Blog yellow tunnel
Vendor email compromise, in which a compromised vendor sends invoice or payment attacks to their customers, is growing in popularity. An easier to detect method of this attack happens when a vendor is impersonated, rather than compromised. In this attack, the...
Read More
Blog white bridge
We’ve seen an incredible uptick in collaboration software impersonations in the past month as the COVID-19 pandemic has forced people to work at home. Most of these attacks are associated with platforms like Google Workspace and Office 365, which can be...
Read More
Blog black white diagonals
As individuals worldwide struggle with the financial burdens caused by the COVID-19 pandemic, cybercriminals are taking advantage. In a recent attack uncovered by Abnormal, attackers impersonate the US Navy Federal Credit Union in order to steal...
Read More
Blog blue triangle water
DocuSign is a platform that provides secure electronic document signing and is typically used for financial documentation, offer letters, and other secure documents. Of course, this means that important business documents are located within each account. In this...
Read More
Blog purple waves
Companies have largely transitioned to working from home where they can in response to the current pandemic and are relying on conferencing software such as Cisco WebEx. Attackers are taking advantage of this transition to impersonate collaboration and...
Read More
Blog green leaf pattern
Attackers often impersonate well-known brands, and Microsoft is typically one of the most impersonated, given that access to any Microsoft account opens the possibility of accessing ongoing email threats, sensitive documents, and other Microsoft programs. In addition...
Read More
Blog orange purple building
The work landscape is changing as employees move to working remotely because of COVID-19 shelter-in-place orders. As a result, people are switching from in-person meetings to online video conferencing software such as Zoom. In this attack, attackers pose as a...
Read More
Blog white side building
Cybercriminals are leveraging the uncertainty around the spread of COVID-19 as everyone focuses more on safety and security during these times. As markets crash, the attacker knows that people will look to p...
Read More
Blog circular lights
As the world is stuck inside, shipping items has increased and cybercriminals are taking notice. In a recent scam, attackers created an email to impersonate DHL and claimed that a package intended for the re...
Read More
Blog purple diagonals
Credential phishing attacks are not new, and impersonating Microsoft is well-known at this point. However, this attack is unique because the attacker was not simply asking for email credentials. Instead, the...
Read More
Blog green glass building
Executive impersonation is one of the most prevalent forms of business email compromise because it is typically easy to do. The attacker only needs to know the name and job type of a high-profile executive, ...
Read More