Back to Email phishing

Email phishing

Security experts uncover yet another corona virus-themed phishing scam

With the COVID-19 pandemic comes an increasing trend in threat groups trying to take advantage of the fear to scare people into becoming victims of phishing activity. In Ottawa, Canada, there is an ongoing phishing scam targeting residents in which emails claiming to be from a local hospital state that the recipient has been in contact with a colleague, friend, or family member who has tested positive for the COVID-19 virus.

In the email, the victim is instructed to print the attached “EmergencyContact.xlsm” file and bring it with them to the nearest testing center.

paypal email phishing screenshot

Once the recipient opens the file, they are prompted to Enable Content to view the content of the protected document, which will trigger the infection process. The malicious code is designed to steal cryptocurrency wallets and web browser cookies. It also extracts a list of programs running on the computer, looks for open shares on the network, and gets local IP address information configured on the computer.

During such trying times, it's important to be wary of coronavirus-related emails, exercise caution, and not open attachments.

Attackers usually resort to familiar, effective techniques, like phishing scams, to gain access to email accounts. A smart tool like Exchange Reporter Plus enables organizations to stay ahead of attackers by monitoring for and thwarting email-bound cybersecurity threats. Download a free, 60-day trial of Exchange Reporter Plus today.

How ManageEngine can help.

Exchange Reporter Plus provides a host of reports that can help you locate suspicious emails, both sent and received, based on keywords in their subject or body. Often times, these malicious emails appear to be valid, tricking users into opening the emails and clicking on links embedded in them, which can cause serious damage.

With Exchange Reporter Plus, you can locate emails based on:

  • Messages by subject keyword. Use reports to identify particular keywords in the email subject lines.
  • Messages by body keyword. Identify all the messages in your mailbox that have a particular keyword in the body of the email.
  • Attachment name. Get a report of all emails in your mailbox that have an attachment with a specific name. With the names of the malicious files, you can take the necessary steps to stop email-bound threats.
  • Attachment type. Based on an attachment’s file extension, you can spot malicious software.
  • The number of emails received from a specific domain, sender, department, or external email address. Get reports on all incoming emails from an external email address, a blacklisted sender or domain, or a specific department.

In addition, ManageEngine M365 Manager Plus provides an advanced Microsoft 365 mailbox content search capability that identifies phishing emails by analyzing internet message headers, subjects, attachments, and bodies of emails. With this feature, you can identify senders' email addresses, the platform used by the attackers, and the servers the emails passed through.

Start your free, 30-day trial of M365 Manager Plus today to try out all these features.

© 2022 Zoho Corporation Pvt. Ltd. All rights reserved.

+

Stay In The Know

Thank you

You will receive weekly cybersecurity news soon!

  • Please enter a business email id
  •  
  •  
    By clicking 'I'm Interested', you agree to processing of personal data according to the Privacy Policy.