Heimdal
article featured image

Contents:

Over the last few weeks, a new phishing operation focusing on e-banking users from Germany has been in progress, using QR codes during the credential-stealing operation.

As explained by BleepingComputer, the cybercriminals behind this phishing campaign employ a variety of techniques to get through security measures and persuade their victims to read the emails and act in accordance with the instructions.

Cofense security experts sampled many of these messages and meticulously detailed the attackers’ methods in their analysis.

More About the Phishing Campaign

According to the researchers, the messages have been attentively created, including financial institution logos, well-structured information, and a generally consistent style.

The phishing emails’ subjects range from requesting the user’s approval regarding the bank’s data policy modifications to asking that they review new security measures.

Source

This method demonstrates thorough planning, as the cybercriminals do not make the usual exaggerated claims of account exposure and do not inform the victim of a potential crisis.

As explained by BleepingComputer, when the targets click on the embedded button, they land on the phishing website after navigating through Google’s feed proxy service ‘FeedBurner.’

Source

Furthermore, the attackers register their custom domains, which are utilized for both the re-directions and the phishing websites. By doing this, threat actors plan to deceive email and internet security systems into not raising any suspicions during the phishing operation.

The domains are newly registered sites on the REG.RU Russian registrar and follow a standard URL structure depending on the targeted bank.

Source

New Techniques

In the latest phishing attacks, cybercriminals utilize QR codes rather than buttons to direct their targets to malicious websites.

These email messages do not contain clear-text URLs but instead use QR codes to obfuscate them, making it more difficult for security tools to identify them.

Source

When the user visits the phishing webpage, they are prompted to disclose the location of their bank, their code, username, and PIN.

After the victims enter this information on the fake website, they are validated and then urged to enter their login information again because they are erroneous.

You might wonder about the request to re-enter the credentials. Well, this is a frequent quality strategy used in phishing attacks to remove typing errors when the victim enters their credentials the first time.

Users are advised to avoid clicking on buttons, URLs, and QR codes that lead to an external website, regardless of how authentic an email appears to be.

How Can Heimdal™ Help You?

HeimdalTM Security has developed two email security software aimed against both simple and sophisticated email threats: Heimdal™ Email Security, which detects and blocks malware, spam emails, malicious URLs, and phishing attacks and Heimdal™ Email Fraud Preventiona revolutionary email protection system against employee impersonation, fraud attempts – and BEC, in general.

By using over 125 vectors of analysis and being fully supported by threat intelligence, it detects phraseology changes, performs IBAN/Account number scanning, identifies modified attachments, malicious links, and Man-in-the-Email attacks. Furthermore, it integrates with O365 and any mail filtering solutions and includes live monitoring and alerting 24/7 by our specialists.

If you liked this article, follow us on LinkedInTwitterFacebookYoutube, and Instagram for more cybersecurity news and topics.

Author Profile

Antonia Din

PR & Video Content Manager

linkedin icon

As a Senior Content Writer and Video Content Creator specializing in cybersecurity, I leverage digital media to unravel and clarify complex cybersecurity concepts and emerging trends. With my extensive knowledge in the field, I create content that engages a diverse audience, from cybersecurity novices to experienced experts. My approach is to create a nexus of understanding, taking technical security topics and transforming them into accessible, relatable knowledge for anyone interested in strengthening their security posture.

Leave a Reply

Your email address will not be published. Required fields are marked *

CHECK OUR SUITE OF 11 CYBERSECURITY SOLUTIONS

SEE MORE