Security News > 2020 > September > Phishing attack baits victims by promising access to quarantined emails

The goal is to concoct phishing emails and landing pages so convincing that they can fool even the most sharp-eyed user.
A new phishing campaign described by phishing awareness provider Cofense in a Friday blog post uses several tactics to appear legitimate.
As analyzed by the Cofense Phishing Defense Center, this phishing attack is directed toward employees within an organization.
The phishing emails have already gotten through different security email gateways and have targeted a variety of industries.
"With the advancement of phishing techniques, it's becoming more difficult to quickly detect. Obviously, if an email is promising you riches, a new car or worldwide fame, it's probably not legitimate. But, that same sense you get from something obvious will be piqued with advanced techniques as well. Anything that asks for credentials or tries to create urgency or, based on your experience with phishing simulations doesn't feel right, probably isn't. That extra few minutes is worth saving your organization from potential breach, ransomware attack, or other theft."
News URL
Related news
- Microsoft: Hackers steal emails in device code phishing attacks (source)
- Ransomware gangs pose as IT support in Microsoft Teams phishing attacks (source)
- Phishing Emails Targeting Australian Firms Rise by 30% in 2024 (source)
- Microsoft Teams phishing attack alerts coming to everyone next month (source)
- How to Prevent Phishing Attacks with Multi-Factor Authentication (source)
- Darktrace: 96% of Phishing Attacks in 2024 Exploited Trusted Domains Including SharePoint & Zoom Docs (source)
- Phishing attack hides JavaScript using invisible Unicode trick (source)
- Beware: PayPal "New Address" feature abused to send phishing emails (source)
- FatalRAT Phishing Attacks Target APAC Industries Using Chinese Cloud Services (source)
- Hackers Exploit AWS Misconfigurations to Launch Phishing Attacks via SES and WorkMail (source)