• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
hackers spoof zix in credential phishing attack

Hackers spoof Zix in credential-phishing attack

You are here: Home / General Cyber Security News / Hackers spoof Zix in credential-phishing attack
September 28, 2021

Hackers have mounted a credential-phishing attack that spoofs an encrypted message notification from Zix to steal Office environment 365, Google Workspace, and Microsoft Trade information.

Security researchers from Armorblox said the attack has impacted around 75,000 users, with compact teams of cross-departmental workforce specific in each and every customer environment.

The hackers used numerous procedures to steal data, which include social engineering, brand name impersonation, replicating present workflows, push-by download, and exploiting genuine domains.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


Victims been given email messages titled “Secure Zix concept.” This email bundled a header in its body reiterating the email title and boasting the sufferer has obtained a secure message from Zix, a security technology firm that delivers email encryption and email details decline avoidance companies.

The email invitations the target to simply click on the “Message” button to perspective the safe concept. When the fake email is not a facsimile, it bears ample surface area-stage resemblance to go the unsuspecting victims’ eye assessments.

The email sender’s domain was “thefullgospelbaptist[.]com,” a religious group proven in 1994. Wanting at WhoIs details of the dad or mum domain, the area now redirects to “fullgospelbaptist[.]org.”

“It’s doable that attackers exploited a deprecated or outdated variation of this organization’s mum or dad area to deliver the destructive email messages. The email passed all authentication checks (SPF, DKIM, DMARC),” claimed researchers.

Researchers said clicking the “Message” hyperlink in the email makes an attempt to set up an HTML file named “securemessage” on the victim’s technique. Opening the file in a digital equipment (VM) wasn’t feasible since the redirect to obtain the file didn’t appear within the VM. At the time of producing, opening this HTML message just after download potential customers to a “block” web page pushed by most web page-blockers. 

The scientists mentioned a select team of employees — normally throughout departments — had been targeted inside each individual purchaser atmosphere.

“For instance, for one of our SLED consumers, folks specific by this attack involved the CFO, a Director of Functions, a Director of Marketing, and a professor. For yet another consumer, a wellness enterprise, the target staff provided the SVP of Finance and Operations, the President, and a utility email alias (member.services@business[.]com),” mentioned scientists.

Researchers included that even though the spread is seemingly randomized, attackers could also have intentionally picked their victims to be across departments so it contained a fantastic combine of senior management and person contributors.

“These employees are unlikely to connect generally with every single other when they obtain an email that appears to be like suspicious,” they extra.


Some parts of this write-up are sourced from:
www.itpro.co.uk

Previous Post: «Cyber Security News Half of Regulated Firms See Pandemic Spike in Financial Crime
Next Post: UK’s next National Cyber Strategy to reflect need for security industrial base uk’s next national cyber strategy to reflect need for security»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.