Accessibility links
  • Skip to main content
News Icon NEWS FILTER
All News Security Education Videos Scams & Phishing Your Security Mobile Security Identity Theft Corporate Security
Search Icon SEARCH
 

Email Icon SUBSCRIBE TO WEEKLY NEWSLETTER
A Whale of a Hack-Targeting High-Level Execs Through Azure
Facebook   X   LinkedIn   Email

A Whale of a Hack-Targeting High-Level Execs Through Azure

May 21, 2024

In the world of business, cyberattacks against organizations can end in disaster. It's no secret that employees are constantly targeted by phishing and other attacks. In fact, it's expected. But when high-ranking execs are the target, it's something not-so-expected. These are specially designed hacks known as "whaling," and there's an ongoing malicious campaign targeting them by Russian and Nigerian hackers.

According to Proofpoint, this phishing campaign exploits Microsoft Azure, a cloud computing platform specializing in the business community. Data privacy, collaboration, and disaster recovery are just a few benefits of using this cloud. As such, hackers are using Azure to phish a range of high-ranking employees and whales, from CEO's and Vice Presidents to Finance and Account Managers. These types of targets provide a rich pool of those closely connected to a hacker's goals.

This particular phishing attack uses a malicious domain with a Microsoft lookalike subdomain, office360outlooksupport, to fool victims into clicking the link.

Clicking the link brings the victim to the phishing site that looks very much like the Microsoft login portal. It automatically pre-fills the recipient's email address, making the site look that much more believable.

Whale Phishing Made Easy

With whales being a more fruitful target than lower-level staffers and sometimes, they're also easier to catch. Cyber-educated staffers know they're a phishing target, so they keep a lookout for red flags. However, senior-level execs don't expect to be phished, so red flags often get overlooked. Hackers embed malicious links in emails and documents with a "click here" prompt, and a busy exec is likely to comply — especially when they think it's from a trusted source. From there, hackers are green-lighted for any number of attacks.

After gaining access to a whale account, some successful attack options direct hefty money transfers to the hacker's account, install backdoors, and orchestrate BEC (Business Email Compromise) attacks. All of these can cause lasting damage to an organization's finances and reputation, and all because a busy whale was phished.

Whale Cyber-Safety

Phishing-smarts are something everyone should know, regardless of rank. And employee cyber-education should always include the whale population. Things like not clicking on links and attachments unless they're verified with the sender, urgent and unexpected requests, prompts to click, typos and bad grammar are all blinking red lights. Since hackers are good at impersonating trusted and high-level employees, fake wire transfer requests are a favorite. That's why important transactions, especially having to do with finances, should always have enhanced verification processes such as placing a separate phone call to the requestor or having multiple eyes look at and approve them. Anything slightly suspicious should be deemed just that.

With attackers targeting high-level execs via Microsoft Azure, no matter how busy or how far up the food chain an exec may be, a cyber-smart whale and strong verification steps can stop an attack in its tracks.


Business Email Spoofing On The Rise

Corporate Security

Business Email Spoofing On The Rise

While the headlines are focused on ransomware attacks, spoofed emails are getting sneakier and more successful. Bad actors are always finding new ways to hack their way into businesses, and spoofing email addresses are proven way of doing just that. During the first 100 days of the coronavirus outbreak, spoofing attacks increased by 30%. This type of phishing email can sneak past antivirus security and lead to data theft, fraudulent wire transfers, ransomware, BEC (business email compromise), and more. READ FULL STORY

Executive Impersonations Lead to $2.7 Billion in Costs To Businesses

Corporate Security

Executive Impersonations Lead to $2.7 Billion in Costs To Businesses

Executive impersonation attacks, also known as CEO fraud or whaling attacks, are a type of phishing attack where attackers pose as a high-level executive, such as a CEO, CFO, or other C-Level, in order to trick employees into revealing sensitive information or transferring money. Essentially, these are other ways attackers use Business Email Compromise (BEC) attacks. Executive impersonation attacks can be very costly for businesses. In 2022, the FBI's Internet Crime Report found that these types of attacks cost businesses over $2.7 billion. READ FULL STORY

FBI Ranks “Most Hacked” States In The US. Does Your State Rate?

General News

FBI Ranks “Most Hacked” States In The US. Does Your State Rate?

First of all, no need to panic. No one expects you to pack your bags and move to a state with a lower cybercrime ranking. Every year, the FBI’s Internet Crime Complaint Center (IC3) releases its national cybercrime rankings by state. The data comes from only those cybercrimes reported to the IC3. With their “2022 Internet Crime Report” release, buckle up, read on, and find out if (and where) your state rates. In a contest no one wants to win, there is still a clear leader. READ FULL STORY

Top Phishing Scams Continue To Improve And Grow

Education

Top Phishing Scams Continue To Improve And Grow

Much to our dismay, cybercrooks keep finding ways to better the phishing tools they have and find other ways to include new and sneakier methods of thievery. Organizations and individuals are targets and money, identities, credentials, and more are stolen from both every day. Even cyber-savvy users can get caught in phishing scams if they don’t pay close attention to the signs and signals that something isn’t quite right. Reviewing the most pervasive phishing scams is always recommended. READ FULL STORY

AI Helps BEC Attacks Spread Worldwide Despite Language Barriers

Your Security

AI Helps BEC Attacks Spread Worldwide Despite Language Barriers

While many schools are concerned with students using AI (artificial intelligence) for assignments, the international world of business should be on high alert too. There are a growing crop of business email compromise (BEC) attacks using AI as a translation tool for their own benefit. The previous tell-tale signs of phishing are now fixed with AI, making it more difficult to spot an attack email. Hackers were once limited by their own language skills, but not anymore, thanks to AI. READ FULL STORY








Close
Fraud News & Alerts!

Keep up with the latest cyber security news through our weekly Fraud News & Alerts updates. Each week you will receive an email containing the latest cyber security news, tips and breach notifications.



You're all set!

You will receive your first official security update email within the next week.

A welcome email has also just been sent to you. If you do not receive this email within the next few minutes, please check your Junk box or spam filter to confirm our emails are not being blocked.


 
Help  
Enter any word or words you like.        

The email newsletter will arrive from news@stickleyonsecurity.com


Loading
Please wait...