One Article Review

Accueil - L'article:
Source AlienVault.webp AlienVault Lab Blog
Identifiant 8564819
Date de publication 2024-08-27 10:00:00 (vue: 2024-08-27 17:17:55)
Titre Voici comment les messages de phishing permettent des filtres par e-mail
Here\\'s How Phishing Messages Break Through Email Filters
Texte The content of this post is solely the responsibility of the author.  LevelBlue does not adopt or endorse any of the views, positions, or information provided by the author in this article.  Phishing is an email-borne malicious technique aimed at learning the sensitive credentials of users or spreading malware. This practice has been on the list of the top cyber threats to individuals and businesses for years. According to the latest Phishing Activity Trends Report by APWG, the total number of phishing attacks identified in Q1 2024 exceeded 963,000. The average wire transfer amount requested in business email compromise (BEC) attacks during this period reached $84,000, showing a 50% increase compared to the previous quarter. With the staggering statistics in mind, this hoax is among the strongholds of the global cybercrime economy. It comes as no surprise that there are plenty of security companies whose area of expertise is isolated to anti-phishing services that prevent rogue emails from reaching their customers’ inboxes. Since orchestrating these campaigns is becoming more difficult for criminals, they are developing more sophisticated attack vectors that get around mainstream defenses. Phishers Are Thinking Outside the Box Malicious actors leverage a few effective evasion techniques to make sure their misleading messages arrive at their destination. Here are several real-world stratagems used to obfuscate bad intentions and circumvent automated protection tools. Hybrid “Vishing” Attacks Gaining Momentum Voice phishing, or vishing, has become an effective social engineering scam over the years. The fact that the manipulation takes place over the phone plays into the hands of fraudsters, as it slips below the radar of traditional security controls. The caveat comes down to high reliance on factors like cold calls that many people ignore, which reduces the success rate of such hoaxes. In an attempt to close that gap, criminals came up with a multi-step scheme that combines vishing and misleading emails. The idea is to contact a would-be victim initially with an email lure that contains a phone number in it. These messages will typically convey urgency by stating that the recipient might be locked out of their bank account, or that a suspicious financial transaction has been made without their consent. The user is instructed to call the number specified in the email to solve the problem. However, instead of providing assistance, the scammer on the other end will try to learn sensitive information. The original phishing email doesn’t contain any suspicious attachments or links, which makes it look normal when inspected by spam filters and antivirus protections. In some scenarios, criminals collect information about the victim from social media and other publicly accessible sources to make sure that the bait message correlates with their interests and lifestyle. The use of reliable data broker removal services can minimize the risk of exposure to this shady open-source intelligence (OSINT). Compromised SharePoint Accounts Another method for phishing scams to slide unnoticed into users’ inboxes is to piggyback on previously hacked SharePoint accounts. Email filters trust the domains used by this cloud-based collaborative service fro
Notes ★★★★
Envoyé Oui
Condensat $84 “@yahoo “end 000 2024 963 a dodgy a malicious a multi about accessible according account accounts activity actors adding address adopt aimed allow america among amount another anti antivirus any apwg arabic archive archives are area aren’t around arrive article ask asks assistance attachment attachments attack attackers attacks attempt attempts authentication author authority automated automatically average avoid bad bait bank bank’s banks based bec because become becoming been being below benign blocklists borne box break broker built business businesses call calls came camouflaged campaigns can cannot cascading catch caveat central certificate challenge checks choice circumvent clever click cloak close cloud code cold collaborative collect com” combine combines combo come comes coming common comodo companies compared component composition compromise compromised computer confirm conformance consent constantly contact contain contains content controls convey correlates credential credentials criminal’s criminals css customers’ cyber cybercrime decompression defenses denotes designed destination detect developing different difficult directions directory” dkim dmarc document disguised documents does doesn’t domain domainkeys domains dose down due during economy effective element elements elusive email email pretends email’s emails embedded end endorse engineering engines enter entered entries eocd evasion evolving exceeded expertise exposure extra extraction facilitates fact factors failing fake feign file filtering filters final financial flow fooled foolproof form forward framework fraud fraudsters from furthermore furtive gaining gap gateway get getting global hacked handbook hands harmless has healthy here hidden hierarchy high highly hoax hoaxes how however html hybrid idea identified identify ignore impersonating imposed inboxes include includes increase increasingly indispensable individuals infects info information initially inspect inspected instead institution instructed instruments integrated intelligence intentions interests involves isolated issued it’s its itself key known large latest phishing latin leading leads learn learning left legitimacy levelblue leverage leveraging lifestyle like link links list locked login long look lure made mail mainly mainstream major make makes malicious malware manipulation many match maximizing may means meanwhile mechanism media message messages method microsoft might mimicked mind minimize mishandle misleading modern momentum more normal normally not number obfuscate official one onedrive onenote only onus open operators’ orchestrating organization original osint ostensibly other out outside over page particularly tricky passes people perfectly period personal phishers phishing phone piggyback place plain plays plenty plus policy popular positions post potentially practice pressure prevent previous previously problem programming protecting protection protections provided provides providing publicly quantities quarter question radar rate rather raw reach reached reaching readable real reasons recent recipient recipients reduce reduces registration reliable data reliance removal render repertoire replica report by reporting requested responsibility result reverse reversing right risk risks rogue running ruse scam scammer scams scenarios scheme that schemes scripts secondary secondly secure security seg segs sender sensitive sent service services services can several shadowy shady sharepoint sheets showing shown sight sign significantly similar simple since single site skepticism skewing slide slip slips small social solely solve some sophisticated source sources spam specified spf spoof spreading ssl staggering stating statistics stealing step strain strand of stratagems strongholds structure style sub subtle success such supposed sure surprise suspicious takes technique techniques technologies templates text than the spoof the vpn&
Tags Spam Malware Tool
Stories Yahoo
Move


L'article ne semble pas avoir été repris aprés sa publication.


L'article ne semble pas avoir été repris sur un précédent.
My email: