Accessibility links
  • Skip to main content
News Icon NEWS FILTER
All News Security Education Videos Scams & Phishing Your Security Mobile Security Identity Theft Corporate Security
Search Icon SEARCH
 

Email Icon SUBSCRIBE TO WEEKLY NEWSLETTER
Microsoft Uncovers Multi-Stage AiTM Phishing and BEC Attacks Targeting Financial Organizations
Facebook   X   LinkedIn   Email

Microsoft Uncovers Multi-Stage AiTM Phishing and BEC Attacks Targeting Financial Organizations

July 7, 2023

Microsoft has recently identified a series of sophisticated adversary-in-the-middle (AiTM) phishing and business email compromise (BEC) attacks aimed at banking and financial services institutions. It found that the attackers initially compromised a trusted vendor, subsequently launching AiTM attacks and follow-on BEC activities against multiple organizations.

Do you need to know the technical details? Not particularly, but you do need to know that it happens and what to do about it. Let's start with that part. 

To mitigate the impact of these attacks, Microsoft recommends that affected organizations revoke session cookies and revert any modifications made by the threat actors within the MFA process.

For users, always be aware of attempts to steal personal and confidential information when visiting websites. If you have any inkling something is amiss, immediately close the webpage and delete the cookies from your browser.

But what are these terms?

We’ve heard of Man-the-Middle (MiTM) attacks before. While the two terms, AiTM and MiTM may be used interchangeably, they are ever-so-slightly different. In MiTM situations, the attacker inserts him or herself into the connection between two parties making them believe they are communicating with each other directly, all the while stealing information that passes through.

In AiTM, there is still the person in the middle, but the attacker is mirroring the behavior of the end-user and steals credentials and session cookies so they can get into the account without full authentication, such as needing the MFA code. The threat actors set up a proxy server between the targeted user and the intended website, which in this case, is a phishing site under the control of the attackers. Through this proxy server, the attackers gain access to the user's traffic.

Cookies, in this context, refer to files containing identifiers sent by website servers to browsers for temporary storage. These cookies facilitate faster website loading and improved navigation. A common example is the shopping cart feature on e-commerce sites, which retains selected items during browsing. Without cookies, the cart would reset every time the user navigates away. They also allow you to go to a website multiple times without putting in your username each time.

In the subsequent phase of this attack, the attackers proceeded to send over 16,000 emails to the targets' contacts as part of a second-stage phishing campaign.

Phishing is often used for BEC attacks too. These involve exploiting email communication to deceive individuals in an organization, often finance or HR personnel, into transferring funds or sharing sensitive information. Attackers use targeted phishing techniques, leveraging known information to build trust and increase the likelihood of success.

According to the FBI's Internet Crime Complaint Center (IC3), BEC attacks result in financial losses for businesses worldwide, amounting to billions of dollars annually.


Business Email Spoofing On The Rise

Corporate Security

Business Email Spoofing On The Rise

While the headlines are focused on ransomware attacks, spoofed emails are getting sneakier and more successful. Bad actors are always finding new ways to hack their way into businesses, and spoofing email addresses are proven way of doing just that. During the first 100 days of the coronavirus outbreak, spoofing attacks increased by 30%. This type of phishing email can sneak past antivirus security and lead to data theft, fraudulent wire transfers, ransomware, BEC (business email compromise), and more. READ FULL STORY

FBI Ranks “Most Hacked” States In The US. Does Your State Rate?

General News

FBI Ranks “Most Hacked” States In The US. Does Your State Rate?

First of all, no need to panic. No one expects you to pack your bags and move to a state with a lower cybercrime ranking. Every year, the FBI’s Internet Crime Complaint Center (IC3) releases its national cybercrime rankings by state. The data comes from only those cybercrimes reported to the IC3. With their “2022 Internet Crime Report” release, buckle up, read on, and find out if (and where) your state rates. In a contest no one wants to win, there is still a clear leader. READ FULL STORY

Online Scams The New Top Cybercrime With 73% Of All Attacks

Scams & Phishing

Online Scams The New Top Cybercrime With 73% Of All Attacks

Move over former top cybercrimes, there’s a new winner according to Group-IB experts who specialize in high-tech cybercrimes. Group-IB recently announced that online scams are now the number one type of cybercrime in the world today, with some referring to this as a “scamdemic.” Researchers found that in total, fraud now makes up 73% of all online attacks. There’s a definite need for users to be aware of these scams, how they can work and how prevalent they are. READ FULL STORY

Email Phishing Spikes 569% in 2022 – What You Need To Know Now

Your Security

Email Phishing Spikes 569% in 2022 – What You Need To Know Now

According to our government’s CISA (Cybersecurity and Infrastructure Security Agency), email phishing is by far the chosen delivery method for more than 90% of cyberattacks that often bypass basic email security protections. And if it looks like your inbox has more email phishing than ever, there’s a good reason for that. A Cofense report found a walloping 569% spike in these phishing threats to organizations globally, along with other eye-opening results. READ FULL STORY








Close
Fraud News & Alerts!

Keep up with the latest cyber security news through our weekly Fraud News & Alerts updates. Each week you will receive an email containing the latest cyber security news, tips and breach notifications.



You're all set!

You will receive your first official security update email within the next week.

A welcome email has also just been sent to you. If you do not receive this email within the next few minutes, please check your Junk box or spam filter to confirm our emails are not being blocked.


 
Help  
Enter any word or words you like.        

The email newsletter will arrive from news@stickleyonsecurity.com


Loading
Please wait...