Free Guide
16 Questions You MUST Ask Before Hiring Any IT Company
Phishing campaigns get more effective the more closely they can imitate a trusted source. Recently, security researchers at Fortinet discovered evidence of a phishing campaign that specifically targets Microsoft Windows users and installs three different types of malware on the systems it manages to infect.
Among other things, this campaign gives the hackers behind it the ability to steal usernames, passwords, banking details, and more. That is in addition to leveraging the infected system to secretly mine for cryptocurrency, which finds its way into a wallet controlled by hackers.
To lure victims into infecting themselves, the Phishing campaign’s contact emails are all designed to appear as a payment report from a legitimate trusted source, which contains an attached Microsoft Excel document. It is conveniently included for the recipient’s review. Naturally, anyone opening the attached document dooms themselves, as it is poisoned and contains scripts designed to install malicious payloads in the background.
Phishing campaigns remain one of the most popular infection methods in the hacking world. They tend to gravitate to those techniques that work and require relatively little in the way of effort.
Phishing fits that bill perfectly. It’s usually a trivial matter to create an email that’s virtually identical to the one you might get from a trusted source, and hackers have been poisoning Microsoft Excel files since the earliest days of the internet.
As ever, the best defense against these types of attacks is vigilance and mindfulness. A quick phone call to the trusted source that supposedly sent you the email communication is almost always enough to verify whether it is real. Shockingly, few users take this step.
In a similar vein, clicking on embedded links in an email or downloading files should be done with a healthy dose of caution. That includes another phone call to the trusted source to be sure they did in fact send you something.
Unfortunately, that’s a lot easier to teach than it is to implement, as employees don’t have a good track record with either of those things.