Phishing. It seems you can’t read an article on cybersecurity without it coming up. That’s because phishing is still the number one delivery vehicle for cyberattacks.
80% of surveyed security professionals say that phishing campaigns have significantly increased post-pandemic. Phishing not only continues to work, but it’s also increasing in volume due to the move to remote teams.
Many employees are now working from home. They don’t have the same network protections they had when working at the office.
One of the newest tactics is particularly hard to detect. It is the reply-chain phishing attack.
What is a Reply-Chain phishing attack?
You don’t expect a phishing email tucked inside an ongoing email conversation between colleagues. Most people are expecting phishing to come in as a new message, not a message included in an existing reply chain.
The reply-chain phishing attack is particularly insidious because it does exactly that. It inserts a convincing phishing email in the ongoing thread of an email reply chain.
How does a hacker gain access to the reply chain conversation? By hacking the email account of one of those people copied on the email chain.
The hacker can email from an email address that the other recipients recognize and trust. The attacker also gains the benefit of reading down through the chain of replies. This enables them to craft a response that looks like it fits.
They may see that everyone has been weighing in on a new product idea for a product called Superbug. So, they send a reply that says, “I’ve drafted up some thoughts on the new Superbug product, here’s a link to see them.”
The reply won’t seem like a phishing email at all. It will be convincing because:
• It comes from an email address of a colleague. This address has already been participating in the email conversation.
• It may sound natural and reference items in the discussion.
• It may use personalization. The email can call others by the names the hacker has seen in the reply chain.
Business Email Compromise is Increasing Business email compromise (BEC) is so common that it now has its own acronym.
Weak and unsecured passwords lead to email breaches. So do data breaches that reveal databases full of user logins.
Tips for addressing reply-chain phishing
Here are some ways that you can lessen the risk of reply-chain phishing in your organization:
• Use a business password manager
• Put multi-factor controls on email accounts
• Teach employees to be aware
If you are unsure of a text, email or message someone has sent you, please do not open it! Give us a call today so we can assess your concerns.