Carding 4 Carders
Professional
- Messages
- 2,728
- Reaction score
- 1,536
- Points
- 113
Getting an email from your boss isn't always a good thing, but it can be even worse in this case.
A widespread phishing campaign targeting CEOs of many companies has been discovered.
The campaign uses fake messages from bosses to try to get usernames and passwords.
Opening a campaign
Researchers from the firm GreatHorn found messages that use fake names and email addresses of company executives.
Emails use the company's name and a note about the meeting to attract the user's attention.
Since these messages seem to come from the boss, employees are more likely to fall for this Scam.
How phishing works
The email is simple, it tells the employee that the meeting was canceled and that they need to choose a new date.
When users click on the reschedule link, they are taken to a page that looks like Microsoft Outlook and Office 365.
However, this page is part of a phishing site, and any information entered on it will be collected by hackers.
Viewing a message on a mobile device shows a slightly different message, but the effect is the same.
High-level goals
This particular phishing email attack targets high-level executives such as CFO's, CTO's, and SVPs.
Obtaining the usernames and passwords of such high-ranking individuals means that attackers can gain access to the company's confidential information.
It is also possible that these attacks may target others in further malware campaigns.
Fruitful attacks
GreatHorn claims that this type of fake attack is becoming increasingly fruitful.
They found that fraud has become the target of every seventh customer.
In all these cases, the attackers were stopped before the damage was done.
However, it is assumed that the phishing URL IS still active and the campaign is still running.
It is recommended that managers be suspicious of emails that contain a subject line like the following:
[Company Name] March in-person Board Mtg scheduling (03/08/21 update).
A widespread phishing campaign targeting CEOs of many companies has been discovered.
The campaign uses fake messages from bosses to try to get usernames and passwords.
Opening a campaign
Researchers from the firm GreatHorn found messages that use fake names and email addresses of company executives.
Emails use the company's name and a note about the meeting to attract the user's attention.
Since these messages seem to come from the boss, employees are more likely to fall for this Scam.
How phishing works
The email is simple, it tells the employee that the meeting was canceled and that they need to choose a new date.
When users click on the reschedule link, they are taken to a page that looks like Microsoft Outlook and Office 365.
However, this page is part of a phishing site, and any information entered on it will be collected by hackers.
Viewing a message on a mobile device shows a slightly different message, but the effect is the same.
High-level goals
This particular phishing email attack targets high-level executives such as CFO's, CTO's, and SVPs.
Obtaining the usernames and passwords of such high-ranking individuals means that attackers can gain access to the company's confidential information.
It is also possible that these attacks may target others in further malware campaigns.
Fruitful attacks
GreatHorn claims that this type of fake attack is becoming increasingly fruitful.
They found that fraud has become the target of every seventh customer.
In all these cases, the attackers were stopped before the damage was done.
However, it is assumed that the phishing URL IS still active and the campaign is still running.
It is recommended that managers be suspicious of emails that contain a subject line like the following:
[Company Name] March in-person Board Mtg scheduling (03/08/21 update).