Key Points
What you'll learn in this notification
- Predominately targeting Legal, Retail and Manufacturing businesses in the US
- Campaigns are distributed via AWS SES sent via a python mailer
- The primary intent is for credential harvesting
Threat actors are encouraging users to interact with malformed links via email copy and paste, evading detection by security solutions. Mimecast Threat Researchers have identified lures with broken links and text urging users to paste the link into their browser's address bar. The email uses a payment file share lure, making the 'View File' button unclickable, forcing users to click on the link at the bottom.
Please click here to read the entire article.
We welcome your questions; please ask them by posting a comment below.
Dimakatso Makinta