Called to a meeting with the CEO? Don’t be so sure.
A widespread phishing campaign is targeting executives across a number of industries with messages asking to reschedule a board meeting in an effort to steal logins and passwords.
The phishing messages spoof the name and email address of the CEO since users are more likely to fall for attacks they believe to come from their boss.
The contents of the phishing email is simple: it says a board meeting has been rescheduled and asks users to take part in a poll to choose a new date.
If users click the link, they’re taken to a webpage which appears to be a login page for Microsoft Outlook and Office 365, but this is in fact a phishing site — any information entered into it will go directly into the hands of the attackers.
The attack is slightly different if the email is viewed on a mobile device — the display name is changed to ‘Note to Self’ but the contents of the message stays the same.
With the phishing email targeting high-level executives like CFOs, CTOs and SVPs, a successful attack could provide attackers with access to highly sensitive data across the corporate network — and the compromised accounts could also be used to help conduct further malicious campaigns.
The fake meeting phishing attack appears to be prolific — GH Security firm researchers say it was found targeting one in seven of the firm’s customers. In each case, the attackers were eliminated before damage could be done.
It’s believed that the campaign is still active and that the phishing URL claiming to be windows related — is still up.
Users are therefore warned to be aware of the campaign and to be suspicious of any emails containing a subject line following a pattern of: New message: [Company Name] February in-person Board Mtg scheduling (2/24/19 update)
Palmer, Danny. “This password-stealing phishing attack comes disguised as a fake meting request from the boss” ZDNet February 4, 2019
Phishing attacks are NOT to be taken lightly. For a limited time we are offering a complementary Dark Web Scan for your business’s email domain. This report will immediately reveal if you or any of your employees credentials have been compromised within the last 36 months.
If nothing turns up, you’ll have peace of mind and you can take preventative actions to make sure it stays that way. On the other hand, if the report reveals a compromise, you are in the best position to take the next logical step towards protecting your business!
You can always contact us at CyberSecurity@Trinityww.com or by calling (732) 780-8615 if you have any questions about what you can be doing to put your business in the best position to avoid a cyber security breach