aster.cloud aster.cloud
  • /
  • Platforms
    • Public Cloud
    • On-Premise
    • Hybrid Cloud
    • Data
  • Architecture
    • Design
    • Solutions
    • Enterprise
  • Engineering
    • Automation
    • Software Engineering
    • Project Management
    • DevOps
  • Programming
  • Tools
  • About
aster.cloud aster.cloud
  • /
  • Platforms
    • Public Cloud
    • On-Premise
    • Hybrid Cloud
    • Data
  • Architecture
    • Design
    • Solutions
    • Enterprise
  • Engineering
    • Automation
    • Software Engineering
    • Project Management
    • DevOps
  • Programming
  • Tools
  • About
  • People
  • Software
  • Tech

Phishers Are Posing As Contract Partners To Access Company Data

  • relay
  • September 2, 2020
  • 2 minute read

The CERT at Retarus has issued a warning regarding phishing emails in which recipients are instructed to edit important business partner contracts. The phishers pretend to make the document available on the otherwise reputable Dotloop platform, directing the recipients to a fake login page for their Microsoft account.

The fraudulent emails bear the Microsoft logo as well as Dotloop’s official email boilerplate. Dotloop is a US-based platform for conducting real estate transactions in a legally compliant manner. The phishing attack becomes apparent after the recipient has clicked on the button intended to open the contract document. The link leads to a fake Microsoft page, where victims are requested to log in using their email credentials. By looking closely at the browser’s address field, it become clear the address is not to be trusted.

Phishing

“With this password, users are not only granting access to their emails,” underlines Martin Mathlouthi, Product Line Manager Secure Email Platform at Retarus. “As single sign-on is commonplace, this is also likely to be the password for the active directory, allowing the phishers to gain access to other critical company data.”

Avoid online fraud

These phishing mails currently in circulation confirm a trend that security experts at Retarus had already been observing. Poorly designed phishing mails with long, cryptic links and clumsy instructions in error-ridden English are now a thing of the past. The new generation of phishing emails are technically sophisticated, well-formulated, and professionally designed. The shape-shifting scammers disguise themselves as colleagues, supervisors, and business associates, even addressing their victims in the name of official institutions, renowned financial service providers, and online portals.

The Retarus’ Anti-Phishing Guide, which is available for free download, details how employees can best protect themselves from phishing emails (even when working from home), which details to use to recognize well-crafted fraudulent emails, and the best practices for when it is unclear if a message is genuineThe analysts at Forrester also describe what to look out for in an anti-phishing service, and outline the various methods commonly used to defend against phishing in their Now Tech: Antiphishing Solutions, Q1 2019 report.

 

Advanced Threat Protection

Retarus’ Secure Email Platform provides comprehensive protection, even from highly deceptive phishing emails, by virtue of its Advanced Threat Protection. This includes Time of Click Protection, which checks links contained in emails in real time and effectively blocks phishing websites.

Retarus Time of Click Protection

 

About Retarus

With its outstanding solutions and services, intelligent infrastructure, and patented technology, Retarus manages communication for companies worldwide. Retarus’ state-of-the-art technologies, highly available data centers, and innovative cloud messaging platform offer maximum security, maximum performance, and business continuity. With experience in steering information flows at the enterprise level, Retarus ensures that information is transferred securely and reliably to the right place, at the right time, in the right format—since 1992 and with now 15 subsidiaries on four continents. 25 percent of S&P100 companies as well as numerous Fortune 500 companies in the banking, finance and healthcare sectors rely on Retarus’ services. Longstanding customers include Adidas, Amer Sports, athenahealth, Bayer, BNP Paribas, Bosch, Continental, Cubic Corporation, DHL, Fujitsu, Geico, Goldman Sachs, John Deere, J.P.Morgan, LabCorp, Merck, Petronas, PSA, Sony, and Zeiss.

Read More  Google Cloud’s Security And Resiliency Measures For Customers And Partners
relay

Related Topics
  • Anti-phishing
  • Cybersecurity
  • Dotloop
  • Email
  • Fraud
  • Phishing
  • Retarus
You May Also Like
View Post
  • Software
  • Software Engineering
  • Tools

How To Use Bash

  • March 17, 2023
View Post
  • People

Financial Crisis: It’s A Game & We’re All Being Played

  • March 16, 2023
View Post
  • Software
  • Technology

Own Your Cloud With NextcloudPi On The Raspberry Pi

  • March 16, 2023
View Post
  • Engineering
  • People
  • Software Engineering

A Guide To Managing Your Agile Engineering Team

  • March 15, 2023
View Post
  • Engineering
  • People

10 Ways Wikimedia Does Developer Advocacy

  • March 15, 2023
View Post
  • Software
  • Software Engineering

Python 3.12.0 Alpha 6 Released

  • March 15, 2023
mobile-laptop-developer-christina-wocintechchat-com-UTw3j_aoIKM-unsplash
View Post
  • Data
  • Software
  • Solutions

Build Customer Trust Through Secure Front End App Development & Cyber Security

  • March 14, 2023
View Post
  • People
  • Platforms
  • Technology

Women’s History Month: Celebrating The Success Of Women Founders: Schoolio

  • March 14, 2023

Stay Connected!
LATEST
  • 1
    Monitor Kubernetes Cloud Costs With Open Source Tools
    • March 20, 2023
  • 2
    What Is An Edge-Native Application?
    • March 20, 2023
  • 3
    Eclipse Java Downloads Skyrocket
    • March 19, 2023
  • 4
    How To Use Bash
    • March 17, 2023
  • 5
    Why Is Your Multicloud So Slow?
    • March 17, 2023
  • 6
    The Benefits And Core Processes Of Data Wrangling
    • March 17, 2023
  • 7
    We Cannot Even Agree On Dates…
    • March 16, 2023
  • 8
    Financial Crisis: It’s A Game & We’re All Being Played
    • March 16, 2023
  • 9
    Ballerina: A Programming Language For The Cloud
    • March 16, 2023
  • 10
    Own Your Cloud With NextcloudPi On The Raspberry Pi
    • March 16, 2023
about
Hello World!

We are aster.cloud. We’re created by programmers for programmers.

Our site aims to provide guides, programming tips, reviews, and interesting materials for tech people and those who want to learn in general.

We would like to hear from you.

If you have any feedback, enquiries, or sponsorship request, kindly reach out to us at:

[email protected]
Most Popular
  • 1
    Oxford Quantum Circuits Installing Quantum Computer in Equinix IBX® Data Center With Plans To Open Access to Businesses Globally
    • March 14, 2023
  • 2
    The Adoptium Working Group Reports Significant Momentum for Open Source Java in 2023
    • March 14, 2023
  • 3
    Cloudflare Integrates With Atlassian, Microsoft, And Sumo Logic To Make Zero Trust Security Easy For Businesses
    • March 14, 2023
  • 4
    Cloudflare Uses The Power Of Its Global Network To Identify The Top 50 Most Impersonated Brands And Protect Zero Trust Customers From Phishing Scams
    • March 13, 2023
  • 5
    Open Source Software Leader The Eclipse Foundation Previews Its Showcase At Embedded World 2023
    • March 8, 2023
  • /
  • Platforms
  • Architecture
  • Engineering
  • Programming
  • Tools
  • About

Input your search keywords and press Enter.