Atlassian workspaces, Japanese ISPs, and a compliance cover story
A report by Mimecast highlighted a new phishing tactic using Atlassian workspaces and other platforms to target law firms. The phishing attacks involved:
- Using popular platforms like Atlassian, Archbee, and Nuclino to send harmful emails to employees.
- Using device compliance updates as a cover to trick employees into clicking on links.
- Redirecting users to fake company portals to steal credentials.
- Sending emails from Japanese ISPs to add legitimacy to the phishing attempts.
The emails were personalized and aimed at increasing their credibility by referencing the target organization’s domain name.
The growing sophistication of phishing attacks
Cyber criminals are now targeting various industries, not just law firms, with sophisticated phishing attacks. Some key aspects of these attacks include:
Use of Atlassian and other workspaces
Attackers are now leveraging services like Atlassian workspaces to evade detection. This is a new trend identified by Mimecast, indicating the evolving nature of cyber threats.
Harvesting of tracker data intelligence
The use of postmark URLs allows attackers to gather intelligence on users, making their phishing attempts more convincing by personalizing the content.
Multiple URL obfuscation techniques
Phishing campaigns are using advanced techniques to hide the true destination of URLs, making it harder for users to identify malicious links.
Enlisting unsuspecting Japanese ISPs
Japanese ISPs are being exploited by cyber criminals to launch phishing attacks, showcasing the extent to which threat actors will go to target organizations.
Phishing attacks will get easier to mount — and more convincing
Phishing remains a prevalent cyber threat, with advancements in AI and machine learning making attacks more sophisticated. This evolution in phishing threats calls for improved detection and response strategies to combat these increasingly convincing attacks.
No Comment! Be the first one.