The last two weeks have seen an uptick in spearphish targeting corporate users on their personal accounts as well as a burst of Netflix phishing activity. Here are some examples and highlights.
Before we dive in, here is a list of examples of phishing websites that we discovered and we recommend you update your threat intelligence with these URLs.
hebelex[.]com/
ry74tykjrnm[.]asialink88[.]info
taxliencode[.]constructappsolution[.]com
2ndlinksffice[.]appforconstruction[.]com/
onlinery[.]norterc[.]com/
signin[.]neflix[.]payment-reminders.144-126-136-207[.]cprapid[.]com
payments[.]oauth-netflix[.]updateverification[.]50-6-173-246[.]cprapid[.]com
signin-netflixpaymentsupdates[.]50-6-172-50[.]cprapid[.]com
On November 25th, a staff member at a California organization clicked on a spearphish targeting their Microsoft credentials. While the hacker was targeting their professional email password, the end user confirmed that they clicked the phishing link in their personal email.
Hackers know that corporate email is better defended than personal email. Targeting users via their personal email often, therefore, presents a path of less resistance.
On Thanksgiving day, a staff member at a Kentucky organization opened the below spearphish. It was sent from a valid email address from a known business associate at a local Home Builders Association.
The previous day, an executive at the Home Builders Association had their own corporate email compromised. Leveraging the trusted communications with their contact, the hacker sent an email to the targeted user via the compromised account.
The email contained a View Document call to action, referencing a proposal that was likely anticipated by the recipient. The full email included the sender’s signature and headshot photo of the sender.
During the same period, we saw a large surge in Netflix phishing attacks being clicked in districts across Georgia, Texas, and Washington.
Numerous subdomains were detected like the above that use disposable hosting services so that they only stay active for a short period. The phishing attack further redirects security sandboxes to a legitimate Netflix help page. Most of the URLs reference billing or payment.
If you would like a demo of Pixm to learn more about our AI technology and how we can help protect your customers, sign up here.
Questions or Feedback
PIXM Threat Research Team
[email protected]