In 2022, brand impersonation attacks increased 74%, as stated in a recent study by the Armorblox Research Team. These attacks aim to deceive users by posing as reputable companies, in an attempt to gain unauthorized access to sensitive information.
Armorblox has released their latest blog of a brand impersonation attack impersonating Adobe, a software company for multimedia and creativity software products, with a focus on Adobe Acrobat.
The impact: This brand impersonation attack bypassed native Microsoft 365 email security, and targeted about 2,300 inboxes.
How it works: The contents of the email contained a brief message and a link to the document needing the recipient’s review. Clicking on the link navigates victims to a landing page resembling an Adobe File Sharing welcome page and notifies them that a file has been shared. The ultimate goal of the attack was extracting sensitive user credentials across all main native email security: Microsoft 365, Microsoft Outlook, and others.
You can read the blog entry here.
Like this:
Like Loading...
Related
This entry was posted on June 1, 2023 at 9:00 am and is filed under Commentary. You can follow any responses to this entry through the RSS 2.0 feed.
You can leave a response, or trackback from your own site.
Hackers Impersonate Multimedia Software Company Adobe in Latest Phishing Campaign to Extract Sensitive Credentials: Armorblox
In 2022, brand impersonation attacks increased 74%, as stated in a recent study by the Armorblox Research Team. These attacks aim to deceive users by posing as reputable companies, in an attempt to gain unauthorized access to sensitive information.
Armorblox has released their latest blog of a brand impersonation attack impersonating Adobe, a software company for multimedia and creativity software products, with a focus on Adobe Acrobat.
The impact: This brand impersonation attack bypassed native Microsoft 365 email security, and targeted about 2,300 inboxes.
How it works: The contents of the email contained a brief message and a link to the document needing the recipient’s review. Clicking on the link navigates victims to a landing page resembling an Adobe File Sharing welcome page and notifies them that a file has been shared. The ultimate goal of the attack was extracting sensitive user credentials across all main native email security: Microsoft 365, Microsoft Outlook, and others.
You can read the blog entry here.
Share this:
Like this:
Related
This entry was posted on June 1, 2023 at 9:00 am and is filed under Commentary. You can follow any responses to this entry through the RSS 2.0 feed. You can leave a response, or trackback from your own site.