Fortra’s PhishLabs Leading Provider of Threat Intelligence and Mitigation Solutions
- Active Phishing Campaign: Twilio SendGrid Abuseon October 23, 2024 at 8:14 pm
Active Phishing Campaigns are coordinated attacks that Fortra has observed bypassing email security gateways and filtering tools. The following analysis includes examples, high-level details, and associated threat indicators. Sample Email Lure Sample 1: Vishing Example Sample 2: Office365 Phishing Example Sender Verification
- UDRP Domain Takeovers vs. Domain Takedownsby Ryan Newby on October 22, 2024 at 1:14 pm
What’s the difference between UDRP Domain Takeovers and Domain Takedowns?In the world of domain ownership, the need for disputes and enforcement can occur. But how should they be handled? What’s the difference between Uniform Domain-Name Dispute-Resolution Policy (UDRP) domain takeovers and a domain takedown? Let’s take a closer look at the processes.
- Active Phishing Campaign: QR Code Attachment O365 Attackon October 16, 2024 at 9:24 pm
Active Phishing Campaigns are coordinated attacks that Fortra has observed bypassing email security gateways and filtering tools. The following analysis includes examples, high-level details, and associated threat indicators. Sample Email Lure Sender Verification
- Active Phishing Campaign: Form Assembly Abuseon October 9, 2024 at 7:24 pm
Active Phishing Campaigns are coordinated attacks that Fortra has observed bypassing email security gateways and filtering tools. The following analysis includes examples, high-level details, and associated threat indicators. To protect the privacy of Fortra’s clients, the brand targeted in this attack has been anonymized and is generically referred to as “Brand” whenever their name appears in the context of this attack campaign.Sample Email Lure Sender Verification
- What Are External Security Threats?by Eric George on September 3, 2024 at 7:45 pm
According to Cybersecurity Ventures, cybercrime would be the world’s third-largest economy (after the U.S. and China) if measured as a country as its damages may total $9.5 trillion globally in 2024. While this may be a surprising stat, it should reiterate the importance of your cybersecurity plan and solutions. External threats play a large part in digital threat landscape, and like the name suggests, external threats are those that come from outside of your organization.
- What Is Tactical Threat Intelligence?by Michael Tyler on August 15, 2024 at 1:54 pm
Every day, the digital threat landscape morphs as threat actors come up with new ways to infiltrate and succeed against your organization. To take proactive measures against cyber threats, organizations need threat detection strategies.Of the three forms of threat intelligence (strategic, operational, and tactical), tactical threat intelligence is the most directly actionable. This form of threat intelligence is meant for direct consumption by security practitioners or automated systems, and usually consists of threat data such as indicators or heuristics. It has two primary purposes.
- Banno Integration Strengthens Brand Protection for PhishLabs Customerson August 6, 2024 at 8:36 pm
Fortra’s PhishLabs announces a new, native integration for stronger brand protection with digital banking platform, Jack Henry Banno. This significant update will help PhishLabs and Banno customers identify phishing quicker and more accurately. “This integration is a win for all involved. It simplifies the process for our customers, ensures the secure handling of low-sensitivity data, and enables us to detect attacks much sooner – in some cases before they reach the targeted customer,” explains Eric George, director, Fortra solutions engineering.
- Cyberattack Anatomy: Banking Smishon July 30, 2024 at 7:06 pm
Cyberattack anatomies are a detailed outline of various attack methodologies, techniques, and tactics. This blog post will outline the anatomy of a recent smishing campaign identified by Fortra’s threat researchers.
- Active Phishing Campaign: Tax Extension Help Lureon June 5, 2024 at 7:24 pm
Active Phishing Campaigns are coordinated attacks that Fortra has observed bypassing email security gateways and filtering tools. The following analysis includes examples, high-level details, and associated threat indicators. Sample Email Lure Sender Verification
- Active Phishing Campaign: Yousign HR Lureon May 23, 2024 at 4:00 pm
Active Phishing Campaigns are coordinated attacks that Fortra has observed bypassing email security gateways and filtering tools. The following analysis includes examples, high-level details, and associated threat indicators. Sample Email Lure
- LabHost Wrapped – Notorious Phishing-as-a-Service Platform Taken Downby Michael Tyler on April 18, 2024 at 3:49 pm
One of the most used phishing-as-a-service platforms, LabHost, has been taken down by an international group of law enforcement authorities coordinated by Europol. Fortra has closely monitored LabHost and has mitigated tens of thousands of phishing attacks carried out by cybercriminals using the platform in recent years. LabHost is estimated to have obtained 480,000 card numbers, 64,000 PIN numbers, and no less than one million account passwords. Earlier this year, we published a detailed profile on LabHost.
- Abusing Data to Avoid Detection: Cybercriminal Adoption of Browser Fingerprintingon April 5, 2024 at 1:05 pm
Browser fingerprinting is one of many tactics phishing site authors use to evade security checks and lengthen the lifespan of malicious campaigns. While browser fingerprinting has been used by legitimate organizations to uniquely identify web browsers for nearly 15 years, it is now commonly exploited by cybercriminals. Today, it is considered widely used for phishing purposes, with a recent study showing one in four phishing sites using some form of this technique.
- Dark Web Actors Overwhelmingly Target Card Data, Finance in Q4on March 14, 2024 at 4:19 pm
Credit unions were the top targeted industry on the Dark Web in Q4 2023, continuing its lead over the historically targeted banking industry for the third consecutive quarter. Financials as a whole continue to be a primary focus of criminal groups on underground channels, with more than 91% of malicious activity directed at either credit unions, banks, financial services, or payment services.
- Social Media Attacks Focus on Financials, Executives in Q4by Jessica Ryan on March 7, 2024 at 3:10 pm
In Q4, impersonation threats made up more than 45% of total attacks on social media, with the vast majority targeting banking and financial services. Impersonation on social media continues to grow, with threats specifically targeting corporate executives responsible for driving the majority of volume for three consecutive quarters.
- DarkLoader Leads Malware Attacks in Q4on February 29, 2024 at 2:40 pm
In Q4, three malware families represented more than 93% of all payload volume targeting end users, with Malware-as-a-Service (MaaS) DarkLoader leading all other reports. Fortra first received reports of DarkLoader in user inboxes in Q3, with attack volume picking up significantly beginning in October. The shift to criminal activity associated with DarkLoader comes after coordinated efforts by officials in Q3 to disrupt former malicious powerhouse QBot.
- Gone Phishing Tournament Resultson February 27, 2024 at 4:08 pm
Compare Phishing Performance With Global Results The results are in! Fortra’s Terranova has recently made the 2023 Gone Phishing Tournament results available for review. More than 250 organizations participated globally in the free annual phishing simulation training. Hosted in October 2023, the event helps organizations and security leaders better understand high-risk areas, compare phishing performance, and establish data-driven goals with accurate benchmarking data.
- O365 Volume Up in Q4 as Cybercriminals Target Brands in Credential Theft Attackson February 22, 2024 at 7:19 pm
The majority of malicious emails reported in user inboxes contained a link to a phishing site, making credential theft emails the attack method of choice for cybercriminals in Q4. Credential theft made up nearly 60% of all reported incidents, with more than half of the volume attributed to O365 attacks. Despite the threat actor preference toward this threat type, credential theft attacks declined as a whole in Q4, with increased reports of response-based and malware attacks reaching inboxes.
- Phishing-as-a-Service Profile: LabHost Threat Actor Groupon February 15, 2024 at 2:49 pm
Fortra is monitoring malicious activity targeting Canadian banks conducted by Phishing-as-a-Service group LabHost. Throughout 2022 and 2023, Fortra has observed phishing attacks connected with Phishing-as-a-Service (PhaaS) groups grow as threat actors use the tools provided through membership services to launch a variety of campaigns. The providers of these platforms boast features such as access to an array of stolen industry branding, monitoring tools, security bypass abilities, and more.
- Record Number of Phishing Sites Impersonate Social Media to Target Victims in Q4by Jessica Ryan on February 8, 2024 at 2:07 pm
Phishing sites impersonated the social media industry more than any other in Q2, Q3, and Q4 of 2023. In Q4 alone, social media phish leapt nearly 20%, reaching the highest volume of abuse (over 67%) since Fortra has reported on this data point.Every quarter, Fortra’s PhishLabs examines hundreds of thousands of phishing attacks targeting enterprises and their brands. In this post, we break down the latest phishing activity, staging methods, and top-level domain abuse.
- How Threat Actors will Leverage Domain Impersonation in 2024by Jessica Ryan on February 1, 2024 at 4:03 pm
Historically, the average brand is targeted by 40 look-alike domains per month. Look-alikes are a strategic component of malicious lures and websites and used in a variety of spaces including social platforms, text messages, the open web, and email. An attack that incorporates a look-alike domain can mean the difference between a convincing campaign and a suspicious one, with a versatility that allows them to mislead victims and their security tools.
- QR Codes That Don’t Bode Well – The Harm That Quishing Attacks Can Doby Monica Delyani on January 18, 2024 at 7:03 pm
Most organizations have security controls in place to inspect URLs in emails to prevent the risk of credential phishing and business email compromise (BEC) attacks. However, threat adversaries have pivoted their tactics to bypass security stacks. And clicking these types of attacks often leads to account takeover. In fact, data from Fortra’s PhishLabs in Q2 2023 reported more than three-quarters of credential theft attacks stemming from a link pointing victims to malicious websites.
- Executive Attacks on Social Media Hit All-Time High as Analysts Point to AIby Jessica Ryan on January 16, 2024 at 11:37 pm
Executive impersonation on social media is at an all-time high as threat actors take advantage of AI to improve and scale their attacks. In Q3, accounts pretending to belong to high-ranking executives on social media climbed to more than 54% of total impersonation volume, surpassing brand attacks for the first time since Fortra began tracking this data. The volume and composition of these attacks strongly indicates they are crafted using generative AI.
- Getting the Board on Board: Explaining Cybersecurity ROIon January 5, 2024 at 12:31 am
In this Tripwire guest blog, we break down how to best communicate the significance of a cybersecurity investment.
- VM Blog: Braving the Digital Risk & Email Security Landscapeby Eric George on December 21, 2023 at 6:00 pm
How will the digital risk and email security landscape evolve in 2024? In this VM Blog article, Eric George discusses the industry’s future and shares his seven predictions for 2024. Originally published in VM Blog. Excerpt:
- The Email Security Gaps in Your Cloudon December 14, 2023 at 1:03 pm
It’s not news that most enterprises operate in the cloud. Migration to the cloud leads to better collaboration, data storage, and lower costs compared to on-premises resources. Odds are your organization is currently enjoying the conveniences of the cloud. The cloud has reshaped the way organizations operate, but with the migration comes new obstacles in email security, and the cloud has its own vulnerabilities. Relying on Microsoft’s add-on security features is simply not enough at stopping advanced threats.
- LastPass Fortra’s PhishLabs Partnership: A Focus on Proactive Customer Protection Pays Off in 2023on December 5, 2023 at 3:16 pm
As we approach the end of the year, LastPass Labs has reviewed the last 12 months to take account of the threat environment and how it has changed, as well as our accomplishments. Throughout 2023, the Threat Intelligence, Mitigation, and Escalations (TIME) team focused on rapidly expanding our capabilities to protect our customers from phishing sites and/or infostealers.
- Brand Threats Masterclass: Experts Reveal Top Attacks and Defense Tacticsby Jessica Ryan on November 30, 2023 at 8:43 am
There is little doubt that AI-fueled impersonation campaigns and novel attacks via non-traditional channels have emerged as a primary concern for security teams. Brand impersonation is on the rise, with nearly 40 look-alike domains targeting brands each month. On social media, impersonation attacks account for almost half of all threatening content. And online counterfeit campaigns are increasingly abusing trademarked materials in paid search ads and direct messages to convince victims of their legitimacy.
- Google and Yahoo Take Stance on Email Authenticationon November 16, 2023 at 1:40 pm
Google and Yahoo announced new email authentication requirements for those sending email to their users, with a rapid deadline of February 2024. At Fortra, we commend this push to require email authentication as a huge step in the ongoing fight against spoofing and abuse. But if the requirements are not in place by the deadline, certain emails may no longer be delivered. This could prove detrimental to organizations relying on email for invoices, marketing, and other business transactions.
- How Organizations Can Use Dark Web Intelligenceon November 9, 2023 at 3:17 pm
The scope of intelligence on underground marketplaces is vast and navigating the dark web in search of brand mentions and potential threats can be time-consuming and complex. In order to proactively defend against attacks and mitigate the threat of leaked information, organizations should consistently monitor marketplaces and forums for data pertaining to their brand. If questionable data is detected, understanding next steps is critical to minimizing risks to your brand, employees, and customers.
- Q3 Payload Reportby Jessica Ryan on October 26, 2023 at 10:04 am
QBot, the leading payload family in Q3, was disrupted as part of a coordinated, multinational operation led by the FBI on August 29, 2023. This resulted in the removal of 700,000 QBot payloads from infected devices across the globe, and interrupted the activity of one of the most active malware families since the former juggernaut Emotet, which was disrupted in 2021.