Towards the end of November, ‘Abnormal Security’ detected one of the phishing campaign’s attack emails. The phishing campaign used back-to-work notifications in order to compromise recipients’ corporate email accounts.
That message involved an internal notification from the recipient’s company. It did so by using spoofing techniques to disguise the sender address. The email didn’t originate from inside the company. However in its research Abnormal Security explained that email instructed the recipient to open an HTML attachment containing the recipient’s name in its title.
The document contained several instructions targeting the company’s remote work policy. It also included a link that urged users to submit their acknowledgment of the updated terms. The link was used to open a fake login page designed to steal their email credentials. The users who went to the fake login portal and filled all the credentials, their information was handed over to the attackers.
Though the incident is still under, this campaign highlights the need for organizations to protect their employees’ corporate email accounts against phishers. One of the ways they can do this is by educating their users about some of the most common types of phishing attacks that are in circulation today.