One Article Review

Accueil - L'article:
Source AlienVault.webp AlienVault Blog
Identifiant 1660297
Date de publication 2020-04-17 12:00:00 (vue: 2020-04-17 13:01:28)
Titre 5 most common mobile phishing tactics
Texte Phishing is one of the things that keeps CISOs up at night. Phishing attacks are effective and simple to launch, and used by financially motivated attackers as well as more targeted attacks. In the case of a targeted attack, it may harvest login credentials to gain access to corporate or personal resources.  In fact, sometimes corporate access can be used to steal personal data, and vice versa. Once inside the corporate network, attackers can launch full-scale cyber-espionage campaigns - silently stealing sensitive data and selling it on the dark web or obtaining admin server credentials to launch a full-scale network attack - which could cripple a company’s supply chain. Yet as concerning as phishing may be, an emerging risk is not even realized by CISOs or their end users: phishing is increasingly targeting users on their mobile devices. Attackers are getting a higher return on investment by phishing mobile users. Everyone has a mobile device these days and employees are using them far more for both work and personal life. Smaller screens display both work and personal messaging making it even more difficult to spot malicious phishing attacks. In fact, Lookout data shows that 1 in 50 enterprise users are phished on mobile devices daily. Mobile phishing rates have doubled for Lookout users of Office 365 and G Suite. This is a serious problem.  Lookout data suggests that enterprise users are three times more likely to fall for a phishing link when presented on the small screens of mobile devices rather than when presented on the screens of desktop OS, like Windows or macOS. Phishing has moved to mobile Most think “email” when they hear the word “phishing” but it is different on mobile. Mobile phishing extends beyond email to SMS, MMS, messaging platforms, and social media apps. Attacks are technically simple but novel in their approach. They seek to exploit human trust along social networks using personal context. For example, a parent would click without hesitation on a message saying their daughter has been in an accident at school. Employees also find it easier to perform tasks on a mobile device than on a desktop. Depositing checks via mobile banking app, for example, is simple, fast, and convenient, and there are many other examples like this. So, organizations must remain vigilant to keep pace with phishing threats that are increasingly targeting mobile users. An Akamai study highlights the dynamic nature of phishing sites - of over 2 billion domains analyzed; nearly 89% of the domains commonly associated with malicious sites had a life span of less than 24 hours.This emphasizes the need for advanced detection capabilities. Historically, organizations have invested heavily in security solutions such as secure email gateways, inbox scans, and end user training. Yet, these techniques remain too narrowly focused on email and do not protect modern messaging, such as SMS, Slack, and Microsoft Instant Messaging. Combating sophisticated phishing attacks on mobile is the new battleground as attackers continue to employ sophisticated mobile phishing strategies. Most common mobile phishing tactics There are several techniques that cybercriminals use to make their phishing attacks more effective on mobile. Below are some of the more commonly used tactics that Lookout has observed in the wild: URL padding is a technique that includes a real, legitimate domain within a larger URL but pads it with hyphens to obscure the real destination. For example, hxxp://m.facebook.com----------------validate----step1.rickytaylk[dot]com/sign_in.html con
Envoyé Oui
Condensat  in  note 365 @phishingai abbreviated about access accessing accident achieved active actual additionally address admin advanced air akamai algorithms along also analysis analyze analyzed; android app applies applying approach apps are artificial associated attack attacker attackers attacks authentication auto available banking bar battleground been before below beyond billion bogus both built but campaigns can capabilities capture case cases certain chain characteristics checks cisos classified click clicked clicking code com com/sign combat combating come common commonly company’s complex complicated conceals concerning confidence configuration confirms constantly content context continue continues convenient convict conviction convictions corporate could credentials cripple customers cyber cybercriminals daily dark data daughter days deploy deployed depositing designed desktop destination detailed detection develop device devices different difficult direct discretely display domain domains dot doubled down due dynamic easier effective email embedded emerging emphasizes employ employees empt enable end endpoint enterprise espionage even event events everyone example examples execute exploit extends facebook fact fall far fast feeds filtered financially find findings focused following form from full further gain gateways getting hackers had harvest has have having hear heavily here hesitation high higher highlighted highlights highly historically hours html human hundreds hxxp://m hyphens identify implies inbox includes increasingly information inside instant intelligence intelligent interception invested investment ios keep keeps large larger launch learning leaving legitimate less level life like likely link live login longer lookout lucrative machine macos make making malicious manual many mass match may media message messages messaging microsoft millions mms mobile modern monitored monitoring more most motivated moved must narrowly nature nearly need network networks new night not notification notifies novel obscure observed obtaining office often old once one only order organization organizations ota other out over overlays pace padding pads page parent payment perform personal phished phishing phones platforms pre presented proactively problem processes protect protection provide provisioning purpose quantities rapid rates rather real realized reduces refers remain replicate required researcher resources response return returns rickytaylk risk running saying scale scams scan scans school screen screens secure security seek select selling sensitive sequence: serious server service several shares shortened shown shows silently simple site sites slack small smaller sms social solution solutions some sometimes soon sophisticated span specific speed spoofing spot steal stealing step1 steps strategies study subset such suggests suite suited summary supply suspicious synthesizes system tactics take target targeted targeting tasks technically technique techniques telemetry text than them these things think thousands threat threats three threshold time times tiny too traffic training tricks trigger triggers trust twitter type underway update url urls use used user user's users users: using validate verification verify versa vice vigilant visible web websites well when where which who wild: windows within without word work would years yet
Tags Threat
Stories
Notes
Move


L'article ne semble pas avoir été repris aprés sa publication.


L'article ne semble pas avoir été repris sur un précédent.
My email: