X-rated phishing attacks just keep growing
New data from GreatHorn finds hackers increasingly using explicit material to get victims to click on malware
Hackers are increasingly using adult material in phishing attacks to lure unsuspecting victims into clicking on links to download malware, according to new research.
In a blog post by security researchers at GreatHorn, it was found that between May 2020 and April 2021, the number of such attacks increased by 974%. Researchers said that these attacks reach across a broad spectrum of industries and appear to target based on male-sounding usernames in company email addresses.
Attackers use these X-rated phishing emails as a runup to blackmail. In these attacks, cybercriminals are tracking the identity of victims who click on their sites by using a technique called an email pass-through. The same technology enables legitimate email senders to auto-populate an unsubscribe field with a user email address.
"Once a user clicks on a link in the email, their email address is automatically passed to the linked site. In these attacks, the cybercriminal leverages the information they gleaned in order to set up a second stage. Individuals who clicked on links to compromising material could be targeted in the second attack to extort the individual," said researchers.
Researchers highlighted two campaigns where this tactic is used.
In the first one, hackers claim to be a woman that wants to meet the victim. Clicking on the link in the email takes the victim to a website with photos, this site is classified as Malicious by Google Safe Browsing. This then directs the victim to a second site, which looks like a dating website.
Prevent fraud and phishing attacks with DMARC
How to use domain-based message authentication, reporting, and conformance for email securityFree download
"It is likely a fake site designed to hook users into providing payment information. User data gleaned in this way will be transmitted to cybercriminals, who will use it for various malicious purposes, such as money withdrawal, blackmailing, or committing further frauds," said researchers.
In the second example, a link in the phishing email sends the victim to a website with X-rated images. Victims are asked to confirm a Zip code to find individuals in their area. This website also tries to make victims provide payment information.
"User data gleaned in this way will be transmitted to cybercriminals, who will use it for various malicious purposes, such as money withdrawal, blackmailing, or committing further frauds," said researchers.
How virtual desktop infrastructure enables digital transformation
Challenges and benefits of VDIFree download
The Okta digital trust index
Exploring the human edge of trustFree download
Optimising workload placement in your hybrid cloud
Deliver increased IT agility with the cloudFree Download
Modernise endpoint protection and leave your legacy challenges behind
The risk of keeping your legacy endpoint security toolsDownload now