Abnormal Security has published a novel Disney+ scam email that uses brand impersonation and personalization to send a convincing fake subscription charge notice. Mike Britton, the CISO of Abnormal Security, will demonstrate why this multi-stage attack is unique, what makes it challenging to detect, and how to stop impersonation attacks with AI.
The attachment is personalized and contains details about an upcoming bill, including the customer’s name, an invoice number, and the total amount to be paid in US dollars – a charge far more than the basic and premium Disney+ subscriptions combined.
The threat actor incorporated Disney+ branding and colors while personalizing each email’s subject line and greeting the individual recipient with the target’s name in the PDF filename and within the content of the fake invoice, an unusual tactic due to the manual effort required to do this for each email.
You can read the report here.
Like this:
Like Loading...
Related
This entry was posted on December 5, 2023 at 9:01 am and is filed under Commentary with tags Abnormal Security. You can follow any responses to this entry through the RSS 2.0 feed.
You can leave a response, or trackback from your own site.
New Disney+ Scam In Multi-Stage Email Attack Using Brand Impersonation & Personalized Attachments
Abnormal Security has published a novel Disney+ scam email that uses brand impersonation and personalization to send a convincing fake subscription charge notice. Mike Britton, the CISO of Abnormal Security, will demonstrate why this multi-stage attack is unique, what makes it challenging to detect, and how to stop impersonation attacks with AI.
The attachment is personalized and contains details about an upcoming bill, including the customer’s name, an invoice number, and the total amount to be paid in US dollars – a charge far more than the basic and premium Disney+ subscriptions combined.
The threat actor incorporated Disney+ branding and colors while personalizing each email’s subject line and greeting the individual recipient with the target’s name in the PDF filename and within the content of the fake invoice, an unusual tactic due to the manual effort required to do this for each email.
You can read the report here.
Share this:
Like this:
Related
This entry was posted on December 5, 2023 at 9:01 am and is filed under Commentary with tags Abnormal Security. You can follow any responses to this entry through the RSS 2.0 feed. You can leave a response, or trackback from your own site.