Experts have found a phishing campaign impersonating security company Proofpoint.

0 23
Recently, experts have discovered a phishing campaign impersonating security com...

Recently, experts have discovered a phishing campaign impersonating security company Proofpoint. The phishers are sending emails in the name of the cybersecurity company Proofpoint to potential victims. These phishing emails use mortgages as bait to lure victims into providing their Microsoft Office 365 and Gmail account passwords.

An article posted by Armorblox reads: "The email contains a security file link sent by Proofpoint." When users actually click on the link, the page will automatically jump to the Proofpoint brand launch page, along with multiple login links from various email providers.

Experts have found a phishing campaign impersonating security company Proofpoint.

The phishing attack also includes dedicated login pages for Microsoft and Google. Clicking on the link with Google and Office 365 logos will take potential victims to carefully designed Google and Microsoft phishing pages, requiring users to provide their login account and password.

The investigation found that the phishing emails were sent from a stolen private account, the sender's domain (sdis34[.]fr) is the French Southern Fire and Rescue Department. These phishing web pages are hosted on the "greenleafproperties[.]co[.]uk" domain, which was updated in April 2021. Currently, the website has been redirected to "cvgproperties[.]co[.]uk".

The following are the main findings of this phishing campaign:

Social engineering techniques: The email title and content are designed to create a sense of trust and urgency in the victims. The sense of trust comes from the fact that the email contains a file sent by Proofpoint; urgency comes from the information it contains about mortgages and other family-related activities.

Impersonating well-known brands: Both the email and the login page are imitating Proofpoint, Google Workspace, and Office 365 login pages, which are filled with their respective email provider brand logos.

Copying existing workflows: The email attack steps are also simulating existing workflows in daily life, such as email notifications received when sharing files online. When people see emails they have seen before, they tend to quickly click to view them.

Using a stolen email address: The email sending address comes from a stolen personal account of the French Fire and Rescue Department.


Reference source: https://securityaffairs.co/wordpress/124298/cyber-crime/phishing-campaign-proofpoint.html

你可能想看:

It is possible to perform credible verification on the system boot program, system program, important configuration parameters, and application programs of computing devices based on a credible root,

5. Collect exercise results The main person in charge reviews the exercise results, sorts out the separated exercise issues, and allows the red and blue sides to improve as soon as possible. The main

Ensure that the ID can be accessed even if it is guessed or cannot be tampered with; the scenario is common in resource convenience and unauthorized vulnerability scenarios. I have found many vulnerab

4.5 Main person in charge reviews the simulation results, sorts out the separated simulation issues, and allows the red and blue teams to improve as soon as possible. The main issues are as follows

b) It should have a login failure handling function, and should configure and enable measures such as ending the session, limiting the number of illegal login attempts, and automatically logging out w

b) It should have the login failure handling function, and should configure and enable measures such as ending the session, limiting the number of illegal logins, and automatically exiting when the lo

In today's rapidly developing digital economy, data has become an important engine driving social progress and enterprise development. From being initially regarded as part of intangible assets to now

Announcement regarding the addition of 7 units as technical support units for the Ministry of Industry and Information Technology's mobile Internet APP product security vulnerability database

As announced today, Glupteba is a multi-component botnet targeting Windows computers. Google has taken action to disrupt the operation of Glupteba, and we believe this action will have a significant i

Internal and external cultivation | Under the high-confrontation offensive and defensive, internal network security cannot be ignored

最后修改时间:
admin
上一篇 2025年03月28日 20:51
下一篇 2025年03月28日 21:14

评论已关闭