HomeCyber BalkansHackers pretend to be company HR to deceive employees

Hackers pretend to be company HR to deceive employees

Published on

spot_img

Hackers have found a new way to deceive employees by impersonating company Human Resources departments. This phishing tactic has become increasingly sophisticated, taking advantage of trust and urgency to exploit corporate environments. Understanding the mechanics of these phishing attempts is crucial for employees to recognize and avoid falling victim to such scams.

The phishing email in question has been identified in protected environments such as Google, Outlook 365, and Proofpoint. It is carefully crafted to mimic an official communication from a company’s HR department, with a subject line that demands immediate attention: “Important: Revised Employee Handbook.” This subject line is strategically designed to create a sense of urgency, prompting recipients to open the email without hesitation.

Inside the email, formal language and a structured format typical of corporate communications are used. It begins with a polite greeting and quickly transitions into a directive to review a revised employee handbook. The email emphasizes compliance by a specific deadline, typically by the end of the day, to amplify the urgency and importance of the message. The main goal of this phishing email is to entice recipients into clicking on an embedded hyperlink and trick them into entering their credentials on a fake login page.

By appearing to come from a trusted source like the Handbook, the email leverages authority and urgency to persuade recipients to take immediate action without questioning its authenticity. This tactic is aimed at manipulating employees into divulging sensitive information unwittingly.

According to a report by Cofense, the threat actors behind this phishing campaign employ psychological tactics to manipulate recipients. They exploit fears of non-compliance with company policies and promise significant changes outlined in the handbook. This manipulation is meant to bypass natural skepticism and caution when dealing with unsolicited emails.

The email contains a hyperlink disguised as the “HR COMPLIANCE SECTION FOR REVISED EMPLOYEE HANDBOOK.” Clicking on this link redirects recipients to a page that mimics a legitimate document hosting site. Here, they are presented with a “PROCEED” button, which leads them further into the trap. Upon clicking “PROCEED,” users are redirected to a page branded by Microsoft, where they are prompted to enter their Microsoft credentials, making the phishing attack more convincing.

Once users enter their company email address and potential password, they receive an error message stating, “There was an unexpected internal error. Please try again.” This message is part of the ruse. Users are then redirected to the actual company Single Sign-On (SSO) or Okta login page, giving the impression of a minor issue. Meanwhile, the threat actor has captured their username and possibly their password.

This phishing campaign exemplifies the growing sophistication of cyber threats that exploit trust and urgency within corporate environments. To mitigate such risks, organizations need to implement robust cybersecurity measures, including user awareness training and advanced email security solutions. A multi-layered approach that combines technological defenses with vigilant employees as the first line of defense is essential in protecting against these evolving threats.

In conclusion, educating employees about the risks of phishing attacks and providing them with the necessary tools to recognize and report suspicious emails are crucial steps in safeguarding corporate environments from cyber threats. Organizations must prioritize cybersecurity measures to ensure the protection of sensitive information and uphold the integrity of their operations.

Source link

Latest articles

Strengthening Cyber Resilience Through Supplier Management

 Recent data shows third-party and supply chain breaches — including software supply chain attacks...

A New Wave of Finance-Themed Scams

 The hyperconnected world has made it easier than ever for businesses and consumers...

New DroidLock malware locks Android devices and demands a ransom

 A newly discovered Android malware dubbed DroidLock can lock victims’ screens for ransom...

Hamas-Linked Hackers Probe Middle Eastern Diplomats

 A cyber threat group affiliated with Hamas has been conducting espionage across the...

More like this

Strengthening Cyber Resilience Through Supplier Management

 Recent data shows third-party and supply chain breaches — including software supply chain attacks...

A New Wave of Finance-Themed Scams

 The hyperconnected world has made it easier than ever for businesses and consumers...

New DroidLock malware locks Android devices and demands a ransom

 A newly discovered Android malware dubbed DroidLock can lock victims’ screens for ransom...