Request Your Demo

"*" indicates required fields

Contact Information

Overview

The last two weeks have seen an uptick in spearphish targeting corporate users on their personal accounts as well as a burst of Netflix phishing activity. Here are some examples and highlights.

Before we dive in, here is a list of examples of phishing websites that we discovered and we recommend you update your threat intelligence with these URLs.

Phishing URLs

hebelex[.]com/

ry74tykjrnm[.]asialink88[.]info

taxliencode[.]constructappsolution[.]com

2ndlinksffice[.]appforconstruction[.]com/

onlinery[.]norterc[.]com/

signin[.]neflix[.]payment-reminders.144-126-136-207[.]cprapid[.]com

payments[.]oauth-netflix[.]updateverification[.]50-6-173-246[.]cprapid[.]com

signin-netflixpaymentsupdates[.]50-6-172-50[.]cprapid[.]com

Personal Email Delivery

On November 25th, a staff member at a California organization clicked on a spearphish targeting their Microsoft credentials. While the hacker was targeting their professional email password, the end user confirmed that they clicked the phishing link in their personal email.

Hackers know that corporate email is better defended than personal email. Targeting users via their personal email often, therefore, presents a path of less resistance.

Lateral Phishing

On Thanksgiving day, a staff member at a Kentucky organization opened the below spearphish. It was sent from a valid email address from a known business associate at a local Home Builders Association.

The previous day, an executive at the Home Builders Association had their own corporate email compromised. Leveraging the trusted communications with their contact, the hacker sent an email to the targeted user via the compromised account.

The email contained a View Document call to action, referencing a proposal that was likely anticipated by the recipient. The full email included the sender’s signature and headshot photo of the sender.

Netflix Surge

During the same period, we saw a large surge in Netflix phishing attacks being clicked in districts across Georgia, Texas, and Washington.

Numerous subdomains were detected like the above that use disposable hosting services so that they only stay active for a short period. The phishing attack further redirects security sandboxes to a legitimate Netflix help page. Most of the URLs reference billing or payment.

Suggested Actions

  • Add the specified domains to your block lists.
  • Focus awareness efforts on high-risk credentials.
  • Educate users that phishing in their personal email can pose serious risks.
  • Educate users to exercise caution when opening links even when they are delivered from trusted associate email addresses.
  • Deploy the PIXM extension to protect your users from the next wave of zero day phishing attacks

 If you would like a demo of Pixm to learn more about our AI technology and how we can help protect your customers, sign up here

Questions or Feedback

PIXM Threat Research Team
threats@pixmsecurity.com

Share This