WebEx phishing scam spoofs Cisco to target remote workers
PDC expects phishing emails to continue to plague remote workers over the next few months
The Cofense Phishing Defense Center (PDC) has discovered a new phishing campaign that targets employees working from home during the coronavirus pandemic.
PDC claims that hackers are attempting to harvest Cisco WebEx credentials using a security warning for the application and have successfully averted Cisco’s own Secure Email Gateway.
In a blog post detailing the attacks, PDC’s Ashley Tran explained that hackers send “an email with varying subject lines such as “Critical Update” or “Alert!” from the spoofed address “meetings[@]webex[.]com”. Tran said that these are able to “gauge users’ curiosity enough to entice them to click in order to take the requested action”.
“The phishing page to which users are redirected is identical to the legitimate Cisco WebEx login page; visually there is no difference,” she warned. “Behavior-wise, there is a deviation between the real site and the fraudulent page.
"When email addresses are typed into the real Cisco page, the entries are checked to verify if there are associated accounts. With this phishing page, however, any email formatted entry takes the recipient to the next page where they then requested to enter their password.”
PDC predicts that phishing emails will continue to plague remote workers in the next few months. Last month, it discovered that cyber criminals were posing as UK mobile network operator Three as part of another sophisticated phishing campaign designed to extract the financial details of its customers.
Last week, the US Cybersecurity and Infrastructure Agency’s assistant director for cybersecurity, Bryan Ware, advised the public to “remain vigilant”, be wary of “suspicious emails”, and to seek information only from trusted sources.
“As the COVID-19 outbreak continues to evolve, bad actors are using these difficult times to exploit and take advantage of the public and business," he said.
Hackers have also posed as Gov.uk and the US Centers for Disease Control and Prevention (CDC) to spread phishing emails, while the World Health Organisation (WHO) and hospitals have also recently had their computer systems compromised by cyber criminals.
Managing security risk and compliance in a challenging landscape
How key technology partners grow with your organisationDownload now
Evaluate your order-to-cash process
15 recommended metrics to benchmark your O2C operationsDownload now
AI 360: Hold, fold, or double down?
How AI can benefit your businessDownload now
Getting started with Azure Red Hat OpenShift
A developer’s guide to improving application building and deployment capabilitiesDownload now