skip to Main Content
+44 (0) 1628 308038 info@tidorg.com

Amazon, Paypal, and Gmail Users are the Latest Target in a Sophisticated Multistage Phishing Attack

Phishing Reply Test

The latest attack, dubbed “Heatstroke” uses new target-specific phishing kits that may be sold as a “phishing-as-a-service” using new techniques to avoid leaving a trail.

The goal is the same: to steal Paypal and credit card information, but according to researchers at TrendMicro, this latest attack uses anything but classic techniques:

The developers of these phishing kits have built out a multi-stage websites that mimic their legitimate counterpart to create a duplicate experience to keep from raising suspicions.

Landing pages constantly change to bypass any webpage filtering

It works against security vendors by blocking crawling services and vulnerability scanners

The initial landing page is encoded in base64 to bypass firewalls and web scanning solutions

Any stolen credentials are transmitted using steganography (where data is embedded within an image)

This impressive list only scratches the surface of what these phishing kits do to ensure a successful attack.

The landing pages are made to look as legitimate as possible, putting users and organisations at risk. Users must be taught via Security Awareness Training to be constantly alert, cautious when interacting with email and the web. Even the most benign and harmless request that would normally require logging on should be scrutinized.

Bad guys need credentials to gain access to corporate networks and resources. Users that are on edge anytime a credential is required are ones that won’t fall victim to these scams – no matter how sophisticated they are.


Will your users respond to phishing emails?

KnowBe4’s new Phishing Reply Test (PRT) is a complimentary IT security tool that makes it easy for you to check to see if key users in your organization will reply to a highly targeted phishing attack without clicking on a link. PRT will give you quick insights into how many users will take the bait so you can take action to train your users and better protect your organisation from these fraudulent attacks!

PRT-image

Here’s how it works:

Immediately start your test with your choice of three phishing email reply scenarios 

Spoof a Sender’s name and email address your users know and trust

Phishes for user replies and returns the results to you within minutes

Get a PDF emailed to you within 24 hours with the percentage of users that replied

PS: Don’t like to click on redirected buttons? Cut & Paste this link in your browser: https://info.knowbe4.com/phishing-reply-test-partner?partnerid=001a000001lWEoJAAW

Close search

Basket

Back To Top