Return to offices means new opportunities for phishing


The move to home working provided new opportunities for phisherfolk, but as many people start to return to their offices the attackers are pivoting to exploit that too.

A new report from email phishing protection specialist INKY shows attacks are capitalizing on vulnerability and the desire for accurate information about returning to the office in-person.

A common tactic is to use emails that appear to come from the HR department, supposedly asking employees to take a survey about their willingness to get a COVID-19 vaccination. Other lures include messages seemingly from CEOs about compliance requests or rule changes.

"The use of dynamic algorithms that impersonate employers makes these very effective. The algorithms work by extracting features (name, domain name) from a recipient's email address and using them to create personalized phishing emails," Bukar Alibe, data analyst at INKY say . "For example, an email sent to could look like 'Hi Roger, Please review Example's new return-to-work guidance. Regards, Example HR Department'. A new phishing kit (LogoKit) uses the same tactic to retrieve a company's logo from Google's favicon database to build personalized phishing sites in real time that adapt to each victim."

Read full article: