Thursday, February 2, 2023
spot_img
HomeCyber Security BlogsBack-to-Work Phishing Campaign Targets Corporate Email Accounts

Back-to-Work Phishing Campaign Targets Corporate Email Accounts

Towards the end of November, ‘Abnormal Security’ detected one of the phishing campaign’s attack emails. The phishing campaign used back-to-work notifications in order to compromise recipients’ corporate email accounts.

That message involved an internal notification from the recipient’s company. It did so by using spoofing techniques to disguise the sender address. The email didn’t originate from inside the company. However in its research Abnormal Security explained that email instructed the recipient to open an HTML attachment containing the recipient’s name in its title.

The document contained several instructions targeting the company’s remote work policy. It also included a link that urged users to submit their acknowledgment of the updated terms. The link was used to open a fake login page designed to steal their email credentials. The users who went to the fake login portal and filled all the credentials, their information was handed over to the attackers.

Though the incident is still under, this campaign highlights the need for organizations to protect their employees’ corporate email accounts against phishers. One of the ways they can do this is by educating their users about some of the most common types of phishing attacks that are in circulation today.

Previous article
Next article
RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -spot_img

Most Popular

Recent Comments

亚洲A∨精品无码一区二区观看 on Restaurant Scheduling 101 For Better Business Performance

Write For Us