Attackers are looking to steal the credentials of Instagram, Facebook, and Twitter users with elaborate phishing campaigns. The target of these campaign are employees of major enterprise organisations.
It might seem odd that attackers would go after social media accounts, but they have good reasons for this strategy. One of the reasons is that many people tend to use the same passwords for their personal and work accounts, which means that bad actors will often get a password that works on multiple domains.
These campaigns look just like any other phishing attempt. The goal is to trick people into entering their credentials into websites that look very much like the original they’re impersonating. It’s a well-known method that relies on the employees’ lack of training to recognise phishing campaigns.
“These attacks impersonate popular social media platforms to deliver phishing emails to influential users of each platform by impersonating Instagram, Facebook, and Twitter, in an attempt to extract login credentials,” say the researchers from Abnormal Security.
“In each case, these social media platforms are impersonated and contain urgent language, pressing the user to take action or their accounts will be deleted. The action to be taken is embedded in a link provided to appeal the decision to delete the account by the platform.”
The landing websites look very much like their real counterparts, and the Twitter domain imitates the actual one by replacing the “i” with a lower case “l”.
With so many people working from home, the activity on social media increased accordingly. If the employees lack the proper security awareness training to recognise a phishing campaign, they might be tempted to go through the steps and give their credentials to a third-party. It’s important to know that social media websites or any other services will not issue such emails, threatening suspension or termination of services. Ensure your users are always careful when receiving emails seemingly coming from official sources, and they never open attachments coming from unknown sources.
With thanks to the Cyber Defence Alliance and Hotforsecurity. The full story is here: https://hotforsecurity.bitdefender.com/blog/phishing-attacks-use-social-media-notifications-to-steal-credentials-23597.html
Free Phishing Security Test
Would your users fall for convincing phishing attacks? Take the first step now and find out before the bad guys do. Plus, see how you stack up against your peers with phishing Industry Benchmarks. The Phish-prone percentage is usually higher than you expect and is great ammo to get budget.
Here’s how it works:
- Immediately start your test for up to 100 users (no need to talk to anyone)
- Select from 20+ languages and customize the phishing test template based on your environment
- Choose the landing page your users see after they click
- Show users which red flags they missed, or a 404 page
- Get a PDF emailed to you in 24 hours with your Phish-prone % and charts to share with management
- See how your organisation compares to others in your industry
PS: Don’t like to click on redirected buttons? Cut & Paste this link in your browser: https://info.knowbe4.com/phishing-security-test-partner?partnerid=001a000001lWEoJAAW