chat
expand_more

New BEC Attacks Target Read Receipt and Out-of-Office Reply Loophole

Abnormal Security recently detected two new types of attacks where scammers are targeting victims by redirecting their own Microsoft 365 out-of-office replies as well as read receipts back to them. These tactics indicate attackers are using every available tool and loophole...
January 26, 2021

Abnormal Security recently detected two new types of attacks where scammers are targeting victims by redirecting their own Microsoft 365 out-of-office replies as well as read receipts back to them. These tactics indicate attackers are using every available tool and loophole to their advantage in the hopes of a successful BEC attempt. These attacks were observed over the holidays in December 2020, where out-of-office replies and auto-responders are more prevalent.

Read Receipts Attack

In this attack, the scammer prepares a BEC attack such as an extortion email, and manipulates the email headers (“Disposition-Notification-To”) so the target would receive a read receipt notification from M365, instead of the attacker. The extortion email is sent, gets by traditional security solutions and lands in the employee inbox, where it is auto-remediated by Abnormal.

However, even though the original extortion email was auto-remediated, the manipulated email header triggered a read receipt notification back to the target that includes the text of the extortion.

Abnormal now auto-remediates read receipt notifications if they are preceded by a malicious email. However, for organizations without this protection, employees are vulnerable to these cleverly configured attacks that can reach the inbox.

Out of Office Reply Attack

Similar to the read receipts scam, in this type of attack the scammer prepares an extortion email and manipulates the email headers (“Reply-To”). The difference here is, if the target has an Out of Office Reply turned ON, the notification can be directed to a second target within the organization, not the attacker.

As with the Read Receipts attack, the extortion email gets by traditional security solutions and lands in the employee inbox, where it is auto-remediated by Abnormal.

Even though the original extortion email was auto-remediated, the manipulated email header triggered an Out of Office reply to a second target that includes the text of the extortion.

Abnormal has developed techniques to remove unwanted Out of Office and auto-reply messages stemming from malicious emails. For organizations lacking protection in this area, these emails cause alarm and confusion.

To protect your organization from never-before-seen attacks that get past traditional email security solutions such as these, request a demo of the Abnormal Security platform.

New BEC Attacks Target Read Receipt and Out-of-Office Reply Loophole

See Abnormal in Action

Get a Demo

Get the Latest Email Security Insights

Subscribe to our newsletter to receive updates on the latest attacks and new trends in the email threat landscape.

Get AI Protection for Your Human Interactions

Protect your organization from socially-engineered email attacks that target human behavior.
Request a Demo
Request a Demo

Related Posts

B PFPT
Discover how Abnormal Security detected a sophisticated phishing attack that evaded both Proofpoint and DarkTrace, and learn how it outperforms traditional solutions in combating modern email threats.
Read More
B Writing Detection Rules with LL Ms Blog
Discover how Abnormal Security leverages large language models (LLMs) to automate and enhance email threat detection with AI-generated detection rules.
Read More
B MKT628 Cyber Savvy Social Images
Discover key insights from seasoned cybersecurity professional Nicholas Schopperth, CISO at Dayton Children’s Hospital.
Read More
B Podcast Blog
Discover 'SOC Unlocked,' Abnormal Security's new podcast featuring host Mick Leach and cybersecurity expert guests like Jeremy Ventura, Dave Kennedy, and Mick Douglas.
Read More
B 07 22 24 MKT624 Images for Paris Olympics Blog
Threat actors are targeting French businesses ahead of the Paris 2024 Olympics. Learn how they're capitalizing on the event and how to protect your organization.
Read More
B Cross Platform ATO
Cross-platform account takeover is an attack where one compromised account is used to access other accounts. Learn about four real-world examples: compromised email passwords, hijacked GitHub accounts, stolen AWS credentials, and leaked Slack logins.
Read More