Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Share Post: Reddit Facebook
MICROSOFT USERS TARGETED BY FAKE FEDEX AND DHL EMAILS
#1
Users of Microsoft Corp. email services are being targeted by a new phishing scam that sends fake messages pretending to be from FedEx Corp. and DHL International GmbH.
 
Detailed today by security researchers from Armorblox Inc., the phishing attack is known to have targeted at least 10,000 Microsoft email users with fake links that, if followed, steal the victim’s credentials. The fake FedEx messages claim to have a document sent to the victim with the title “you have received FedEx files” while the DHL emails falsely claim that “your parcel has arrived.”
 
In the FedEx phishing campaign, the email contained some information about the fake document to make it seem legitimate, such as identification number, number of pages and the type of document. If users click on the provided link, they are taken to a file hosted on Quip, a tool for Salesforce Inc. that offers documents, spreadsheets and other services.
 
The Quip file then takes the victims to a final phishing page resembling the Microsoft login portal that appears to be hosted on Google LLC’s Firebase, further fooling the victim into thinking that the link is legitimate. Users who then enter their Microsoft credentials are presented with an error message asking the victim to enter their correct details, giving the hackers the login information.
 
The DHL phishing attack asks users to enter details on a fake page, but in this case it’s to obtain either Adobe credentials or the work email credentials of the user.
 
“There are few brands like FedEx, DHL and UPS that can quickly capture the attention of targets,” Chris Hazelton, director of security solutions at mobile security firm Lookout Inc., told SiliconANGLE. “With everyone stuck at home, many recipients are anticipating something they bought online being delivered to them. This includes business transactions where threat actors are mimicking delivery services to trick people into giving up credentials to their organization’s cloud services.”
Photo: Raimond Spekking/Wikimedia Commons

… We’d also like to tell you about our mission and how you can help us fulfill it. SiliconANGLE Media Inc.’s business model is based on the intrinsic value of the content, not advertising. Unlike many online publications, we don’t have a paywall or run banner advertising, because we want to keep our journalism open, without influence or the need to chase traffic.The journalism, reporting and commentary on SiliconANGLE — along with live, unscripted video from our Silicon Valley studio and globe-trotting video teams at theCUBE — take a lot of hard work, time and money. Keeping the quality high requires the support of sponsors who are aligned with our vision of ad-free journalism content.
 
If you like the reporting, video interviews and other ad-free content here, please take a moment to check out a sample of the video content supported by our sponsors, , and keep coming back to SiliconANGLE.



Source
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  Eugene Kaspersky Targeted attack on our management with the Triangulation Trojan. mrtrout 0 505 06-02-2023 , 03:59 AM
Last Post: mrtrout
  Fake TSA PreCheck sites scam US travelers with fake renewals mrtrout 0 510 11-20-2021 , 11:55 PM
Last Post: mrtrout
  Kaspersky’s Advanced Targeted Threat Predictions For 2022 mrtrout 0 588 11-16-2021 , 02:55 AM
Last Post: mrtrout
  Windows 10 targeted by PuzzleMaker hackers using Chrome zero-days mrtrout 0 791 06-08-2021 , 10:08 PM
Last Post: mrtrout
  Microsoft: Office 365 is blocking emails from Google, LinkedIn domains tarekma7 0 843 05-22-2021 , 04:18 PM
Last Post: tarekma7

Forum Jump:


Users browsing this thread: 1 Guest(s)