Navy Federal Credit Union Members Targeted in Phishing Attack

Cybercriminals recently impersonated the US Navy Federal Credit Union with phishing emails to steal banking credentials.
May 18, 2020

As individuals worldwide struggle with the financial burdens caused by the COVID-19 pandemic, cybercriminals are taking advantage. In a recent attack uncovered by Abnormal, attackers impersonate the US Navy Federal Credit Union in order to steal victims' banking credentials. Once the credentials are placed into the the phishing site, criminals could use them to access the account and transfer money.

Summary of Attack

Platform: Office 365
Victims: Employees
Payload: Malicious Link
Technique: Impersonation

What was the Attack?

As individuals are struggling to balance bills, live on reduced revenue or income, and manage unexpected costs during the pandemic, financial stimuli such as the stimulus check and the Payment Protection Program are helping people and businesses alleviate some of their financial burdens. This email sent by attackers claims to come from the US Navy Federal Credit Union and states that the user has received $1,100 dollars due to the COVID-19 pandemic.

Navy Credit Union Phishing Email
The phishing scam email impersonating the Navy Credit Union

The message claims that if the user has not received funds, they must validate their account with the link provided, which directs them to a phishing credentials webpage.

Navy Credit Union Phishing Scam Login
The fake login page from the phishing email

The link in the email takes the victim to a URL that's clearly not associated with the Navy Federal Credit Union. However, the landing page appears very similar to the legitimate Navy Federal Credit Union login page, and a victim searching for their $1,100 may not think to look at the URL before entering their banking credentials. Once entered, the attackers would have full access to the banking account and could then use it to buy items, transfer it into their own accounts, or invoke a variety of other financial crimes.

Why This Attack Bypassed Existing Security Infrastructure

Most traditional email security systems should recognize this email as a credential phishing attempt, due to the mismatch between the display name and the sender domain, as well as the inclusion of a malicious link. In addition to these traditional indicators of compromise, Abnormal also noticed that the message was related to COVID-19, which is currently being exploited by actors, and that the language included a suspicious financial request.

Abnormal Security detecting navy credit union phishing attempt
Abnormal Security detecting the Navy Credit Union phishing attempt

By taking a closer look at the original email, we can see that the attacker purposely masks the link with text, and hopes that the appearance of the landing page will convince the victim of its validity. We also notice that the language is invoking a sense of urgency and in a case where the email recipient has not yet received their relief funds, they may be more inclined to believe this email.

Furthermore, the attacker sent themselves the email (as seen in the to-field of the email attack), while the victim’s email address was placed in the BCC field. The email body itself is vague and contains no personalization, which is a common tactic used by attackers to mass send this campaign. By doing so, they can hide the number of victims from one another, as well as expand their net of targets, without needing to send individual emails to each person.

Curious how Abnormal can stop these attacks from reaching your end users? Request a short demo to see how Abnormal can work in your environment.

Navy Federal Credit Union Members Targeted in Phishing Attack

See Abnormal in Action

Schedule a Demo

Get the Latest Email Security Insights

Subscribe to our newsletter to receive updates on the latest attacks and new trends in the email threat landscape.

 

See the Abnormal Solution to the Email Security Problem

Protect your organization from the full spectrum of email attacks with Abnormal.

See a Demo
 
Integrates Insights Reporting 09 08 22

Related Posts

BC 5 31 23 Vendor Risks
Learn the biggest risks associated with your vendor relationships and how to protect your organization from Vendor Email Compromise (VEC) attacks.
Read More
B 5 30 23 Teams
See how Abnormal's advanced security solutions protect Microsoft Teams workspace from malicious attacks and account takeovers.
Read More
Zoom BC
Discover how Abnormal protects your Zoom messages and prevents attackers from using the application to breach your business.
Read More
B 5 22 23 SOC
Discover how Abnormal simplifies detection, enhances investigation, and automates remediation, increasing threat investigation efficacy at the SOC level.
Read More
B Phishing
Knowing what to do after receiving a phishing attack is essential for preventing costly consequences. Learn how to respond to Phishing attacks.
Read More
B 5 15 23 Israel BEC
Abnormal research into an advanced Israel-based threat group puts a spotlight on the continuing rise of BEC attacks.
Read More