Cyber security news for all

More

    Threat actors target workers with a phishing campaign

    Hackers are “changing with the tide”; as they have uncovered more nefarious manners to extort data from people working from home. Looking for new angles to socially engineer employees working from home under COVID-19 conditions, attackers have devised a new phishing campaign that distributes emails that look as if they were generated by  Private Branch Exchange (PBX).

    PBX incorporates emails of employees and enables them to receive voicemail recordings. The phishing actors have taken advantage of this fact to extort valuable data from employees.

    They create deceitful emails with convincing subject lines with the full intent of deceiving recipients and making them believe they have new messages.

    These subject lines, as well as, the sender name are sometimes customized to incorporate a precise person or company’s name. Thereby cementing the legitimacy.

    Iron scale, a cybersecurity vendor, released a blog post on Thursday concerning the issue. In the blog post, they stated that their researchers detected the malicious activities last month; and at least 100,000 mailboxes from various sectors have been jeopardized.

    In an email interview, an Ironscale spokesperson told SC media; “the attackers are looking to get the recipient to open the malicious attachment to drive to a fake landing page for credential harvesting. The recipient has to enter their O365 login credentials to access the voicemail recording.”

    Due to the absence of a malicious payload in the email, which usually triggers detection, the emails evade the DMARC authentication protocol and easily circumvents security.

    The Vice President of Pre-Sales Engineering/Director Of Engineering – Americas Ian Baxter sheds more light on the threat; “it may seem odd for attackers to create phishing websites spoofing PBX integrations as most voicemails are quite benign in the information shared, however, attackers know that the credentials could be used for multiple other logins, including for websites with valuable PII or business information. In addition, any sensitive information left in the voicemail could potentially be used for a social engineering attack.”

    The hackers have shown that there’s no barrier they can’t break. Whether pre out break or post-outbreak.

    Recent Articles

    Millions of RDP attacks on home offices

    Since the corona related move to the home office, the number of daily hacker attacks on remote desktop connections has increased more than tenfold....

    KuCion crypto confirms 150 million dollar security breach

    Cyber criminals were able to steal from the KuCion crypto and stole coins worth millions. On the evening of last Friday, KuCion crypto noticed...

    Hungarian banks were the target of a massive DDoS attack

    Several banks and the Hungarian Telekom have been the target of a cyber attack. The attacks are said to have come in several waves...

    The source code of Windows XP is leaked

    The source code of Windows XP is currently freely accessible. The media says that data first appeared on 4chan and is currently being exchanged...

    Hackers send malicious Azure Cloud apps to Microsoft

    Microsoft has banned some Azure Cloud applications from its cloud that the company identified as part of an attack infrastructure. Microsoft describes the approach...

    Related Stories

    Leave A Reply

    Please enter your comment!
    Please enter your name here

    Stay on op - Ge the daily news in your inbox