Eblogtip.com
  • Categories
    • News
    • Technology
    • Domains
    • Hosting
    • Promotions

Archives

  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • May 2023
  • December 2022

Categories

  • News
  • Technology
  • Uncategorized
eBlogTip
  • Categories
    • News
    • Technology
    • Domains
    • Hosting
    • Promotions
  • News

QR codes are being used in phishing attacks against US institutions

  • August 17, 2023
Total
0
Shares
0
0
0


Cybersecurity researchers from Cofense recently observed a large-scale phishing campaign that targeted, among others, a “major” U.S. energy company. 

What makes this campaign unique is the fact that the attackers used QR codes to bypass email security solutions at scale, which is not something we see very often.

Phishing is a key attack vector, with nine in ten cyberattacks starting through this communications channel. However, email security solutions have become quite good at filtering abusive content over the years, which is why the majority of phishing emails that carry either malicious links, or attachments, never usually make it to victims’ inboxes.

Creative solutions

This has prompted some threat actors to get creative, and use innovative methods to sneak past security gateways. One such method is the deployment of QR codes, which redirect the victim to a phishing site. 

As the QR codes come in the form of a .PNG or .JPG, they’re able to evade detections. Another unique aspect of this particular campaign is its scale, with thousands of emails being sent out – again a rare sight. 

Cofense says that the attackers distributed roughly 1,000 emails, with almost a third (29%) targeting a single, unnamed but prominent U.S. energy company. Other emails were sent to companies operating in the manufacturing (15%), insurance (9%), technology (7%), and financial services (6%) sectors. 

The QR codes redirected the victims to a malicious landing page resembling a Microsoft 365 login page, with the obvious goal of stealing the login credentials for the service. In the email, the victims were told they needed to update their account settings within three days, adding a false sense of urgency. 

The good news is that victims still need to take action to get compromised, which shouldn’t be easy for well-trained employees. However, recent reports have shown that many workers are still falling for fake and dangerous emails. 

Via: BleepingComputer


Source link

Total
0
Shares
Share 0
Tweet 0
Pin it 0
Previous Article
  • News

Diablo 4 player spends 30 billion gold on a crossbow, in-game economy in shambles

  • August 17, 2023
View Post
Next Article
  • News

This Samsung Galaxy S24 Ultra leak points to a good camera and a bad chipset

  • August 17, 2023
View Post
You May Also Like
View Post
  • News

Scientists want to add broadband technology to your brain — but it’s not what you think

  • September 28, 2023
View Post
  • News

UltraRAM go! Here’s a glimpse at what the future of memory and storage could look like if this UK startup succeeds

  • September 28, 2023
View Post
  • News

Eufy’s all-seeing smart home cams can shoot your videos from multiple angles

  • September 28, 2023
View Post
  • News

To Bring Socializing Back to Social Networks, Apps Try A.I. Imagery

  • September 28, 2023
View Post
  • News

A Silicon Valley Supergroup Is Coming Together to Create an A.I. Device

  • September 28, 2023
View Post
  • News

China’s Uses ‘Deceptive’ Methods to Sow Disinformation, U.S. Says

  • September 28, 2023
View Post
  • News

This devious phishing scam makes it look like dodgy emails are actually safe

  • September 28, 2023
View Post
  • News

Counter-Strike 2 bug prevents you from seeing smoke grenades at a distance on Steam Deck

  • September 28, 2023

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

eBlogTip.com
  • Categories

Input your search keywords and press Enter.