Net Platforms

Computer

This Sneaky Phishing Technique is Tricking Employees into Installing Malware or Sharing Their Credentials

  • Termed as ‘conversation-hijacking’, the attack involves bad actors infiltrating real business email threads.
  • The infiltration is done by exploiting previously compromised credentials.

Security researchers are warning users about the increase in a particular phishing technique that tricks unsuspecting employees into performing malicious activities. This can include installing malware, transferring money or handing over their login credentials.

What’s new about the phishing technique?

  • Termed as ‘conversation-hijacking’, the attack involves bad actors infiltrating real business email threads.
  • The infiltration is done by exploiting previously compromised credentials. These credentials can be purchased on dark web forums or stolen via brute force attacks.
  • Once the attackers gain access to the account, they spend time reading through conversations. They do research on the victim and later look for any deals or valuable conversations that can be inserted within an email thread.
  • The idea behind using a real identity and mimicking the language makes the phishing attack look legitimate and the email appears to come from a trusted source.

What is the success rate of such attacks?

According to new research from Barracuda Networks, analysis of 500,000 emails show that conversation hijacking attacks have risen by over 400% between July and November last year.

“These attacks are highly personalized, including the content, and therefore a lot more effective. They have the potential of a very large payout, especially when organizations are preparing to make a large payment, purchase or an acquisition,” Olesia Klevchuk, senior product manager for email security at Barracuda Networks, told ZDNet.

How to combat the risk?

Conversation-hijacking attacks are more sophisticated than regular phishing attacks. Hence they are impossible to spot. Therefore, users should pay attention to the email address thread to understand whether a message is suspicious or not.

Users should also be wary of sudden demands for payments or transfers and if there’s a doubt about the origin of the request, they should contact the person requesting it.

We’re Netplatforms.

If you’re bewildered by the prospect of reviewing your Data Backup, we can help.

We’re Net Platforms and we have years of experience in supporting small-medium businesses across London and Essex with such technology challenges. We’ll get to know your business and create the most appropriate solution to meet your technical requirements, while being commercially sensible in cost. Please contact the team today on 0207 993 9035 or hello@netplatforms.wmtemp.com.

News Source: https://cyware.com/news/this-sneaky-phishing-technique-is-tricking-employees-into-installing-malware-or-sharing-their-credentials-a98f6b3f