chat
expand_more

Chief Human Resources Officer Impersonated in Identity Theft Scheme

Identity theft is not a joke, impacting more than 14 million people each year in the United States alone. Over the course of their lifetime, nearly one-third of all people will become victims of identity theft—often as a result of a corporate data breach. Once attackers have access to identifying information like your full name, address, date of birth, and/or social security number...
August 26, 2021

Identity theft is not a joke, impacting more than 14 million people each year in the United States alone. Over the course of their lifetime, nearly one-third of all people will become victims of identity theft—often as a result of a corporate data breach.

Once attackers have access to identifying information like your full name, address, date of birth, and/or social security number, they can use it to steal everything from your health records to the money in your savings account. In many cases, they can also use it to open new credit cards or utility accounts in your name, steal your health records, or run additional scams on your friends and family.

In a recent attack detected by Abnormal, we saw an attempt to steal the identities of high-powered executives. Let’s take a look and uncover why new attacks like these are on the rise.

Summary of Attack Target

  • Platform: Office 365
  • Victims: C-Suite Executives
  • Payload: Text
  • Technique: VIP Impersonation

About the Identity Theft Attempt

In this attack, the organization’s most high-profile executives received an email claiming to come from their Chief Human Resources Officer. It asked them to provide a primary identification document such as a passport or driver’s license. If they do not provide that information, the message states that they will miss the next payroll.

Hr id verification email

This message did not in fact come from the Chief Human Resources Officer—or from anyone within the organization. The sender address was mgnt000@icloud.com, an email address that any individual with an Apple device could create for free. This sender then changed their display name to that of the Chief Human Resources Officer so that they could more easily deceive this message’s recipients.

This email could be quite effective as a vehicle for identity theft if it were to reach the intended mailboxes. The urgent tone of the message, especially the implied threat of missing a paycheck for noncompliance, encourages recipients to respond quickly without first taking proper precautions. While some people would likely check to see if the sender’s display name and email address matched what they expected, others may simply send the information in a rush between meetings—without first verifying the sender. As an added complication, this type of message is one that people would expect to come from a human resources department, so it doesn’t raise as much immediate suspicion as it may if it appeared to come from the CEO or other executive.

Had any of the recipients responded with an image of their primary ID, the attacker could very easily have used that information to steal the recipient’s identity. The attacker would then have full access to the recipient’s bank accounts, credit cards, credit score, health insurance, and more. Because these recipients were all executives, an identity compromise on their part could not only ruin them financially, but could have resulted in significant harm to the company’s reputation.

Why It Bypassed Existing Security Infrastructure

This attack bypassed other email security software employed by this Abnormal customer. One potential reason for this is that this attack type is relatively new. Most VIP impersonation attacks like this try to redirect paychecks or otherwise convince recipients to immediately transfer large sums of money to accounts owned by the threat actor.

Hr id analysis

Instead, this attacker was aiming for the somewhat more difficult task of profiting off of a stolen identity rather than stolen funds. Because this attack does not necessarily provide immediate benefits and is thus rarer, many existing security systems do not look for the type of language contained in this message.

On the other hand, Abnormal understood that this email came from a suspicious sender and recognized that the language may be trying to steal personal information. Without this added layer of security, the executives targeted by this email would’ve been at risk, and could have lost their identity, financial security, and reputation—something many would consider even worse than losing just money.

Unfortunately for those targeted, social engineering attacks such as this one are on the rise and unlikely to diminish in the foreseeable future. Without proper precautions, including an email security system that can detect unusual activity and suspicious language, a single lapse in judgment could result in life-altering negative consequences.

See how Abnormal can prevent email-based identity theft for your executives and employees by requesting a demo today.

Chief Human Resources Officer Impersonated in Identity Theft Scheme

See Abnormal in Action

Get a Demo

Get the Latest Email Security Insights

Subscribe to our newsletter to receive updates on the latest attacks and new trends in the email threat landscape.

Get AI Protection for Your Human Interactions

Protect your organization from socially-engineered email attacks that target human behavior.
Request a Demo
Request a Demo

Related Posts

B E Rate
Discover how AI-powered email protection ensures a secure digital learning environment.
Read More
B Healthcare Industry Attack Trends Blog
Targeted attacks on the healthcare industry are on the rise. Explore the latest threat trends and learn how to protect your organization.
Read More
B URL
Explore how attackers exploit rewritten URLs to gain unauthorized access, highlighting traditional security vulnerabilities and the need for modern tools.
Read More
B SOC Experts
Explore insights from SOC leaders on the evolving landscape of social engineering threats, highlighting human vulnerabilities and strategies to enhance cybersecurity.
Read More
B Cybersecurity Awareness Month Engage Educate Empower
Happy Cybersecurity Awareness Month! Make sure your workforce is prepared to combat emerging threats with these 5 tips.
Read More
B Top Mortgage Lender Replaces Proofpoint with Abnormal
Discover how a leading mortgage lender saved money and stopped more attacks by replacing its Proofpoint SEG with Abnormal’s API-based behavioral AI solution.
Read More