Skip to content
Latest News
  • Epicor expands AI offerings, launches new green initiative
  • MS도 합류··· 구글의 A2A 프로토콜, AI 에이전트 분야의 공용어 될까?
  • 오픈AI, 아시아 4국에 데이터 레지던시 도입··· 한국 기업 데이터는 한국 서버에 저장
  • Samsung confirms big durability upgrade for Galaxy S25 Edge - and it's mostly good news
  • Dispute over Broadcom's licensing policy escalates
Unified Networking
  • Home
  • My Blogs
    • CASE STUDIES
    • DE
    • CONF TEMPLATES
  • Friendly Blogs
    • Networking Updates
    • Virtulization Updates
    • Security Updates
  • VIDEOS
    • Cisco dcloud Labs
  • News
  • My Profile

Meta is the second most spoofed brand for credential phishing

Posted on May 15, 2024May 15, 2024 by Admin
Meta is the second most spoofed brand for credential phishing

Related Post

  • Epicor expands AI offerings, launches new green initiative
  • MS도 합류··· 구글의 A2A 프로토콜, AI 에이전트 분야의 공용어 될까?
  • 오픈AI, 아시아 4국에 데이터 레지던시 도입··· 한국 기업 데이터는 한국 서버에 저장
  • VMware Product Release Tracker (vTracker)
  • Russian Group Launches LOSTKEYS Malware in Attacks

A report by Cofense examines the inner workings of a sophisticated phishing campaign, one that can bypass multi-factor authentication (MFA) in order to target Meta business accounts. The report reveals the existence of a cybercrime toolkit allowing malicious actors to create links, emails and other deployable tools. Currently, this campaign can create phishing emails in various languages and directed at 19 countries. 

These emails appear to originate from Meta, claiming that the targeted account infringed upon copyright or violated another rule. If the campaign succeeds, then the followers of the targeted business account may be at risk of targeted attacks such as malicious ads. 

Key findings from the report include: 

  • Based on credential phishing emails in 2024, Meta is the second most spoofed brand. The most spoofed brand is Microsoft. 
  • A notable amount of these phishing emails in enterprise environments are protected by secure email gateways (SEGs). 
  • The infrastructure involved in the campaign includes an ability create Netlify App links, a tool that checks if links are live, an indicators of compromise list and data on targets/financial profits. 



Source link

Posted in RSS_Virtulization Tagged business security, email spoofing, phishing campaigns, social media, social media account hack

Post navigation

Achieving CIOs’ top investment priorities requires filling the tech skills gap
Empowering Developers at Microsoft Build: Docker Unveils Integrations and Sessions | Docker

Subscribe For Updates

VMWARE

Helping Public Sector Organisations Define Cloud Strategy
October 29, 2020

Helping Public Sector Organisations Define Cloud Strategy

Introduction Cloud computing services have grown exponentially in

May 18, 2016

How to change the VLAN ID of the Service Console in ESX from the command line/console

June 09, 2015

Cisco UCS and Vmware Interfaces (Vnics) HA Design Considerations

June 07, 2015

Troubleshooting network and TCP/UDP port connectivity issues on ESX/ESXi(2020669)

May 12, 2015

vSphere Client Parameters

View All

Configuration Templates

February 16, 2015

CUE Licenses

Note: Useful LINK COPIED FROM OTHER SOURCE FOR REFERENCE INTRODUCTION

February 02, 2015

Trouble shooting Unity Express with Call Manager Integeration & Operational Issues

November 08, 2014

CME Configuration Example: SIP Trunks to Viatalk and VoIP.ms

November 08, 2014

SIP Phone registration – CME Configuration

November 08, 2014

CUE Voicemail + VPIM networking (CUE to unity)

View All

Copyright 2016. All rights reserved

Proudly powered by WordPress | Profitmag by Rigorous Themes
Love This Article? Spread It.
X
  • Tweet