chat
expand_more

Navy Federal Credit Union Members Targeted in Phishing Attack

Cybercriminals recently impersonated the US Navy Federal Credit Union with phishing emails to steal banking credentials.
May 18, 2020

As individuals worldwide struggle with the financial burdens caused by the COVID-19 pandemic, cybercriminals are taking advantage. In a recent attack uncovered by Abnormal, attackers impersonate the US Navy Federal Credit Union in order to steal victims' banking credentials. Once the credentials are placed into the the phishing site, criminals could use them to access the account and transfer money.

Summary of Attack

Platform: Office 365
Victims: Employees
Payload: Malicious Link
Technique: Impersonation

What was the Attack?

As individuals are struggling to balance bills, live on reduced revenue or income, and manage unexpected costs during the pandemic, financial stimuli such as the stimulus check and the Payment Protection Program are helping people and businesses alleviate some of their financial burdens. This email sent by attackers claims to come from the US Navy Federal Credit Union and states that the user has received $1,100 dollars due to the COVID-19 pandemic.

Navy Credit Union Phishing Email
The phishing scam email impersonating the Navy Credit Union

The message claims that if the user has not received funds, they must validate their account with the link provided, which directs them to a phishing credentials webpage.

Navy Credit Union Phishing Scam Login
The fake login page from the phishing email

The link in the email takes the victim to a URL that's clearly not associated with the Navy Federal Credit Union. However, the landing page appears very similar to the legitimate Navy Federal Credit Union login page, and a victim searching for their $1,100 may not think to look at the URL before entering their banking credentials. Once entered, the attackers would have full access to the banking account and could then use it to buy items, transfer it into their own accounts, or invoke a variety of other financial crimes.

Why This Attack Bypassed Existing Security Infrastructure

Most traditional email security systems should recognize this email as a credential phishing attempt, due to the mismatch between the display name and the sender domain, as well as the inclusion of a malicious link. In addition to these traditional indicators of compromise, Abnormal also noticed that the message was related to COVID-19, which is currently being exploited by actors, and that the language included a suspicious financial request.

Abnormal Security detecting navy credit union phishing attempt
Abnormal Security detecting the Navy Credit Union phishing attempt

By taking a closer look at the original email, we can see that the attacker purposely masks the link with text, and hopes that the appearance of the landing page will convince the victim of its validity. We also notice that the language is invoking a sense of urgency and in a case where the email recipient has not yet received their relief funds, they may be more inclined to believe this email.

Furthermore, the attacker sent themselves the email (as seen in the to-field of the email attack), while the victim’s email address was placed in the BCC field. The email body itself is vague and contains no personalization, which is a common tactic used by attackers to mass send this campaign. By doing so, they can hide the number of victims from one another, as well as expand their net of targets, without needing to send individual emails to each person.

Curious how Abnormal can stop these attacks from reaching your end users? Request a short demo to see how Abnormal can work in your environment.

Navy Federal Credit Union Members Targeted in Phishing Attack

See Abnormal in Action

Get a Demo

Get the Latest Email Security Insights

Subscribe to our newsletter to receive updates on the latest attacks and new trends in the email threat landscape.

Get AI Protection for Your Human Interactions

Protect your organization from socially-engineered email attacks that target human behavior.
Request a Demo
Request a Demo

Related Posts

B AISOC
Discover how AI is transforming security operation centers by reducing noise, enhancing clarity, and empowering analysts with enriched data for faster threat detection and response.
Read More
B Microsoft Blog
Explore the latest cybersecurity insights from Microsoft’s 2024 Digital Defense Report. Discover next-gen security strategies, AI-driven defenses, and critical approaches to counter evolving threats and safeguard your organization.
Read More
B Osterman Blog
Explore five key insights from Osterman Research on how AI-driven tools are revolutionizing defensive cybersecurity by enhancing threat detection, boosting security team efficiency, and countering sophisticated cyberattacks.
Read More
B AI Native Vendors
Explore how AI-native security like Abnormal fights back against AI-powered cyberattacks, protecting your organization from human-targeted threats.
Read More
B 2024 ISC2 Cybersecurity Workforce Study Recap
Explore key findings from the 2024 ISC2 Cybersecurity Workforce Study and find out how SOC teams can adapt and thrive amidst modern challenges.
Read More
B Reg AI
There are ways to protect the public from the potential dangers of AI without stifling innovation—and the Europeans have already shown us how.
Read More