Europe Announces Launch of Formal Probe Into TikTok Under Digital Rights Law

The European Commission is investigating TikTok for potential violations of the Digital Services Act related to child protection, advertising transparency, and harmful content.

Cyware News – Latest Cyber News – ​Read More

Credential phishing targets ESPs through ESPs

Mailing lists that companies use to contact customers have always been an interesting target for cyberattacks. They can be used for spamming, phishing, and even more sophisticated scams. If, besides the databases, the attackers can gain access to a legitimate tool for sending bulk emails, this significantly increases the chances of success of any attack. After all, users who have agreed to receive emails and are accustomed to consuming information in this way are more likely to open a familiar newsletter than some unexpected missive. That’s why attackers regularly attempt to seize access to companies’ accounts held with email service providers (ESPs). In the latest phishing campaign we’ve uncovered, the attack method has been refined to target credentials on the website of the ESP SendGrid by sending phishing emails directly through the ESP itself.

Why is phishing through SendGrid more dangerous in this case?

Among the tips we usually give in phishing-related posts, we most often recommend taking a close look at the domain of the site in the button or text hyperlink that you’re invited to click or tap. ESPs, as a rule, don’t allow direct links to client websites to be inserted in an email, but rather serve as a kind of redirect — inside the link the email recipient sees the domain of the ESP, which then redirects them to the site specified by the mail authors when setting up the mailing campaign. Among other things, this is done to collect accurate analytics.

In this case, the phishing email appears to come from the ESP SendGrid, expressing concern about the customer’s security and highlighting the need to enable two-factor authentication (2FA) to prevent outsiders from taking control of their account. The email explains the benefits of 2FA and provides a link to update the security settings. This leads, as you’ve probably already guessed, to some address in the SendGrid domain (where the settings page would likely be located if the email really was from SendGrid).

To all email scanners, the phishing looks like a perfectly legitimate email sent from SendGrid’s servers with valid links pointing to the SendGrid domain. The only thing that might alert the recipient is the sender’s address. That’s because ESPs put the real customer’s domain and mailing ID there. Most often, phishers make use of hijacked accounts (ESPs subject new customers to rigorous checks, while old ones who’ve already fired off some bulk emails are considered reliable).

An email seemingly from SendGrid sent through SendGrid to phish a SendGrid account.

Phishing site

This is where the attackers’ originality comes to an end. SendGrid redirects the link-clicking victim to a regular phishing site mimicking an account login page. The site domain is “sendgreds”, which at first glance looks very similar to “sendgrid”.

A site mimicking the SendGrid login page. Note the domain in the address bar

How to stay safe

Since the email is sent through a legitimate service and shows no typical phishing signs, it may slip through the net of automatic filters. Therefore, to protect company users, we always recommend deploying solutions with advanced anti-phishing technology not only at the mail gateway level but on all devices that have access to the internet. This will block any attempted redirects to phishing sites.

And yes, for once it’s worth heeding the attackers’ advice and enabling 2FA. But not through a link in a suspicious email, but in the settings in your account on ESP’s website.

Kaspersky official blog – ​Read More

Singapore Struggles With Scams as Cybercrime Cases Keep Climbing

Scams and cybercrime cases in Singapore increased by 49.6% in 2023, with victims losing a total of SG$651.8 million (~US$483.62 million), despite industry-wide measures being implemented to combat such incidents.

Cyware News – Latest Cyber News – ​Read More

New Wi-Fi Vulnerabilities Expose Android and Linux Devices to Hackers

These vulnerabilities could lead users to join a malicious network or allow attackers to access trusted networks without a password. The vulnerabilities could result in potential attacks such as malware infections and data theft.

Cyware News – Latest Cyber News – ​Read More

‘Lucifer’ Botnet Turns Up the Heat on Apache Hadoop Servers

More than 3,000 unique attacks hitting Hadoop and Druid honeypots in just the past month indicate an attacker testing phase, portending fire and brimstone to come.

darkreading – ​Read More

Face off: Attackers are stealing biometrics to access victims’ bank accounts

Researchers found the first banking trojan that steals people’s faces, replaces them with deepfakes, then bypasses biometric tools.Read More

Security News | VentureBeat – ​Read More

U.S. Offers $15 Million Bounty to Hunt Down LockBit Ransomware Leaders

The U.S. State Department has announced monetary rewards of up to $15 million for information that could lead to the identification of key leaders within the LockBit ransomware group and the arrest of any individual participating in the operation.
“Since January 2020, LockBit actors have executed over 2,000 attacks against victims in the United States, and around the world, causing costly

The Hacker News – ​Read More

Cybercriminals are using Meta’s Llama 2 AI, according to CrowdStrike

Parts of code exploiting Microsoft’s PowerShell tool matches the style of output of large language models.

Latest stories for ZDNET in Security – ​Read More

Artificial Intelligence set to drive major tech advancements in 2024, IEEE study finds

A new global survey by the Institute of Electrical and Electronics Engineers (IEEE) finds artificial intelligence will be the top technology in 2024.Read More

Security News | VentureBeat – ​Read More

El Al Flight Crew Suffers Midflight Communication Disruption

Though the incident took place over a known Houthi area, some say this incident was at the hands of a Somali group, based on frequent communication disruptions in the country.

darkreading – ​Read More