Chief Human Resources Officer Impersonated in Identity Theft Scheme

August 26, 2021

Identity theft is not a joke, impacting more than 14 million people each year in the United States alone. Over the course of their lifetime, nearly one-third of all people will become victims of identity theft—often as a result of a corporate data breach.

Once attackers have access to identifying information like your full name, address, date of birth, and/or social security number, they can use it to steal everything from your health records to the money in your savings account. In many cases, they can also use it to open new credit cards or utility accounts in your name, steal your health records, or run additional scams on your friends and family.

In a recent attack detected by Abnormal, we saw an attempt to steal the identities of high-powered executives. Let’s take a look and uncover why new attacks like these are on the rise.

Summary of Attack Target

  • Platform: Office 365
  • Victims: C-Suite Executives
  • Payload: Text
  • Technique: VIP Impersonation

About the Identity Theft Attempt

In this attack, the organization’s most high-profile executives received an email claiming to come from their Chief Human Resources Officer. It asked them to provide a primary identification document such as a passport or driver’s license. If they do not provide that information, the message states that they will miss the next payroll.

Hr id verification email

This message did not in fact come from the Chief Human Resources Officer—or from anyone within the organization. The sender address was mgnt000@icloud.com, an email address that any individual with an Apple device could create for free. This sender then changed their display name to that of the Chief Human Resources Officer so that they could more easily deceive this message’s recipients.

This email could be quite effective as a vehicle for identity theft if it were to reach the intended mailboxes. The urgent tone of the message, especially the implied threat of missing a paycheck for noncompliance, encourages recipients to respond quickly without first taking proper precautions. While some people would likely check to see if the sender’s display name and email address matched what they expected, others may simply send the information in a rush between meetings—without first verifying the sender. As an added complication, this type of message is one that people would expect to come from a human resources department, so it doesn’t raise as much immediate suspicion as it may if it appeared to come from the CEO or other executive.

Had any of the recipients responded with an image of their primary ID, the attacker could very easily have used that information to steal the recipient’s identity. The attacker would then have full access to the recipient’s bank accounts, credit cards, credit score, health insurance, and more. Because these recipients were all executives, an identity compromise on their part could not only ruin them financially, but could have resulted in significant harm to the company’s reputation.

Why It Bypassed Existing Security Infrastructure

This attack bypassed other email security software employed by this Abnormal customer. One potential reason for this is that this attack type is relatively new. Most VIP impersonation attacks like this try to redirect paychecks or otherwise convince recipients to immediately transfer large sums of money to accounts owned by the threat actor.

Hr id analysis

Instead, this attacker was aiming for the somewhat more difficult task of profiting off of a stolen identity rather than stolen funds. Because this attack does not necessarily provide immediate benefits and is thus rarer, many existing security systems do not look for the type of language contained in this message.

On the other hand, Abnormal understood that this email came from a suspicious sender and recognized that the language may be trying to steal personal information. Without this added layer of security, the executives targeted by this email would’ve been at risk, and could have lost their identity, financial security, and reputation—something many would consider even worse than losing just money.

Unfortunately for those targeted, social engineering attacks such as this one are on the rise and unlikely to diminish in the foreseeable future. Without proper precautions, including an email security system that can detect unusual activity and suspicious language, a single lapse in judgment could result in life-altering negative consequences.

See how Abnormal can prevent email-based identity theft for your executives and employees by requesting a demo today.

Demo 2x 1

See the Abnormal Solution to the Email Security Problem

Protect your organization from the attacks that matter most with Abnormal Integrated Cloud Email Security.

Related Posts

B 06 21 22 Threat Intel blog
Executives are no longer the go-to impersonated party in business email compromise (BEC) attacks. Now, threat actors are opting to impersonate vendors instead.
Read More
B 06 7 22 Disentangling ML Pipelines Blog
Learn how explicitly modeling dependencies in a machine learning pipeline can vastly reduce its complexity and make it behave like a tower of Legos: easy to change, and hard to break.
Read More
B 04 07 22 SEG
As enterprises across the world struggle to stop modern email attacks, it begs the question: how are these attacks evading traditional solutions like SEGs?
Read More
Enhanced Remediation Blog Cover
The most effective way to manage spam and graymail is to leverage a cloud-native, API-based architecture to understand identity, behavior, and content patterns.
Read More
B 05 16 22 VP of Recruiting
We are thrilled to announce the addition of Mary Price, our new Vice President of Talent. Mary will support our continued investment in the next generation of talent here at Abnormal.
Read More
B 06 01 22 Stripe Phishing
In this sophisticated credential phishing attack, the threat actor created a duplicate version of Stripe’s entire website.
Read More
B Podcast Engineering9
In episode 9 of Abnormal Engineering Stories, Dan sits down with Mukund Narasimhan to discuss his perspective on productionizing machine learning.
Read More
B 05 31 22 RSA Conference
Attending RSA Conference 2022? So is Abnormal! We’d love to see you at the event.
Read More
B 05 27 22 Active Ransomware Groups
Here’s an in-depth analysis of the 62 most prominent ransomware groups and their activities since January 2020.
Read More
B 05 24 22 ESI Season 1 Recap Blog
The first season of Enterprise Software Innovators (ESI) has come to a close. While the ESI team is hard at work on season two, here’s a recap of some season one highlights.
Read More
B 05 13 22 Hiring Experience
Abnormal Security is committed to offering an exceptional experience for candidates and employees. Hear about our recruiting and onboarding firsthand from three Abnormal employees.
Read More
B 05 11 22 Scaling Out Redis
As we’ve scaled our customer base, the size of our datasets has also grown. With our rapid expansion, we were on track to hit the data storage limit of our Redis server in two months, so we needed to figure out a way to scale beyond this—and fast!
Read More