logo
CyberVision
logo
  • Home
  • About
  • Solutions
    • WithSecure Corporate
    • F-Secure Consumer
  • Resources
    • Articles
    • Cybervision Humour
    • eBooks
    • Glossary of Terms
    • ID Theft Checker
    • Infographics
    • Local Threats
    • Useful links
    • Useful online security tips
    • Videos
    • Webinars
    • Whitepapers
  • Press
    • Newsletters
      • Cyber Security Bulletin
      • Cybervision Partner Newsletter
    • Local News
    • International News
  • Threats
  • POPIA
    • FAQ’s
    • Use RADAR to help comply
  • Contact
  • Blog
Business Security
5th July 2019 by CyberVision 0 Comments 1017 Views
5th July 2019 by CyberVision in Business Security

The dangers of impersonation attacks

Impersonation attacks are emails that attempt to impersonate a trusted individual or company to gain access to corporate finances or data and are typically done using phishing (or spearphishing when it’s targeted at one particular individual). Email impersonation attacks are usually designed to trick recipients into making fraudulent financial transactions by pretending to be from someone they’re not.

 

Other malicious attacks that takes place through impersonation attacks include:

  • Clicking on hyperlinks to take over the victim’s computer and/or stealing user credentials to facilitate fraud.
  • Opening a file attachment to install ransomware on the victim’s computer to encrypt all files on the victim’s internal network in order to hold them for ransom.

 

Social networking sites have unbitentionally facilitated these forms of social engineering attacks and  cyber criminals are taking advantage of websites such as Facebook and LinkedIn to create lists of company employees and gather detailed information. This increases the credibility of their attacks.

 

Email impersonation can be accomplished in two ways: domain name spoofing and display name spoofing. With domain name spoofing, attackers send an email from a domain that looks like the real domain but has some nearly imperceptible differences. With display name spoofing, attackers send an email from any domain, usually a free one, but replace the “display name” with the name of an associate or authorised signer on an account. This attack is effective because most emails, especially mobile ones, only show the display name and not the ‘from’ address. Most email recipients don’t look very closely at this ’from’ email address and social engineering takes full advantage of that.

 

To counter these attacks, one should educate and inform employees about the specific dangers around email impersonation attacks. Users should also be trained on how to recognise impersonation emails and avoid falling victim to them. One should always be suspicious of unsolicited messages. If an email appears from a genuine company, do your research and use a search engine to visit their website or a phone directory to find their phone number, rather than clicking on links.

Then go a step further to make faking messages from your business difficult by using customised stationery and unique identifiers in messages to make it challenging for cyber-thieves to copy. Companies should invest in advanced email gateway technology to identify and quarantine suspicious messages through names, domains and keywords. Installing anti-virus and anti-malware software, firewalls and email filters will also keep these features up-to-date.

Social engineering attacks are on the rise. Through a combination of awareness, technology and better internal systems and processes, it is possible to reduce the risks and protect your business from financial and data loss.

 

0
Recommend
  • Facebook
  • Twitter
  • LinkedIN
  • Pinterest
Share
  • camsoft cyber security
  • cybervision
  • f-secure
  • impersonation attacks
  • phishing
  • social engineering
  • spoofing
Tagged in

Categories

  • Business
  • Business Security
  • F-Secure
  • F-Secure Life
  • Home Security
  • IoT & Technology
  • Online Marketing
  • Real life
  • Tech
  • Threats & Research

Recent Posts

  • F-Secure rises to 3rd Most Attractive Company for IT Students
  • F-Secure R&D discovers exploitable vulnerability in Apple’s macOS Gatekeeper
  • VMware vulnerability puts even more pressure on organizations relying on remote work
  • The cyber security risks of working from home
  • If your company data is breached, should you pay a ransom?

Archives

  • May 2021
  • April 2021
  • December 2020
  • April 2020
  • November 2019
  • October 2019
  • September 2019
  • August 2019
  • July 2019
  • June 2019
  • May 2019
  • April 2019
  • March 2019
  • February 2019
  • January 2019
  • December 2018
  • November 2018
  • October 2018
  • September 2018
  • August 2018
  • July 2018
  • June 2018
  • May 2018
  • April 2018
  • March 2018
  • February 2018
  • January 2018
  • December 2017
  • November 2017
  • October 2017
  • September 2017
  • August 2017
  • July 2017
  • June 2017
  • March 2015
  • February 2015

© CyberVision PTY Ltd | 2025 | All Rights Reserved.

View our Privacy Policy and Terms of Service.

logo