Avanan, a Check Point Software Company, has releasee a report unveiling a new BEC 3.0, leveraging reputable services like Dropbox to distribute phishing content and exploit unsuspecting victims. The hackers initiate the attack by sharing a Dropbox link to a resume PDF. When recipients click on the link, they are directed to a page hosted on Dropbox. This initial communication, appearing to come from Dropbox, may seem harmless due to the platform’s credibility.
However, the hackers’ utilization of the site introduces malicious intent. Once users click on the link and enter Dropbox, they are presented with a page where they must input their email account and password to view the document. At this stage, the hackers obtain users’ email addresses and passwords, even if the users choose not to proceed further.
After submitting their credentials, users are redirected to another site that hosts a malicious URL. Although the URL originates from a legitimate source, the content displayed on the page raises concerns. Users encounter a webpage that mimics OneDrive, and if they click on the provided link, a malicious file is downloaded.
You can read more about this BEC 3.0 attack here.
Like this:
Like Loading...
Related
This entry was posted on May 18, 2023 at 9:05 am and is filed under Commentary with tags Avanan. You can follow any responses to this entry through the RSS 2.0 feed.
You can leave a response, or trackback from your own site.
New BEC 3.0 Variant Uses Dropbox in Phishing Attack Exploiting Resume PDF and Malicious OneDrive File
Avanan, a Check Point Software Company, has releasee a report unveiling a new BEC 3.0, leveraging reputable services like Dropbox to distribute phishing content and exploit unsuspecting victims. The hackers initiate the attack by sharing a Dropbox link to a resume PDF. When recipients click on the link, they are directed to a page hosted on Dropbox. This initial communication, appearing to come from Dropbox, may seem harmless due to the platform’s credibility.
However, the hackers’ utilization of the site introduces malicious intent. Once users click on the link and enter Dropbox, they are presented with a page where they must input their email account and password to view the document. At this stage, the hackers obtain users’ email addresses and passwords, even if the users choose not to proceed further.
After submitting their credentials, users are redirected to another site that hosts a malicious URL. Although the URL originates from a legitimate source, the content displayed on the page raises concerns. Users encounter a webpage that mimics OneDrive, and if they click on the provided link, a malicious file is downloaded.
You can read more about this BEC 3.0 attack here.
Share this:
Like this:
Related
This entry was posted on May 18, 2023 at 9:05 am and is filed under Commentary with tags Avanan. You can follow any responses to this entry through the RSS 2.0 feed. You can leave a response, or trackback from your own site.