Cyber Affairs
No Result
View All Result
  • Login
  • Register
[gtranslate]
  • Home
  • Live Threat Map
  • Books
  • Careers
  • Latest
  • Podcast
  • Popular
  • Press Release
  • Reports
  • Tech Indexes
  • White Papers
  • Contact
Social icon element need JNews Essential plugin to be activated.
  • AI
  • Cyber Crime
  • Intelligence
  • Laws & Regulations
  • Cyber Warfare
  • Hacktivism
  • More
    • Digital Influence Mercenaries
    • Digital Diplomacy
    • Electronic Warfare
    • Emerging Technologies
    • ICS-SCADA
    • Books
    • Careers
    • Cyber Crime
    • Cyber Intelligence
    • Cyber Laws & Regulations
    • Cyber Warfare
    • Digital Diplomacy
    • Digital Influence Mercenaries
    • Electronic Warfare
    • Emerging Technologies
    • Hacktivism
    • ICS-SCADA
    • News
    • Podcast
    • Reports
    • Tech Indexes
    • White Papers
COMMUNITY
NEWSLETTER
  • AI
  • Cyber Crime
  • Intelligence
  • Laws & Regulations
  • Cyber Warfare
  • Hacktivism
  • More
    • Digital Influence Mercenaries
    • Digital Diplomacy
    • Electronic Warfare
    • Emerging Technologies
    • ICS-SCADA
    • Books
    • Careers
    • Cyber Crime
    • Cyber Intelligence
    • Cyber Laws & Regulations
    • Cyber Warfare
    • Digital Diplomacy
    • Digital Influence Mercenaries
    • Electronic Warfare
    • Emerging Technologies
    • Hacktivism
    • ICS-SCADA
    • News
    • Podcast
    • Reports
    • Tech Indexes
    • White Papers
NEWSLETTER
No Result
View All Result
Cyber Affairs
No Result
View All Result
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • Reports
  • White Papers

Hackers Abuse Dropbox In Phishing Attack To Steal Logins

admin by admin
Mar 13, 2024
in News
A A
0

Darktrace, a leading AI-powered threat detection company, identified a sophisticated phishing attempt targeting one of its customers in January 2024. The attack exploited the legitimate cloud service Dropbox.

Algorithm Of The Attack

The attackers used a legitimate email address, “no-reply@dropbox[.]com,” which Dropbox commonly uses for automated notifications.

The email content was crafted to appear legitimate. It likely contained a link to a PDF document supposedly shared by a partner or colleague of the recipient.

Clicking the embedded link within the PDF would have led the user to a malicious website, potentially disguised as a legitimate login page.

Attack Breakdown

On January 29, 2024, the user received a seemingly legitimate email from Dropbox reminding them to open a previously shared PDF, which was sent on January 25, 2024.

  • Darktrace/Email identified the email as suspicious and moved it to junk, preventing the user from clicking a potentially malicious link within the PDF.

Darktrace/Email and Darktrace/Apps, successfully identified the suspicious email by analyzing

  • Anomalous Behavior: The email, despite originating from a legitimate address, was sent from an unknown entity and didn’t align with the customer’s usual email communication patterns.
  • Link Analysis: Darktrace likely analyzed the embedded link within the PDF, identifying it as redirecting to a suspicious domain not previously encountered within the customer’s network.

Despite Darktrace’s intervention, the user opened the suspicious email and accessed the PDF.

On January 31, 2024 Darktrace observed a series of suspicious logins to the compromised Microsoft 365 account:

  • Logins from unusual locations never used before.
  • Logins originating from IP addresses associated with VPN services (ExpressVPN, HideMyAss).
  • Interestingly, the attackers used valid MFA tokens, suggesting they bypassed the customer’s MFA policy (potentially through user error).

The attackers created a new email rule within the compromised account to automatically move emails from the organization’s accounts team to a less-monitored folder. 

The attackers sent emails impersonating the legitimate account holder, using urgency-inducing subject lines like “Incorrect contract” and “Requires Urgent Review.” 

These tactics aimed to trick recipients into further actions, potentially compromising additional accounts.

“Had RESPOND been enabled in autonomous response mode at the time of the attack, it would have quickly moved to log out and disable the suspicious actor as soon as they had logged into the SaaS environment from an unusual location, effectively shutting down this account takeover attempt at the earliest opportunity.” By Ryan Traill, the threat content lead.

With Perimeter81 malware protection, you can block malware, including Trojans, ransomware, spyware, rootkits, worms, and zero-day exploits. All are incredibly harmful and can wreak havoc on your network.

Stay updated on Cybersecurity news, Whitepapers, and Infographics. Follow us on LinkedIn & Twitter.



Read the full article here

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

[mc4wp_form id=”387″]

Recent News

  • Understanding the Implications & Guarding Privacy- Axios Security Group
  • Hackers Actively Using Pupy RAT to Attack Linux Systems
  • Buckle Up_ BEC and VEC Attacks Target Automotive Industry

Topics

  • AI
  • Books
  • Careers
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • News
  • Podcast
  • Reports
  • Tech Indexes
  • Uncategorized
  • White Papers

Get Informed

[mc4wp_form id=”387″]

Social icon element need JNews Essential plugin to be activated.

Copyright © 2022 Cyber Affairs. All rights reserved.

No Result
View All Result
  • Home
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • Reports
  • White Papers

Copyright © 2022 Cyber Affairs. All rights reserved.

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.