INKY has published a new Fresh Phish talking about a complicated scheme leveraging legitimate Adobe and Constant Contact tools in a multi-layered attack.
Techniques include:
- Personalized phish — algorithms that extract the recipient’s domain and impersonate that domain to create a unique phish for each recipient.
- Image-based phish — textual phish message is embedded in an image.
- Malicious QR code- conceals the malicious URL from recipients and security software.
- Brand impersonation — uses company logos and trademarks to impersonate well-known brands in order to make an email or malicious site look more legitimate.
- Advanced fees scam — occurs when a victim thinks they are logging in to one of their resource sites but are really entering payment information into a dialog box owned by the attackers.
You can read the report here.
Like this:
Like Loading...
Related
This entry was posted on March 12, 2024 at 10:00 am and is filed under Commentary with tags INKY. You can follow any responses to this entry through the RSS 2.0 feed.
You can leave a response, or trackback from your own site.
INKY Serves Up A New Fresh Phish Regarding Adobe And Constant Contact
INKY has published a new Fresh Phish talking about a complicated scheme leveraging legitimate Adobe and Constant Contact tools in a multi-layered attack.
Techniques include:
You can read the report here.
Share this:
Like this:
Related
This entry was posted on March 12, 2024 at 10:00 am and is filed under Commentary with tags INKY. You can follow any responses to this entry through the RSS 2.0 feed. You can leave a response, or trackback from your own site.