Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Share Post: Reddit Facebook
Your next Phishing email may come straight from PayPal
#1
[Image: Tk8RSRf.png]

Malicious actors have started to exploit a loophole in the defenses of many home users, organizations, email and security services, to send out phishing emails from legitimate services.

Threat actors have found a way to send phishing emails using the tools and services provided by legitimate companies such as PayPal or QuickBooks.

Most phishing emails come from unrelated domains; experienced users may spot these right away, and so do many antivirus solutions. Using a domain that is on an allow list, on the other hand, adds trust to the email.

Phishing emails that come directly from PayPal have a greater chance of slipping through defenses because of that. Email providers and antivirus solutions may not want to block all emails coming from PayPal, as it is a legitimate service.

Security researchers at Avanan, a CheckPoint company, discovered a new phishing attack in June 2022 that used free PayPal accounts to "send malicious invoices and requests". Similar to the QuickBooks invoice phishing campaign, the campaign used the legitimacy of PayPal to push past most defenses to land in the inbox of the users it attacked.

PayPal users may send invoices and money requests using the service. The attackers created free PayPal accounts to create fake invoices and money requests. They changed invoice data to look legitimate, e.g., by using names of respected companies, such as Norton.

Victims who find the phishing emails in their inboxes may believe it is legitimate as it comes from an official PayPal domain and not an unrelated site.

Attacked users may be inclined to call the provided phone number and/or pay the invoice. Any attempt at contacting the company used in the fake leads to communication with the attacker. While some of the attacked users may open the legitimate website of the company that allegedly sent the invoice, most may use information provided in the invoice to do so.

Avanan published three suggestions to combat this phishing trend:

Look up any number online before calling it to make sure it is legitimate.
Implement additional security protections to defend against these kinds of phishing emails.
Users who work in organizations should be trained to contact IT when in doubt.

Closing Words

The new phishing attack uses the tools that legitimate services and businesses provide to improve the legitimacy of the attack and bypass certain defenses.

One of the best options against this type of attack is to use common sense. Take an invoice for Norton Antivirus as an example: if you have no business relationship with Norton, then it is either a fake (very likely) or sent accidentally.

When in doubt, either contact IT support directly if that is an option, or open the website of the company in question to contact their support directly.

New phishing attacks have come to light recently. Microsoft described an attack that targeted Office users and was able to circumvent two-factor authentication protections. A similar attack was revealed by security researchers at Zscaler.

Source
Reply


Messages In This Thread
Your next Phishing email may come straight from PayPal - by tarekma7 - 08-08-2022 , 10:39 AM

Possibly Related Threads…
Thread Author Replies Views Last Post
  Beware: PayPal phishing texts state your account is 'limited' mrtrout 0 959 01-04-2021 , 01:22 AM
Last Post: mrtrout
  Devious Spamhaus Phishing Scam Warns You're on an Email Block List Mohammad.Poorya 0 1,284 02-02-2020 , 04:58 PM
Last Post: Mohammad.Poorya
  Phishing Email Warns: Add Recovery Number or Account Deleted Mohammad.Poorya 0 1,927 06-08-2019 , 12:20 AM
Last Post: Mohammad.Poorya
  New Ransomware Bundles PayPal Phishing Into Its Ransom Note Mohammad.Poorya 0 1,272 01-16-2019 , 06:32 AM
Last Post: Mohammad.Poorya
  HTTPS Phishing Page | Apple.com | Phishing Scam baziroll 0 2,281 04-21-2017 , 01:20 PM
Last Post: baziroll

Forum Jump:


Users browsing this thread: 1 Guest(s)