Page 9 - Threat Intelligence 10-10-2019
P. 9

Social Engineering













        Beware of Fake Amazon AWS Suspension Emails for Unpaid Bills. In this article we take a look at a phishing
        campaign that pretends to be an Amazon AWS suspension notice for unpaid bills that looks good enough to
        trick many users. A billing notice from a vendor, especially one like Amazon, that states that your account has
        been suspended for unpaid bills, may confuse a user enough to click on the email link. Attackers are
        capitalizing on this confusion by sending emails that pretend to be from Amazon AWS Support at
        postmaster@amazon.com and that use a subject of "Your service has now been suspended".

                Source: https://www.bleepingcomputer.com/news/security/beware-of-fake-amazon-aws-suspension-
                emails-for-unpaid-bills/




        Hook, line and sinker: How I fell victim to phishing attacks - again and again. I was a hair's breadth away from
        arriving -- unannounced and unexpected -- in the middle of a motorcycle rally, brandishing my camera for a
        fake photography job, and all because I believed the content of an email that I thought was sent by a friend.
        When Cofense, a phishing simulation provider that works with enterprise companies to help train their staff to
        spot fraudulent emails, approached me to see whether or not I would fall for such schemes, I doubted it --
        secure in the knowledge that as a frequent recipient of these types of messages I should be able to spot them
        without a problem.

                Source:   https://www.zdnet.com/article/reel-her-in-what-happens-when-tech-journalists-fall-prey-to-
                spear-phishing-campaigns/



        Scam Alert: Digi Phishing Campaign Detected, Asking Credentials for a Prize. We discovered a Digi phishing
        campaign targeted at Romanian internet users. However, the campaign is displaying tailored content for each
        country, so its actual target pool is much larger. The malicious domains could be accessed from organic Google
        search results and led the user to a page with Digi branding elements. Once there, the users were invited to go
        through some steps, ‘win’ a prize consisting of a new smartphone and then claim the ‘prize’ by submitting
        their personal details, including credit card information.
                Source:         https://heimdalsecurity.com/blog/scam-alert-digi-phishing-campaign-detected-asking-
                credentials-for-a-prize/























                                                    www.accumepartners.com
                                                                                                                     9
   4   5   6   7   8   9   10   11   12   13   14