aster.cloud aster.cloud
  • /
  • Platforms
    • Public Cloud
    • On-Premise
    • Hybrid Cloud
    • Data
  • Architecture
    • Design
    • Solutions
    • Enterprise
  • Engineering
    • Automation
    • Software Engineering
    • Project Management
    • DevOps
  • Programming
    • Learning
  • Tools
  • About
  • /
  • Platforms
    • Public Cloud
    • On-Premise
    • Hybrid Cloud
    • Data
  • Architecture
    • Design
    • Solutions
    • Enterprise
  • Engineering
    • Automation
    • Software Engineering
    • Project Management
    • DevOps
  • Programming
    • Learning
  • Tools
  • About
aster.cloud aster.cloud
  • /
  • Platforms
    • Public Cloud
    • On-Premise
    • Hybrid Cloud
    • Data
  • Architecture
    • Design
    • Solutions
    • Enterprise
  • Engineering
    • Automation
    • Software Engineering
    • Project Management
    • DevOps
  • Programming
    • Learning
  • Tools
  • About
  • People
  • Software
  • Tech

Phishers Are Posing As Contract Partners To Access Company Data

  • aster.cloud
  • September 2, 2020
  • 2 minute read

The CERT at Retarus has issued a warning regarding phishing emails in which recipients are instructed to edit important business partner contracts. The phishers pretend to make the document available on the otherwise reputable Dotloop platform, directing the recipients to a fake login page for their Microsoft account.

The fraudulent emails bear the Microsoft logo as well as Dotloop’s official email boilerplate. Dotloop is a US-based platform for conducting real estate transactions in a legally compliant manner. The phishing attack becomes apparent after the recipient has clicked on the button intended to open the contract document. The link leads to a fake Microsoft page, where victims are requested to log in using their email credentials. By looking closely at the browser’s address field, it become clear the address is not to be trusted.


Partner with aster.cloud
for your next big idea.
Let us know here.



From our partners:

CITI.IO :: Business. Institutions. Society. Global Political Economy.
CYBERPOGO.COM :: For the Arts, Sciences, and Technology.
DADAHACKS.COM :: Parenting For The Rest Of Us.
ZEDISTA.COM :: Entertainment. Sports. Culture. Escape.
TAKUMAKU.COM :: For The Hearth And Home.
ASTER.CLOUD :: From The Cloud And Beyond.
LIWAIWAI.COM :: Intelligence, Inside and Outside.
GLOBALCLOUDPLATFORMS.COM :: For The World's Computing Needs.
FIREGULAMAN.COM :: For The Fire In The Belly Of The Coder.
ASTERCASTER.COM :: Supra Astra. Beyond The Stars.
BARTDAY.COM :: Prosperity For Everyone.

Phishing

“With this password, users are not only granting access to their emails,” underlines Martin Mathlouthi, Product Line Manager Secure Email Platform at Retarus. “As single sign-on is commonplace, this is also likely to be the password for the active directory, allowing the phishers to gain access to other critical company data.”

Avoid online fraud

These phishing mails currently in circulation confirm a trend that security experts at Retarus had already been observing. Poorly designed phishing mails with long, cryptic links and clumsy instructions in error-ridden English are now a thing of the past. The new generation of phishing emails are technically sophisticated, well-formulated, and professionally designed. The shape-shifting scammers disguise themselves as colleagues, supervisors, and business associates, even addressing their victims in the name of official institutions, renowned financial service providers, and online portals.

The Retarus’ Anti-Phishing Guide, which is available for free download, details how employees can best protect themselves from phishing emails (even when working from home), which details to use to recognize well-crafted fraudulent emails, and the best practices for when it is unclear if a message is genuineThe analysts at Forrester also describe what to look out for in an anti-phishing service, and outline the various methods commonly used to defend against phishing in their Now Tech: Antiphishing Solutions, Q1 2019 report.

 

Advanced Threat Protection

Retarus’ Secure Email Platform provides comprehensive protection, even from highly deceptive phishing emails, by virtue of its Advanced Threat Protection. This includes Time of Click Protection, which checks links contained in emails in real time and effectively blocks phishing websites.

Retarus Time of Click Protection

 

About Retarus

With its outstanding solutions and services, intelligent infrastructure, and patented technology, Retarus manages communication for companies worldwide. Retarus’ state-of-the-art technologies, highly available data centers, and innovative cloud messaging platform offer maximum security, maximum performance, and business continuity. With experience in steering information flows at the enterprise level, Retarus ensures that information is transferred securely and reliably to the right place, at the right time, in the right format—since 1992 and with now 15 subsidiaries on four continents. 25 percent of S&P100 companies as well as numerous Fortune 500 companies in the banking, finance and healthcare sectors rely on Retarus’ services. Longstanding customers include Adidas, Amer Sports, athenahealth, Bayer, BNP Paribas, Bosch, Continental, Cubic Corporation, DHL, Fujitsu, Geico, Goldman Sachs, John Deere, J.P.Morgan, LabCorp, Merck, Petronas, PSA, Sony, and Zeiss.

Read More  We Deserve Better Politicians! Then. Now. Ever. We Are Fools To Still Believe.

For enquiries, product placements, sponsorships, and collaborations, connect with us at [email protected]. We'd love to hear from you!

Our humans need coffee too! Your support is highly appreciated, thank you!

aster.cloud

Related Topics
  • Anti-phishing
  • Cybersecurity
  • Dotloop
  • Email
  • Fraud
  • Phishing
  • Retarus
You May Also Like
View Post
  • Featured
  • People

Conclave: How A New Pope Is Chosen

  • April 25, 2025
Getting things done makes her feel amazing
View Post
  • Computing
  • Data
  • Featured
  • Learning
  • Tech
  • Technology

Nurturing Minds in the Digital Revolution

  • April 25, 2025
View Post
  • People
  • Technology

AI is automating our jobs – but values need to change if we are to be liberated by it

  • April 17, 2025
View Post
  • Software
  • Technology

Canonical Releases Ubuntu 25.04 Plucky Puffin

  • April 17, 2025
View Post
  • Software
  • Technology

IBM Accelerates Momentum in the as a Service Space with Growing Portfolio of Tools Simplifying Infrastructure Management

  • March 27, 2025
View Post
  • Tech

Deep dive into AI with Google Cloud’s global generative AI roadshow

  • February 18, 2025
Volvo Group: Confidently ahead at CES
View Post
  • Tech

Volvo Group: Confidently ahead at CES

  • January 8, 2025
zedreviews-ces-2025-social-meta
View Post
  • Featured
  • Gears
  • Tech
  • Technology

What Not to Miss at CES 2025

  • January 6, 2025

Stay Connected!
LATEST
  • 1
    Just make it scale: An Aurora DSQL story
    • May 29, 2025
  • 2
    Reliance on US tech providers is making IT leaders skittish
    • May 28, 2025
  • Examine the 4 types of edge computing, with examples
    • May 28, 2025
  • AI and private cloud: 2 lessons from Dell Tech World 2025
    • May 28, 2025
  • 5
    TD Synnex named as UK distributor for Cohesity
    • May 28, 2025
  • Weigh these 6 enterprise advantages of storage as a service
    • May 28, 2025
  • 7
    Broadcom’s ‘harsh’ VMware contracts are costing customers up to 1,500% more
    • May 28, 2025
  • 8
    Pulsant targets partner diversity with new IaaS solution
    • May 23, 2025
  • 9
    Growing AI workloads are causing hybrid cloud headaches
    • May 23, 2025
  • Gemma 3n 10
    Announcing Gemma 3n preview: powerful, efficient, mobile-first AI
    • May 22, 2025
about
Hello World!

We are aster.cloud. We’re created by programmers for programmers.

Our site aims to provide guides, programming tips, reviews, and interesting materials for tech people and those who want to learn in general.

We would like to hear from you.

If you have any feedback, enquiries, or sponsorship request, kindly reach out to us at:

[email protected]
Most Popular
  • 1
    Cloud adoption isn’t all it’s cut out to be as enterprises report growing dissatisfaction
    • May 15, 2025
  • 2
    Hybrid cloud is complicated – Red Hat’s new AI assistant wants to solve that
    • May 20, 2025
  • 3
    Google is getting serious on cloud sovereignty
    • May 22, 2025
  • oracle-ibm 4
    Google Cloud and Philips Collaborate to Drive Consumer Marketing Innovation and Transform Digital Asset Management with AI
    • May 20, 2025
  • notta-ai-header 5
    Notta vs Fireflies: Which AI Transcription Tool Deserves Your Attention in 2025?
    • May 16, 2025
  • /
  • Technology
  • Tools
  • About
  • Contact Us

Input your search keywords and press Enter.