www.imsnetworking.com Open in urlscan Pro
34.212.78.156  Public Scan

Submitted URL: http://www.imsnetworking.com/2021/03/18/hacker-uses-zoom-invites-to-steal-credentials-through-sendgrid
Effective URL: https://www.imsnetworking.com/2021/03/18/hacker-uses-zoom-invites-to-steal-credentials-through-sendgrid/
Submission: On January 24 via api from US — Scanned from US

Form analysis 1 forms found in the DOM

POST https://ck368.infusionsoft.com/app/form/process/a69f134ca3f70dbd024af20c56cf1257

<form accept-charset="UTF-8" action="https://ck368.infusionsoft.com/app/form/process/a69f134ca3f70dbd024af20c56cf1257" class="infusion-form" id="inf_form_a69f134ca3f70dbd024af20c56cf1257" method="POST" cr-attached="true">
  <input name="inf_form_xid" type="hidden" value="a69f134ca3f70dbd024af20c56cf1257">
  <input name="inf_form_name" type="hidden" value="21 QUESTIONS FREE REPORT&amp;#a;OPT-IN WEB FORM">
  <input name="infusionsoft_version" type="hidden" value="1.70.0.607562">
  <div class="infusion-field">
    <label for="inf_field_FirstName">First Name *</label>
    <input id="inf_field_FirstName" name="inf_field_FirstName" placeholder="First Name *" type="text">
  </div>
  <div class="infusion-field">
    <label for="inf_field_LastName">Last Name *</label>
    <input id="inf_field_LastName" name="inf_field_LastName" placeholder="Last Name *" type="text">
  </div>
  <div class="infusion-field">
    <label for="inf_field_Company">Company</label>
    <input id="inf_field_Company" name="inf_field_Company" placeholder="Company" type="text">
  </div>
  <div class="infusion-field">
    <label for="inf_field_Email">Email *</label>
    <input id="inf_field_Email" name="inf_field_Email" placeholder="Email *" type="text">
  </div>
  <div class="infusion-field">
    <label for="inf_field_Phone1">Main Company Phone</label>
    <input id="inf_field_Phone1" name="inf_field_Phone1" placeholder="Main Company Phone" type="text">
  </div>
  <div class="infusion-field checkedagreewrapper">
    <span class="infusion-checkbox">
      <input id="inf_option_IAgreeThatIAmAnArtificialBeing" name="inf_option_IAgreeThatIAmAnArtificialBeing" type="checkbox" value="1471">
      <label class="infusion-field-label-container infusion-label-checkbox" for="inf_option_IAgreeThatIAmAnArtificialBeing">I Agree That I Am An Artificial Being.</label>
    </span>
  </div>
  <div class="infusion-field checkedagreewrapper">
    <span class="infusion-checkbox">
      <input id="inf_option_YesSignmeupfortheHoneypot" name="inf_option_YesSignmeupfortheHoneypot" type="checkbox" value="1985">
      <label class="infusion-field-label-container infusion-label-checkbox" for="inf_option_YesSignmeupfortheHoneypot">Yes! Sign me up for the Honeypot!</label>
    </span>
  </div>
  <div>
    <div></div>
  </div>
  <div class="infusion-submit">
    <button type="submit">Submit</button>
  </div>
  <input type="hidden" id="timeZone" name="timeZone" value="Pacific/Honolulu">
</form>

Text Content

 * Is This You?
 * Services
   * Technology Solutions
   * Data Backup and Recovery
   * Network Security
   * VoIP Services
   * Cyber Security
 * Why Choose Us?
 * Our Clients
 * Blog
 * About Us
   * Referral Program
   * Newsletter Archive
   * Tech Tip Archive
 * Contact Us
 * Support
   * Online Payment
 * 701-409-2623

 * Is This You?
 * Services ►
   * Technology Solutions
   * Data Backup and Recovery
   * Network Security
   * VoIP Services
   * Cyber Security
 * Why Choose Us?
 * Our Clients
 * Blog
 * About Us ►
   * Referral Program
   * Newsletter Archive
   * Tech Tip Archive
 * Contact Us
 * Support ►
   * Online Payment
 * 701-409-2623


IT Support For Minnesota, North Dakota & South Dakota
 * 701-409-2623
 * 701-409-2623

 * Is This You?
 * Services
   * Technology Solutions
   * Data Backup and Recovery
   * Network Security
   * VoIP Services
   * Cyber Security
 * Why Choose Us?
 * Our Clients
 * Blog
 * About Us
   * Referral Program
   * Newsletter Archive
   * Tech Tip Archive
 * Contact Us
 * Support
   * Online Payment
 * 701-409-2623



BLOG


HACKER USES ZOOM INVITES TO STEAL CREDENTIALS THROUGH SENDGRID

Posted by imsnetworking On March 18, 2021
Share

There's a mix of bad news and good in the ongoing war against the hackers of the
world.

For the bad news, security professionals have recently detected a sophisticated
phishing campaign that makes use of SendGrid and convincing replicas of Outlook
on the Web and Office 365 logins to harvest credentials.

The attack works like this: SendGrid is a trusted SMTP provider, so by sending
their emails through this channel, it's more likely that those messages will
reach their intended targets and not be blocked by built in email security
protocols.

The emails the group is sending are typically Zoom invitations, though
invariably, once a user clicks on the link, they're forced to jump through a few
hoops and end up at a convincing login page for Outlook on the Web or Office
365. These pages are fake, of course, and any user who attempts to log in is
merely handing their login credentials over to the hackers, who have collected
an estimated 400,000 user names and passwords using this technique.

From there, the sky's the limit. Armed with working user name and password
combinations, the hackers behind the phishing campaign can log into a user's
account and use that as a springboard to inject malicious code onto a target's
system with pretty much any payload that the hackers desire.

The group behind all of this has been dubbed "Compact," and it's clear by the
design of the attack that they are a technically sophisticated bunch. Having
said that, there is some good news to report as well. As tech savvy as the
attackers are, they made a mistake and misconfigured an exfiltration script. It
has allowed security researchers to download multiple copies of the exfiltration
code, revealing a tremendous number of details about the group's inner workings.

It's likely to provide a short term victory for security professionals around
the world, as they'll likely be able to shut down large swaths of Compact's
operation. However, the group will no doubt learn from their mistake and after
going away for a time to lick their wounds, they'll no doubt be back, and more
dangerous than ever.

Used with permission from Article Aggregator





RELATED POSTS


 * MICROSOFT STOPPED HACKERS USING GIFS TO ACCESS USER DATA
   
   


 * DARK MODE ON ANDROID PHONES EXTENDS BATTERY LIFE
   
   


 * FAX MACHINES MIGHT BE GATEWAY TO NEXT HACKER ATTACK
   
   


 * BOOST YOUR SECURITY: BE AWARE OF THIRD-PARTY COOKIE RISKS
   
   


 * WHEN YOUR FACEBOOK OR OTHER ONLINE ACCOUNT GETS HACKED, WHO’S RESPONSIBLE FOR
   THE LOSSES?
   
   

Schedule a 15-Minute Discovery Call

FREE REPORT

6 CRITICAL CYBER SECURITY PROTECTIONS EVERY BUSINESS MUST HAVE IN PLACE NOW TO
AVOID BEING HACKED



If You Depend On Your Computer Network To Run Your Business, This Is One Report
You DON’T Want To Overlook!

First Name *
Last Name *
Company
Email *
Main Company Phone
I Agree That I Am An Artificial Being.
Yes! Sign me up for the Honeypot!

Submit



CONTACT

Information Management Systems $$$
 * 303 14th Street North
   Fargo, ND 58102
 * Phone: 701-409-2623
 * Phone: 701-409-2623
 * Email: info@imsnetworking.com

LATEST ARTICLES

THE DANGERS OF DATA BREACHES

January 23rd, 2024

CYBERSQUATTING

January 23rd, 2024

SOCIAL MEDIA

FacebookTwitterLinkedInYouTube



© Copyright 2024 Information Management Systems
Icons made by Scott de Jonge from www.flaticon.com is licensed by CC 3.0 BY