Site icon City of Linden

There Are Plenty of Phish in This Sea!

Phishing remains one of the top attack vectors that hackers use to compromise accounts, steal credentials, gain remote access, and steal financial information. These email and SMS-based attacks are easy to distribute at scale and require little personalization, making them a commonly used tactic. Phishing attacks can now range from simple emails, to multi-stage campaigns that use artificial intelligence (AI) and imitate trusted brands.

For example, in a recent vishing campaign, hackers uses a phishing kit to create a custom phishing page, spoof the company’s IT help desk phone number, and contact a target! By spoofing a trusted phone number, hackers can impersonate the help desk to trick users into entering their credentials on a phishing page, while the phishing kit enables them to control what the target sees in real time.

In another campaign, hackers abused trusted services by sending phishing emails that include links to SharePoint, Google Drive, and OneDrive from compromised email addresses. These links enable hackers to deliver malicious payloads or steal credentials and can go undetected by email security systems.

What to do?

Exit mobile version