'Return to Office' Phishing Emails Aim to Steal Credentials

'Return to Office' Phishing Emails Aim to Steal Credentials

Fraud Management & Cybercrime , Fraud Risk Management , Social Engineering

Researchers: Employees Lured With Messages About Shift to Workplace Prajeet Nair (@prajeetspeaks) • November 30, 2020     Sample of email disguised as an automated internal notification from the company (Source: Abnormal Security)

Researchers at Abnormal Security have uncovered a credential-stealing phishing campaign that spoofs internal company memos concerning returning to the office.


See Also: Live Webinar | Securing Mobile Endpoints to Protect IP in the Pharma Industry


The ongoing campaign is believed to have targeted about 100,000 inboxes, bypassing Google G Suite email security, the researchers say.


The fraudsters are using email messages and landing pages that attempt to impersonate the company's internal messaging system and HR department. The emails focus on status updates regarding whether employees can plan to return to working in their employer's offices, reflecting the updates companies have been sending out following the outbreak of COVID-19, according to the Abnormal Security report.


"Despite the rise in COVID-19 cases, companies are providing status updates to their employees on the dates office are expected to reopen and employees can return to working there," the report states.


The fraudsters also are trying to create a sense of urgency by using growing concerns regarding company safety protocols during the COVID-19 pandemic. "This email sets a short deadline for when employees must acknowledge that ..

Support the originator by clicking the read the rest link below.