Just in:
Sharjah Census Gears Up for Final Enumeration Phase // Cairo Recognizes Arab World’s Creative Luminaries at Award Ceremony // Dubai Gears Up for Second FinTech Summit as Funding Surges // AVPN Charts Path Forward at 2024 Global Conference // Telecom Giant Du Eyes Crypto Integration for FinTech Platform // Galaxy Macau’s Sakura Cultural Festival Kicked off in Splendor // PolyU forms global partnership with ZEISS Vision Care to expand impact and accelerate market penetration of patented myopia control technology // Ministry of Agriculture Supports Taiwanese Tea’s Entry into Singapore Market to Boost Global Presence // NetApp’s 2024 Cloud Complexity Report Reveals AI Disrupt or Die Era Unfolding Globally // DIFC Courts Cement Role as Top English Dispute Resolution Choice // Astana International Exchange Connects with Regional Markets Through Tabadul Hub // Lee Chong Wei Shows Up On Chinese Hot cultural Talk Show “SHEDE Wisdom Talents”, Talking About “Crossing The Hill” // Prince Holding Group’s Chen Zhi Scholarship Clinches Silver Stevie for CSR Excellence at Asia-Pacific Stevie Awards // Lai & Turner Law Firm PLLC Welcomes Eric Strocen as Director of Family Law Division // Abu Dhabi Secures US$5 Billion in Fresh Funding // Oman Seeks Growth Through Strategic Economic Alliances // Leading with Compliance, ZUHYX Earns the Canadian MSB License // Hong Kong Unveils April 30 Launch for Landmark Crypto ETFs // New Dynamics in Cryptocurrency Security: ZUHYX Builds the Strongest Fund Protection System // Andertoons by Mark Anderson for Thu, 25 Apr 2024 //

Custom phishing attacks grow as crooks create fake flight confirmations, receipts

1490964135 istock000025868274medium

istock000025868274medium.jpg

Attackers are using fake airline booking confirmation messages to steal corporate credentials.


Image: iStock

Cyberattackers are carefully crafting individual phishing emails puporting to be from airlines and financial departments to deliver malware and are even mimicking internal corporate travel and expenses systems in order to steal personal details from specifically targeted victims.

While cybercriminals using the lure of fake travel itineraries is to dupe those in sectors reliant on shipping goods or employee travel isn’t new, researchers have discovered a particularly advanced phishing attack.

ADVERTISEMENT

Discovered by cybersecurity researchers at Barracuda Networks, this airline phishing attack uses a variety of techniques to capture sensitive data from victims and deploy an advanced persistent threat.

The email from the attacker impersonates a travel agency or an employee in the target’s own HR or finance department, sending a message with a subject line claiming to be a forwarded message about a flight confirmation, stating the airline, the destination and the price of the flight.

All three of these things are carefully researched by the attackers, who select them specifically for the target in order to look legitimate in context of the company and the email recipient. Taking the time to tailor phishing emails in this way works; because these messages are opened 90 percent of the time, making this one of the highest success rates for phishing attacks, say Barracuda.

Once opened, the email presents the target with an attachment in the form of a PDF or Microsoft Word document purporting to be a flight confirmation or receipt but of course, it’s neither of these things.

When the target opens the attachment, malware runs immediately, dropping an advanced persistent threat into the network, enabling the attacker to stealthily monitor the infected organisation, likely with the aim conducting espionage and stealing data.

There’s also a variant of this attack, which instead of dropping malware to stealthily steal data, uses phishing links to directly take sensitive information from the victim. In these instances, the phishing website is designed to look like an airline website or even the expenses and travel system used by the target’s company.

These phishing links are ultimately designed to trick the victim into supplying sensitive corporate credentials, which the attackers will then use to infiltrate the company network, databases and emails in order to steal information.

Cybersecurity researchers warn that the combined use of impersonation, malware and phishing is particularly dangerous because these methods compliment one another, enabling the attacker to essentially gain control of the network. At this stage, the attackers can stealthily conduct espionage or even drop additional malware and ransomware.

Sometimes it can be very difficult to identify a phishing email, but the likes of sandboxing and advanced persistent threat prevention combined with employee training and awareness can increase the chances of preventing attacks from compromising the network.

READ MORE ON CYBERCRIME

(via PCMag)

ADVERTISEMENT

ADVERTISEMENT
Just in:
UAE President, Spanish Prime Minister Hold Phone Talks // Andertoons by Mark Anderson for Thu, 25 Apr 2024 // PolyU forms global partnership with ZEISS Vision Care to expand impact and accelerate market penetration of patented myopia control technology // UAE Scrutinizes Report on Racial Discrimination Treaty // Etihad Airways Announces Paris Service with A380 // Leading with Compliance, ZUHYX Earns the Canadian MSB License // Lai & Turner Law Firm PLLC Welcomes Eric Strocen as Director of Family Law Division // AVPN Charts Path Forward at 2024 Global Conference // Why Lok Sabha Election For 20 Seats In Kerala Is Crucial For Future Of Left In Indian Politics? // DIFC Courts Cement Role as Top English Dispute Resolution Choice // Telecom Giant Du Eyes Crypto Integration for FinTech Platform // GE Jun, Chairman and CEO of TOJOY, Delivers an Inspiring Speech: “Leaping Ahead Again” // ZUHYX Exchange: Embracing Social Responsibility for a Sustainable Future // Cairo Recognizes Arab World’s Creative Luminaries at Award Ceremony // Prince Holding Group’s Chen Zhi Scholarship Clinches Silver Stevie for CSR Excellence at Asia-Pacific Stevie Awards // Sharjah Census Gears Up for Final Enumeration Phase // New Dynamics in Cryptocurrency Security: ZUHYX Builds the Strongest Fund Protection System // Lee Chong Wei Shows Up On Chinese Hot cultural Talk Show “SHEDE Wisdom Talents”, Talking About “Crossing The Hill” // Hong Kong Unveils April 30 Launch for Landmark Crypto ETFs // Cobb’s Game-Changer: Introducing One-Stop Event Transport Management Solution //