aster.cloud aster.cloud
  • /
  • Platforms
    • Public Cloud
    • On-Premise
    • Hybrid Cloud
    • Data
  • Architecture
    • Design
    • Solutions
    • Enterprise
  • Engineering
    • Automation
    • Software Engineering
    • Project Management
    • DevOps
  • Programming
    • Learning
  • Tools
  • About
  • /
  • Platforms
    • Public Cloud
    • On-Premise
    • Hybrid Cloud
    • Data
  • Architecture
    • Design
    • Solutions
    • Enterprise
  • Engineering
    • Automation
    • Software Engineering
    • Project Management
    • DevOps
  • Programming
    • Learning
  • Tools
  • About
aster.cloud aster.cloud
  • /
  • Platforms
    • Public Cloud
    • On-Premise
    • Hybrid Cloud
    • Data
  • Architecture
    • Design
    • Solutions
    • Enterprise
  • Engineering
    • Automation
    • Software Engineering
    • Project Management
    • DevOps
  • Programming
    • Learning
  • Tools
  • About
  • People
  • Software
  • Tech

Phishers Are Posing As Contract Partners To Access Company Data

  • aster_cloud
  • September 2, 2020
  • 2 minute read

The CERT at Retarus has issued a warning regarding phishing emails in which recipients are instructed to edit important business partner contracts. The phishers pretend to make the document available on the otherwise reputable Dotloop platform, directing the recipients to a fake login page for their Microsoft account.

The fraudulent emails bear the Microsoft logo as well as Dotloop’s official email boilerplate. Dotloop is a US-based platform for conducting real estate transactions in a legally compliant manner. The phishing attack becomes apparent after the recipient has clicked on the button intended to open the contract document. The link leads to a fake Microsoft page, where victims are requested to log in using their email credentials. By looking closely at the browser’s address field, it become clear the address is not to be trusted.


Partner with aster.cloud
for your next big idea.
Let us know here.



From our partners:

CITI.IO :: Business. Institutions. Society. Global Political Economy.
CYBERPOGO.COM :: For the Arts, Sciences, and Technology.
DADAHACKS.COM :: Parenting For The Rest Of Us.
ZEDISTA.COM :: Entertainment. Sports. Culture. Escape.
TAKUMAKU.COM :: For The Hearth And Home.
ASTER.CLOUD :: From The Cloud And Beyond.
LIWAIWAI.COM :: Intelligence, Inside and Outside.
GLOBALCLOUDPLATFORMS.COM :: For The World's Computing Needs.
FIREGULAMAN.COM :: For The Fire In The Belly Of The Coder.
ASTERCASTER.COM :: Supra Astra. Beyond The Stars.
BARTDAY.COM :: Prosperity For Everyone.

Phishing

“With this password, users are not only granting access to their emails,” underlines Martin Mathlouthi, Product Line Manager Secure Email Platform at Retarus. “As single sign-on is commonplace, this is also likely to be the password for the active directory, allowing the phishers to gain access to other critical company data.”

Avoid online fraud

These phishing mails currently in circulation confirm a trend that security experts at Retarus had already been observing. Poorly designed phishing mails with long, cryptic links and clumsy instructions in error-ridden English are now a thing of the past. The new generation of phishing emails are technically sophisticated, well-formulated, and professionally designed. The shape-shifting scammers disguise themselves as colleagues, supervisors, and business associates, even addressing their victims in the name of official institutions, renowned financial service providers, and online portals.

The Retarus’ Anti-Phishing Guide, which is available for free download, details how employees can best protect themselves from phishing emails (even when working from home), which details to use to recognize well-crafted fraudulent emails, and the best practices for when it is unclear if a message is genuineThe analysts at Forrester also describe what to look out for in an anti-phishing service, and outline the various methods commonly used to defend against phishing in their Now Tech: Antiphishing Solutions, Q1 2019 report.

 

Advanced Threat Protection

Retarus’ Secure Email Platform provides comprehensive protection, even from highly deceptive phishing emails, by virtue of its Advanced Threat Protection. This includes Time of Click Protection, which checks links contained in emails in real time and effectively blocks phishing websites.

Retarus Time of Click Protection

 

About Retarus

With its outstanding solutions and services, intelligent infrastructure, and patented technology, Retarus manages communication for companies worldwide. Retarus’ state-of-the-art technologies, highly available data centers, and innovative cloud messaging platform offer maximum security, maximum performance, and business continuity. With experience in steering information flows at the enterprise level, Retarus ensures that information is transferred securely and reliably to the right place, at the right time, in the right format—since 1992 and with now 15 subsidiaries on four continents. 25 percent of S&P100 companies as well as numerous Fortune 500 companies in the banking, finance and healthcare sectors rely on Retarus’ services. Longstanding customers include Adidas, Amer Sports, athenahealth, Bayer, BNP Paribas, Bosch, Continental, Cubic Corporation, DHL, Fujitsu, Geico, Goldman Sachs, John Deere, J.P.Morgan, LabCorp, Merck, Petronas, PSA, Sony, and Zeiss.

Read More  Apple's $50 Billion Bycatch

For enquiries, product placements, sponsorships, and collaborations, connect with us at [email protected]. We'd love to hear from you!

Our humans need coffee too! Your support is highly appreciated, thank you!

aster_cloud

Related Topics
  • Anti-phishing
  • Cybersecurity
  • Dotloop
  • Email
  • Fraud
  • Phishing
  • Retarus
You May Also Like
Coffee | Laptop | Notebook | Work
View Post
  • People

First HP Work Relationship Index Shows Majority of People Worldwide Have an Unhealthy Relationship with Work

  • September 20, 2023
View Post
  • Gears
  • Tech

Apple introduces the advanced new Apple Watch Series 9

  • September 12, 2023
View Post
  • Software
  • Technology

Series Of Events Will Highlight Generative AI Use Cases Powered By Open Source Software

  • September 6, 2023
Internet of Things
View Post
  • Software
  • Technology

OpenHW Group Announces Tape Out of RISC-V-Based CORE-V MCU Development Kit for IoT Built with Open-Source Hardware & Software

  • August 16, 2023
View Post
  • Software
  • Software Engineering

End-to-End Secure Evaluation of Code Generation Models

  • August 11, 2023
Autonomous systems need to be reliable, so NASA puts the code it develops through rigorous testing, like this Artemis I launch countdown training simulation, to avoid potential failures.
View Post
  • Software
  • Technology

NASA Software Catalog Offers Free Programs for Earth Science, More

  • August 10, 2023
White House
View Post
  • Software
  • Technology

Biden-⁠Harris Administration Launches Artificial Intelligence Cyber Challenge to Protect America’s Critical Software

  • August 9, 2023
View Post
  • Software
  • Software Engineering

Simplifying Creation Of Go Applications On Google Cloud

  • August 6, 2023

Stay Connected!
LATEST
  • OpenAI 1
    How We Interact With Information: The New Era Of Search
    • September 28, 2023
  • 2
    Bring AI To Looker With The Machine Learning Accelerator
    • September 28, 2023
  • 3
    How ‘Anything Is Possible’ Automated Data Pipelines With BigQuery And Windsor.ai
    • September 27, 2023
  • 4
    Artificial Intelligence, AI, Generative AI, Mercy, Azure OpenAI Service,
    • September 27, 2023
  • 5
    Oracle CloudWorld 2023: 6 Key Takeaways From The Big Annual Event
    • September 25, 2023
  • 6
    Nvidia H100 Tensor Core GPUs Come To Oracle Cloud
    • September 24, 2023
  • 7
    Combining AI With A Trusted Data Approach On IBM Power To Fuel Business Outcomes
    • September 21, 2023
  • 8
    Start Your Ubuntu Confidential VM With Intel® TDX On Google Cloud
    • September 20, 2023
  • Microsoft and Adobe 9
    Microsoft And Adobe Partner To Deliver Cost Savings And Business Benefits
    • September 20, 2023
  • Coffee | Laptop | Notebook | Work 10
    First HP Work Relationship Index Shows Majority of People Worldwide Have an Unhealthy Relationship with Work
    • September 20, 2023
about
Hello World!

We are aster.cloud. We’re created by programmers for programmers.

Our site aims to provide guides, programming tips, reviews, and interesting materials for tech people and those who want to learn in general.

We would like to hear from you.

If you have any feedback, enquiries, or sponsorship request, kindly reach out to us at:

[email protected]
Most Popular
  • 1
    Oracle Expands Distributed Cloud Offerings to Help Organizations Innovate Anywhere
    • September 20, 2023
  • 2
    Huawei Connect 2023: Accelerating Intelligence For Shared Success
    • September 20, 2023
  • 3
    Huawei Releases Data Center 2030, Leading Innovation and Development of New Data Centers
    • September 20, 2023
  • Penguin 4
    How To Find And Fix Broken Packages On Linux
    • September 19, 2023
  • Volkswagen 5
    Volkswagen Races Toward Next-Gen Automotive Manufacturing Leadership With Google Cloud And T-Systems
    • September 19, 2023
  • /
  • Technology
  • Tools
  • About
  • Contact Us

Input your search keywords and press Enter.