Chủ Nhật, Tháng Hai 5, 2023
  • Home
  • Health
  • News
  • Software
  • Tech
  • Travel
  • Gen Z
NATuts
  • Home
  • Health
  • News
  • Software
  • Tech
  • Travel
  • Gen Z
No Result
View All Result
NATuts
  • Home
  • Health
  • News
  • Software
  • Tech
  • Travel
  • Gen Z
No Result
View All Result
NATuts
No Result
View All Result
Home Tech

Researchers warn of large-scale AiTM attacks targeting corporate users

3 Tháng Tám, 2022
in Tech
0
Researchers warn of large-scale AiTM attacks targeting corporate users
585
SHARES
3.2k
VIEWS
Share on FacebookShare on Twitter

Các bài viết liên quan:

How to get travel insurance

Guide on how to get travel insurance with 4 options

24 Tháng Một, 2023
Software Asset Management for Websites: How to Keep Your Sites Running Smoothly

Software Asset Management for Websites: How to Keep Your Sites Running Smoothly

8 Tháng Một, 2023
5 Best Software to Stream Games

5 Best Software to Stream Games

2 Tháng Một, 2023
IBM Bridge To Cloud For Power

IBM Bridge To Cloud For Power- Everything You Should Know

2 Tháng Một, 2023
Top 10 CRM Software For Construction 

Top 10 CRM Software For Construction Enterprises All The Time

31 Tháng Mười Hai, 2022
What Is IBM Software

What Is IBM Software? 4 Business Segments at IBM You Should Know

26 Tháng Mười Hai, 2022

AiTM . Phishing Attacks

A new, large-scale phishing campaign was observed using adversary-in-the-middle (AitM) techniques to bypass security protections and compromise business email accounts.

“It uses an adversarial attack in the middle (AitM) that is capable of bypassing multi-factor authentication,” said Zscaler researchers Sudeep Singh and Jagadeeswar Ramanukolanu. “The campaign is specifically designed to reach end users in businesses using our email service.” Microsoft.”

Prominent targets include fintech, lending, insurance, energy, manufacturing and federal credit union verticals located in the United States, United Kingdom, New Zealand and Australia.

This is not the first time a phishing attack so come to light. Last month, Microsoft revealed that more than 10,000 organizations had been targeted since September 2021 using AitM techniques to breach accounts secured with multi-factor authentication (MFA).

The ongoing campaign, effective June 2022, begins with an email with the subject of an invoice sent to targets containing an HTML attachment, with a phishing URL embedded in it.

AiTM . Phishing Attacks

Opening the attachment via a web browser will redirect email recipients to a phishing page masquerading as a login page for Microsoft Office, but not before fingerprinting the compromised machine to determine if the victim is real. whether the target is expected or not.

AitM phishing attacks go beyond traditional phishing methods designed to steal credentials from unintentional users, especially in cases where MFA is enabled – a security hedge Security prevents attackers from logging into accounts with only stolen credentials.

AiTM . Phishing Attacks

To avoid this, the fake landing page was developed using the tools phishing acts as a proxy that captures and forwards all communications between the client (i.e. victim) and the email server.

The toolkit intercepts HTML content received from Microsoft’s servers and, before forwarding it back to the victim, manipulates the content in various ways as needed, the researchers said. necessary, to ensure the phishing process works,” the researchers said.

This also entails replacing all links to Microsoft domains with equivalent links to the phishing domain to ensure that back-and-forth remains intact with the phishing site throughout the session.

Zscaler said it observed attackers manually logging into accounts eight minutes after the theft of credentials, following up by reading emails and checking users’ profile information.

Furthermore, in some cases, hacked email inboxes were then used to send more phishing emails as part of the same campaign to carry out business email infiltration scams ( BEC).

While security features like multi-factor authentication (MFA) add an extra layer of security, they should not be considered a silver bullet for protection against attacks, the researchers note. fraud”.

“With the use of advanced phishing toolkits (AiTM) and smart evasion techniques, threat actors are able to bypass both traditional and advanced security solutions.”

.

Previous Post

Download Topaz Gigapixel AI – Increase image size without blur

Next Post

The most beautiful glass wall models in 2022

Megusta

Megusta

Related Posts

5 Best Software to Stream Games

5 Best Software to Stream Games

2 Tháng Một, 2023
Top 10 CRM Software For Construction 

Top 10 CRM Software For Construction Enterprises All The Time

31 Tháng Mười Hai, 2022
Instruction how to use OBS streaming software

Features, settings and how to use OBS streaming software through 9 simple steps

25 Tháng Mười Hai, 2022
What is Trans woman?  What is Transgender Women?

What is Trans woman? What is Transgender Women?

23 Tháng Mười Hai, 2022
Christmas gift: Genuine Windows 10 Pro for only $6.63 and Office 2021 for $14.22

Christmas gift: Genuine Windows 10 Pro for only $6.63 and Office 2021 for $14.22

22 Tháng Mười Hai, 2022
How to get 50 free coins of SkyJoy App to redeem

How to get 50 free coins of SkyJoy App to redeem

21 Tháng Mười Hai, 2022
Load More
Next Post
The most beautiful glass wall models in 2022

The most beautiful glass wall models in 2022

Trả lời Hủy

Email của bạn sẽ không được hiển thị công khai. Các trường bắt buộc được đánh dấu *

Bài viết mới

How to get travel insurance
Đời sống

Guide on how to get travel insurance with 4 options

24 Tháng Một, 2023
Software Asset Management for Websites: How to Keep Your Sites Running Smoothly
Phần mềm

Software Asset Management for Websites: How to Keep Your Sites Running Smoothly

8 Tháng Một, 2023
5 Best Software to Stream Games
Software

5 Best Software to Stream Games

2 Tháng Một, 2023
IBM Bridge To Cloud For Power
Software

IBM Bridge To Cloud For Power- Everything You Should Know

2 Tháng Một, 2023
Top 10 CRM Software For Construction 
Tech

Top 10 CRM Software For Construction Enterprises All The Time

31 Tháng Mười Hai, 2022
What Is IBM Software
Software

What Is IBM Software? 4 Business Segments at IBM You Should Know

26 Tháng Mười Hai, 2022
W3Schools

Ads

Contact: [email protected]

DMCA.com Protection Status

Categories

  • Android
  • Cạm bẫy tâm lí
  • Chưa được phân loại
  • Đồ họa
  • Đời sống
  • Gen Z
  • Health
  • iOS
  • Kĩ năng mềm
  • News
  • Nhà mạng
  • Phần mềm
  • Phần mềm đồ họa
  • Review sách
  • Software
  • Tech
  • Thiết kế ảnh
  • Thiết kế video
  • Thủ thuật
  • Travel
  • Văn hóa Nam Bộ
  • Văn học
  • Window

Browse by Tag

ai là triệu phú android Apple browser Bullet Journal bản thân chai pin Chỉnh ảnh data domain download fshare game game show giả lập màu hosting IKEA ios khuyến mãi kinh doanh kiến thức kiểm tra pin messenger miễn phí mua sắm Máy ảnh mạng network nghệ thuật ngôn ngữ nhà Trần pin laptop quảng cáo tiếng anh trạng thái Trần Thủ Độ tên miền tắt hoạt động từ vựng video viettel window 10 word zalo Đơn giản

Recent News

How to get travel insurance

Guide on how to get travel insurance with 4 options

24 Tháng Một, 2023
Software Asset Management for Websites: How to Keep Your Sites Running Smoothly

Software Asset Management for Websites: How to Keep Your Sites Running Smoothly

8 Tháng Một, 2023

Trang tin nóng hổi - vừa thổi vừa xem

No Result
View All Result
  • Home
  • Health
  • News
  • Software
  • Tech
  • Travel
  • Gen Z

Trang tin nóng hổi - vừa thổi vừa xem