Security News > 2020 > June > Phishing attack impersonates IT staff to target VPN users
A phishing email claims to send the recipient to a VPN configuration page for home access but instead leads them to a credential-stealing site, said Abnormal Security.
Cybercriminals have been keen to exploit COVID-19 to create coronavirus-related malicious apps, phony websites, and phishing emails.
The body of the email itself is brief with simply a notice and link for new VPN home configuration access.
The attack plays on the need for a VPN while working from home.
In all cases the same payload link was used, a tipoff that a single attacker controls the phishing site.
News URL
Related news
- Windows infected with backdoored Linux VMs in new phishing attacks (source)
- Fortinet VPN design flaw hides successful brute-force attacks (source)
- New NachoVPN attack uses rogue VPN servers to install malicious updates (source)
- VPN vulnerabilities, weak credentials fuel ransomware attacks (source)
- Phishing-as-a-Service "Rockstar 2FA" Targets Microsoft 365 Users with AiTM Attacks (source)
- GenAI makes phishing attacks more believable and cost-effective (source)
- CERT-UA Warns of Phishing Attacks Targeting Ukraine’s Defense and Security Force (source)
- Inside the incident: Uncovering an advanced phishing attack (source)
- Ongoing phishing attack abuses Google Calendar to bypass spam filters (source)