. This blog post will delve into what UTM parameters are, how they can be leveraged in phishing campaigns, and why they are considered best practices for enhancing the effectiveness and value of your campaign. What are UTM [&#8230;]]]></description>
										<content:encoded><![CDATA[
<p>A crucial yet often overlooked aspect of phishing campaigns is the use of UTM (Urchin Tracking Module) parameters. This blog post will delve into what UTM parameters are, how they can be leveraged in phishing campaigns, and why they are considered best practices for enhancing the effectiveness and value of your campaign.</p>



<h3 class="wp-block-heading">What are UTM Parameters?</h3>



<p>UTM parameters are tags added to a URL that help track the performance of campaigns and content across the web. Originally developed by Urchin Software Corporation, which was later acquired by Google, UTM parameters are now a standard feature in Google Analytics and many other web analytics tools. These parameters allow marketers and analysts to understand the source, medium, campaign name, and other details about how users interact with a link.</p>



<p>A typical URL with UTM parameters might look like this:<br></p>



<div class="wp-block-group has-black-background-color has-background has-global-padding is-layout-constrained wp-container-core-group-is-layout-95730b41 wp-block-group-is-layout-constrained" style="padding-top:0;padding-bottom:0">

<div class="codecolorer-container html4strict blackboard" style="overflow:auto;white-space:nowrap;border:1px solid #9F9F9F;width:435px;"><div class="html4strict codecolorer" style="padding:5px;font:normal 12px/1.4em Monaco, Lucida Console, monospace;white-space:nowrap;">https:<span style="color: #66cc66;">//</span>www.example.com?utm_source<span style="color: #66cc66;">=</span>newsletter&amp;utm_medium<span style="color: #66cc66;">=</span>email&amp;utm_campaign<span style="color: #66cc66;">=</span>spring_sale</div></div>




<p class="has-small-font-size" style="padding-top:0px;padding-right:var(--wp--preset--spacing--30);padding-bottom:0px;padding-left:var(--wp--preset--spacing--30)">Description</p>
</div>



<p>In this example:</p>



<ul class="wp-block-list">
<li>

<div class="codecolorer-container text blackboard" style="overflow:auto;white-space:nowrap;border:1px solid #9F9F9F;width:435px;"><div class="text codecolorer" style="padding:5px;font:normal 12px/1.4em Monaco, Lucida Console, monospace;white-space:nowrap;">utm_source=newsletter</div></div>

identifies the source of the traffic as a newsletter.</li>



<li>

<div class="codecolorer-container text blackboard" style="overflow:auto;white-space:nowrap;border:1px solid #9F9F9F;width:435px;"><div class="text codecolorer" style="padding:5px;font:normal 12px/1.4em Monaco, Lucida Console, monospace;white-space:nowrap;">utm_medium=email</div></div>

indicates the medium through which the link was delivered.</li>



<li>

<div class="codecolorer-container text blackboard" style="overflow:auto;white-space:nowrap;border:1px solid #9F9F9F;width:435px;"><div class="text codecolorer" style="padding:5px;font:normal 12px/1.4em Monaco, Lucida Console, monospace;white-space:nowrap;">utm_campaign=spring_sale</div></div>

specifies the campaign associated with the link.</li>
</ul>



<p>By appending these parameters to URLs, organizations can gain granular insights into how different marketing efforts are performing.</p>



<h3 class="wp-block-heading">UTM Parameters in  Phishing Campaigns</h3>



<p>UTM parameters can significantly enhance your phishing campaign by providing detailed tracking and analytics, which are crucial for evaluating the effectiveness of the campaign and understanding user behavior.</p>



<p>Here’s how UTM parameters can be applied:</p>



<ol class="wp-block-list">
<li><strong>Tracking Email Opens and Clicks</strong>:
<ul class="wp-block-list">
<li>By embedding UTM parameters in the links within phishing emails, organizations can track how many recipients opened the email and clicked on the link. This data helps measure engagement and identify which messages are most compelling.</li>
</ul>
</li>



<li><strong>Segmenting User Interaction</strong>:
<ul class="wp-block-list">
<li>UTM parameters allow for segmentation of users based on their interaction with the phishing message. For example, different UTM tags can be used for various departments or job roles, enabling targeted analysis and reporting.</li>
</ul>
</li>



<li><strong>Assessing Campaign Effectiveness</strong>:
<ul class="wp-block-list">
<li>Detailed insights from UTM parameters help assess the overall effectiveness of the campaign. Organizations can analyze which types of phishing emails are more likely to deceive employees and tailor their training programs accordingly.</li>
</ul>
</li>



<li><strong>Providing Feedback and Metrics</strong>:
<ul class="wp-block-list">
<li>UTM parameters can also be used to provide personalized feedback to employees who interacted with the phishing email. For instance, those who clicked on the link can be directed to a landing page with educational content that explains the phishing attempt and offers tips for identifying such threats in the future.</li>
</ul>
</li>
</ol>



<h3 class="wp-block-heading">Best Practices for UTM </h3>



<p>To maximize the benefits of UTM parameters in phishing campaigns, it’s essential to follow best practices. Here are some key recommendations:</p>



<ol class="wp-block-list">
<li><strong>Define Clear Naming Conventions</strong>:
<ul class="wp-block-list">
<li>Establish a consistent naming convention for UTM parameters to ensure data is easily understandable and analyzable. For example, use

<div class="codecolorer-container text blackboard" style="overflow:auto;white-space:nowrap;border:1px solid #9F9F9F;width:435px;"><div class="text codecolorer" style="padding:5px;font:normal 12px/1.4em Monaco, Lucida Console, monospace;white-space:nowrap;">utm_source=internal</div></div>

instead of

<div class="codecolorer-container text blackboard" style="overflow:auto;white-space:nowrap;border:1px solid #9F9F9F;width:435px;"><div class="text codecolorer" style="padding:5px;font:normal 12px/1.4em Monaco, Lucida Console, monospace;white-space:nowrap;">utm_source=phishing_sim</div></div>

to avoid raising suspicion.</li>
</ul>
</li>



<li><strong>Use Subtle Campaign Names</strong>:
<ul class="wp-block-list">
<li>Campaign names (

<div class="codecolorer-container text blackboard" style="overflow:auto;white-space:nowrap;border:1px solid #9F9F9F;width:435px;"><div class="text codecolorer" style="padding:5px;font:normal 12px/1.4em Monaco, Lucida Console, monospace;white-space:nowrap;">utm_campaign</div></div>

) should be subtle and not give away the original nature of the message. Instead of

<div class="codecolorer-container text blackboard" style="overflow:auto;white-space:nowrap;border:1px solid #9F9F9F;width:435px;"><div class="text codecolorer" style="padding:5px;font:normal 12px/1.4em Monaco, Lucida Console, monospace;white-space:nowrap;">utm_campaign=phishing</div></div>

, use something less conspicuous like

<div class="codecolorer-container text blackboard" style="overflow:auto;white-space:nowrap;border:1px solid #9F9F9F;width:435px;"><div class="text codecolorer" style="padding:5px;font:normal 12px/1.4em Monaco, Lucida Console, monospace;white-space:nowrap;">utm_campaign=q3_update</div></div>

.</li>
</ul>
</li>



<li><strong>Segment by Target Audience</strong>:
<ul class="wp-block-list">
<li>Utilize UTM parameters to segment the audience by department, role, or other criteria. This segmentation helps tailor the analysis and training to specific groups. For instance,

<div class="codecolorer-container text blackboard" style="overflow:auto;white-space:nowrap;border:1px solid #9F9F9F;width:435px;"><div class="text codecolorer" style="padding:5px;font:normal 12px/1.4em Monaco, Lucida Console, monospace;white-space:nowrap;">utm_term=project_alpha</div></div>

can be used instead of a specific department name.</li>
</ul>
</li>



<li><strong>Incorporate Multiple Parameters</strong>:
<ul class="wp-block-list">
<li>Leverage multiple UTM parameters to capture comprehensive data. Combining

<div class="codecolorer-container text blackboard" style="overflow:auto;white-space:nowrap;border:1px solid #9F9F9F;width:435px;"><div class="text codecolorer" style="padding:5px;font:normal 12px/1.4em Monaco, Lucida Console, monospace;white-space:nowrap;">utm_source</div></div>

,

<div class="codecolorer-container text blackboard" style="overflow:auto;white-space:nowrap;border:1px solid #9F9F9F;width:435px;"><div class="text codecolorer" style="padding:5px;font:normal 12px/1.4em Monaco, Lucida Console, monospace;white-space:nowrap;">utm_medium</div></div>

,

<div class="codecolorer-container text blackboard" style="overflow:auto;white-space:nowrap;border:1px solid #9F9F9F;width:435px;"><div class="text codecolorer" style="padding:5px;font:normal 12px/1.4em Monaco, Lucida Console, monospace;white-space:nowrap;">utm_campaign</div></div>

,

<div class="codecolorer-container text blackboard" style="overflow:auto;white-space:nowrap;border:1px solid #9F9F9F;width:435px;"><div class="text codecolorer" style="padding:5px;font:normal 12px/1.4em Monaco, Lucida Console, monospace;white-space:nowrap;">utm_term</div></div>

, and

<div class="codecolorer-container text blackboard" style="overflow:auto;white-space:nowrap;border:1px solid #9F9F9F;width:435px;"><div class="text codecolorer" style="padding:5px;font:normal 12px/1.4em Monaco, Lucida Console, monospace;white-space:nowrap;">utm_content</div></div>

provides a detailed view of user interactions. For example,

<div class="codecolorer-container text blackboard" style="overflow:auto;white-space:nowrap;border:1px solid #9F9F9F;width:435px;"><div class="text codecolorer" style="padding:5px;font:normal 12px/1.4em Monaco, Lucida Console, monospace;white-space:nowrap;">utm_content=doc_link</div></div>

versus

<div class="codecolorer-container text blackboard" style="overflow:auto;white-space:nowrap;border:1px solid #9F9F9F;width:435px;"><div class="text codecolorer" style="padding:5px;font:normal 12px/1.4em Monaco, Lucida Console, monospace;white-space:nowrap;">utm_content=profile_link</div></div>

can differentiate between multiple links within the same email without being overly descriptive.</li>
</ul>
</li>



<li><strong>Integrate with Analytics Tools</strong>:
<ul class="wp-block-list">
<li>Ensure that UTM-tagged URLs are integrated with your web analytics tools, such as Google Analytics. This integration allows for seamless tracking and reporting of campaign performance.</li>
</ul>
</li>



<li><strong>Educate and Inform</strong>:
<ul class="wp-block-list">
<li>Use the data gathered from UTM parameters to educate employees. Provide feedback on how many people interacted with the phishing email and use this information to reinforce training sessions. Highlight common mistakes and offer tips for identifying phishing attempts.</li>
</ul>
</li>
</ol>



<h3 class="wp-block-heading">Obfuscating UTM Parameters </h3>



<p>While UTM parameters are invaluable for tracking and analytics, they can also inadvertently reveal the nature of the message if not used discreetly. Here are strategies for obfuscating UTM parameters to ensure the phishing remains effective:</p>



<ol class="wp-block-list">
<li><strong>Use Generic Terms</strong>:
<ul class="wp-block-list">
<li>Avoid using terms that clearly indicate a phishing message. For instance, replace

<div class="codecolorer-container text blackboard" style="overflow:auto;white-space:nowrap;border:1px solid #9F9F9F;width:435px;"><div class="text codecolorer" style="padding:5px;font:normal 12px/1.4em Monaco, Lucida Console, monospace;white-space:nowrap;">utm_source=phishing</div></div>

with

<div class="codecolorer-container text blackboard" style="overflow:auto;white-space:nowrap;border:1px solid #9F9F9F;width:435px;"><div class="text codecolorer" style="padding:5px;font:normal 12px/1.4em Monaco, Lucida Console, monospace;white-space:nowrap;">utm_source=internal_news</div></div>

.</li>
</ul>
</li>



<li><strong>Randomized or Code-Based Naming</strong>:
<ul class="wp-block-list">
<li>Use randomized strings or codes that don&#8217;t immediately suggest a phish. For example,

<div class="codecolorer-container text blackboard" style="overflow:auto;white-space:nowrap;border:1px solid #9F9F9F;width:435px;"><div class="text codecolorer" style="padding:5px;font:normal 12px/1.4em Monaco, Lucida Console, monospace;white-space:nowrap;">utm_campaign=abc123</div></div>

can be decoded internally to represent a specific campaign.</li>
</ul>
</li>



<li><strong>Contextual but Neutral Naming</strong>:
<ul class="wp-block-list">
<li>Utilize names that fit within the context of the organization’s regular communication but are neutral enough not to raise alarms. For instance,

<div class="codecolorer-container text blackboard" style="overflow:auto;white-space:nowrap;border:1px solid #9F9F9F;width:435px;"><div class="text codecolorer" style="padding:5px;font:normal 12px/1.4em Monaco, Lucida Console, monospace;white-space:nowrap;">utm_medium=update_email</div></div>

instead of

<div class="codecolorer-container text blackboard" style="overflow:auto;white-space:nowrap;border:1px solid #9F9F9F;width:435px;"><div class="text codecolorer" style="padding:5px;font:normal 12px/1.4em Monaco, Lucida Console, monospace;white-space:nowrap;">utm_medium=phish_email</div></div>

.</li>
</ul>
</li>



<li><strong>Consistent but Non-Descriptive Tags</strong>:
<ul class="wp-block-list">
<li>Maintain consistency in your naming conventions across different campaigns while keeping the tags non-descriptive. For example,

<div class="codecolorer-container text blackboard" style="overflow:auto;white-space:nowrap;border:1px solid #9F9F9F;width:435px;"><div class="text codecolorer" style="padding:5px;font:normal 12px/1.4em Monaco, Lucida Console, monospace;white-space:nowrap;">utm_term=phase1</div></div>

for the first phase of multiple campaigns.</li>
</ul>
</li>
</ol>



<h3 class="wp-block-heading">Examples of Obfuscated UTM Parameter Usage </h3>



<p>Let’s consider a practical example of a phishing campaign targeting an organization’s employees. The campaign aims to test the employees’ ability to recognize phishing emails and educate them on best practices without giving away the true intention.</p>



<ol class="wp-block-list">
<li><strong>Crafting the Phishing Email</strong>:
<ul class="wp-block-list">
<li>The email mimics a common phishing tactic, such as a fake invoice notification or a security alert. The email contains a link that directs users to a phishing page designed to look like a legitimate login page.</li>
</ul>
</li>



<li><strong>Adding Obfuscated UTM Parameters to the Link</strong>:
<ul class="wp-block-list">
<li>The URL in the phishing email is tagged with obfuscated UTM parameters:<br>

<div class="codecolorer-container text blackboard" style="overflow:auto;white-space:nowrap;border:1px solid #9F9F9F;width:435px;"><div class="text codecolorer" style="padding:5px;font:normal 12px/1.4em Monaco, Lucida Console, monospace;white-space:nowrap;">https://www.fake-login.com?utm_source=internal_news&amp;amp;utm_medium=email&amp;amp;utm_campaign=abc123&amp;amp;utm_term=project_alpha&amp;amp;utm_content=doc_link</div></div>

</li>
</ul>
</li>



<li><strong>Launching the Campaign</strong>:
<ul class="wp-block-list">
<li>The phishing email is sent to the targeted employees. Analytics tools track interactions with the email and the tagged URL without employees easily identifying the phish</li>
</ul>
</li>



<li><strong>Analyzing the Results</strong>:
<ul class="wp-block-list">
<li>Post-campaign, the analytics data is reviewed. You can see how many employees from the targeted project clicked on the link (

<div class="codecolorer-container text blackboard" style="overflow:auto;white-space:nowrap;border:1px solid #9F9F9F;width:435px;"><div class="text codecolorer" style="padding:5px;font:normal 12px/1.4em Monaco, Lucida Console, monospace;white-space:nowrap;">utm_term=project_alpha</div></div>

) and whether different links within the email had varying levels of engagement (

<div class="codecolorer-container text blackboard" style="overflow:auto;white-space:nowrap;border:1px solid #9F9F9F;width:435px;"><div class="text codecolorer" style="padding:5px;font:normal 12px/1.4em Monaco, Lucida Console, monospace;white-space:nowrap;">utm_content=doc_link</div></div>

)</li>
</ul>
</li>



<li><strong>Adjusting Future Campaigns</strong>:
<ul class="wp-block-list">
<li>The insights from the UTM parameters inform future campaigns. If the data shows that employees are frequently falling for certain types of phishing emails, the training program can be adjusted to address these weaknesses.</li>
</ul>
</li>
</ol>



<h3 class="wp-block-heading">Conclusion</h3>



<p>Incorporating UTM parameters into phishing campaigns is a best practice that significantly enhances the effectiveness of these exercises and elevates your game into a truly targeted experience. By providing detailed tracking and analytics, UTM parameters help your organization understand user behavior, assess campaign effectiveness, and deliver targeted messaging. By obfuscating these parameters, organizations can ensure the phishing remains subtle and effective, offering a realistic experience.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">977</post-id>	</item>
		<item>
		<title>Project Management or Cyber Campaign? Spot the Differences</title>
		<link>https://phishandchips.io/project-management-or-cyber-campaign-spot-the-differences/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Sat, 16 Sep 2023 16:46:03 +0000</pubDate>
				<category><![CDATA[Campaign Management]]></category>
		<guid isPermaLink="false">https://phishandchips.io/project-management-or-cyber-campaign-spot-the-differences/</guid>

					<description><![CDATA[]]></description>
										<content:encoded><![CDATA[]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">392</post-id>	</item>
		<item>
		<title>From Campaign Trail to Cyber Trail: Managing Attacks with Flair</title>
		<link>https://phishandchips.io/from-campaign-trail-to-cyber-trail-managing-attacks-with-flair/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Sat, 16 Sep 2023 16:46:03 +0000</pubDate>
				<category><![CDATA[Campaign Management]]></category>
		<guid isPermaLink="false">https://phishandchips.io/from-campaign-trail-to-cyber-trail-managing-attacks-with-flair/</guid>

					<description><![CDATA[]]></description>
										<content:encoded><![CDATA[]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">393</post-id>	</item>
		<item>
		<title>Campaign Chronicles: Adventures of Cyber Strategists</title>
		<link>https://phishandchips.io/campaign-chronicles-adventures-of-cyber-strategists/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Sat, 16 Sep 2023 16:46:03 +0000</pubDate>
				<category><![CDATA[Campaign Management]]></category>
		<guid isPermaLink="false">https://phishandchips.io/campaign-chronicles-adventures-of-cyber-strategists/</guid>

					<description><![CDATA[]]></description>
										<content:encoded><![CDATA[]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">394</post-id>	</item>
		<item>
		<title>Campaign Command Central: Where Cyber Masterminds Plot</title>
		<link>https://phishandchips.io/campaign-command-central-where-cyber-masterminds-plot/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Sat, 16 Sep 2023 16:46:03 +0000</pubDate>
				<category><![CDATA[Campaign Management]]></category>
		<guid isPermaLink="false">https://phishandchips.io/campaign-command-central-where-cyber-masterminds-plot/</guid>

					<description><![CDATA[]]></description>
										<content:encoded><![CDATA[]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">395</post-id>	</item>
		<item>
		<title>Campaign Management for Dummies (Not Hackers): A Beginner&#8217;s Guide</title>
		<link>https://phishandchips.io/campaign-management-for-dummies-not-hackers-a-beginners-guide/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Sat, 16 Sep 2023 16:46:03 +0000</pubDate>
				<category><![CDATA[Campaign Management]]></category>
		<guid isPermaLink="false">https://phishandchips.io/campaign-management-for-dummies-not-hackers-a-beginners-guide/</guid>

					<description><![CDATA[]]></description>
										<content:encoded><![CDATA[]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">396</post-id>	</item>
		<item>
		<title>Cyber Campaigns: Planning, Execution, and Pizza?</title>
		<link>https://phishandchips.io/cyber-campaigns-planning-execution-and-pizza/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Sat, 16 Sep 2023 16:46:02 +0000</pubDate>
				<category><![CDATA[Campaign Management]]></category>
		<guid isPermaLink="false">https://phishandchips.io/cyber-campaigns-planning-execution-and-pizza/</guid>

					<description><![CDATA[]]></description>
										<content:encoded><![CDATA[]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">391</post-id>	</item>
	</channel>
</rss>
