www.imsnetworking.com
Open in
urlscan Pro
34.212.78.156
Public Scan
Submitted URL: http://www.imsnetworking.com/2021/03/18/hacker-uses-zoom-invites-to-steal-credentials-through-sendgrid
Effective URL: https://www.imsnetworking.com/2021/03/18/hacker-uses-zoom-invites-to-steal-credentials-through-sendgrid/
Submission: On January 24 via api from US — Scanned from US
Effective URL: https://www.imsnetworking.com/2021/03/18/hacker-uses-zoom-invites-to-steal-credentials-through-sendgrid/
Submission: On January 24 via api from US — Scanned from US
Form analysis
1 forms found in the DOMPOST https://ck368.infusionsoft.com/app/form/process/a69f134ca3f70dbd024af20c56cf1257
<form accept-charset="UTF-8" action="https://ck368.infusionsoft.com/app/form/process/a69f134ca3f70dbd024af20c56cf1257" class="infusion-form" id="inf_form_a69f134ca3f70dbd024af20c56cf1257" method="POST" cr-attached="true">
<input name="inf_form_xid" type="hidden" value="a69f134ca3f70dbd024af20c56cf1257">
<input name="inf_form_name" type="hidden" value="21 QUESTIONS FREE REPORT&#a;OPT-IN WEB FORM">
<input name="infusionsoft_version" type="hidden" value="1.70.0.607562">
<div class="infusion-field">
<label for="inf_field_FirstName">First Name *</label>
<input id="inf_field_FirstName" name="inf_field_FirstName" placeholder="First Name *" type="text">
</div>
<div class="infusion-field">
<label for="inf_field_LastName">Last Name *</label>
<input id="inf_field_LastName" name="inf_field_LastName" placeholder="Last Name *" type="text">
</div>
<div class="infusion-field">
<label for="inf_field_Company">Company</label>
<input id="inf_field_Company" name="inf_field_Company" placeholder="Company" type="text">
</div>
<div class="infusion-field">
<label for="inf_field_Email">Email *</label>
<input id="inf_field_Email" name="inf_field_Email" placeholder="Email *" type="text">
</div>
<div class="infusion-field">
<label for="inf_field_Phone1">Main Company Phone</label>
<input id="inf_field_Phone1" name="inf_field_Phone1" placeholder="Main Company Phone" type="text">
</div>
<div class="infusion-field checkedagreewrapper">
<span class="infusion-checkbox">
<input id="inf_option_IAgreeThatIAmAnArtificialBeing" name="inf_option_IAgreeThatIAmAnArtificialBeing" type="checkbox" value="1471">
<label class="infusion-field-label-container infusion-label-checkbox" for="inf_option_IAgreeThatIAmAnArtificialBeing">I Agree That I Am An Artificial Being.</label>
</span>
</div>
<div class="infusion-field checkedagreewrapper">
<span class="infusion-checkbox">
<input id="inf_option_YesSignmeupfortheHoneypot" name="inf_option_YesSignmeupfortheHoneypot" type="checkbox" value="1985">
<label class="infusion-field-label-container infusion-label-checkbox" for="inf_option_YesSignmeupfortheHoneypot">Yes! Sign me up for the Honeypot!</label>
</span>
</div>
<div>
<div></div>
</div>
<div class="infusion-submit">
<button type="submit">Submit</button>
</div>
<input type="hidden" id="timeZone" name="timeZone" value="Pacific/Honolulu">
</form>
Text Content
* Is This You? * Services * Technology Solutions * Data Backup and Recovery * Network Security * VoIP Services * Cyber Security * Why Choose Us? * Our Clients * Blog * About Us * Referral Program * Newsletter Archive * Tech Tip Archive * Contact Us * Support * Online Payment * 701-409-2623 * Is This You? * Services ► * Technology Solutions * Data Backup and Recovery * Network Security * VoIP Services * Cyber Security * Why Choose Us? * Our Clients * Blog * About Us ► * Referral Program * Newsletter Archive * Tech Tip Archive * Contact Us * Support ► * Online Payment * 701-409-2623 IT Support For Minnesota, North Dakota & South Dakota * 701-409-2623 * 701-409-2623 * Is This You? * Services * Technology Solutions * Data Backup and Recovery * Network Security * VoIP Services * Cyber Security * Why Choose Us? * Our Clients * Blog * About Us * Referral Program * Newsletter Archive * Tech Tip Archive * Contact Us * Support * Online Payment * 701-409-2623 BLOG HACKER USES ZOOM INVITES TO STEAL CREDENTIALS THROUGH SENDGRID Posted by imsnetworking On March 18, 2021 Share There's a mix of bad news and good in the ongoing war against the hackers of the world. For the bad news, security professionals have recently detected a sophisticated phishing campaign that makes use of SendGrid and convincing replicas of Outlook on the Web and Office 365 logins to harvest credentials. The attack works like this: SendGrid is a trusted SMTP provider, so by sending their emails through this channel, it's more likely that those messages will reach their intended targets and not be blocked by built in email security protocols. The emails the group is sending are typically Zoom invitations, though invariably, once a user clicks on the link, they're forced to jump through a few hoops and end up at a convincing login page for Outlook on the Web or Office 365. These pages are fake, of course, and any user who attempts to log in is merely handing their login credentials over to the hackers, who have collected an estimated 400,000 user names and passwords using this technique. From there, the sky's the limit. Armed with working user name and password combinations, the hackers behind the phishing campaign can log into a user's account and use that as a springboard to inject malicious code onto a target's system with pretty much any payload that the hackers desire. The group behind all of this has been dubbed "Compact," and it's clear by the design of the attack that they are a technically sophisticated bunch. Having said that, there is some good news to report as well. As tech savvy as the attackers are, they made a mistake and misconfigured an exfiltration script. It has allowed security researchers to download multiple copies of the exfiltration code, revealing a tremendous number of details about the group's inner workings. It's likely to provide a short term victory for security professionals around the world, as they'll likely be able to shut down large swaths of Compact's operation. However, the group will no doubt learn from their mistake and after going away for a time to lick their wounds, they'll no doubt be back, and more dangerous than ever. Used with permission from Article Aggregator RELATED POSTS * MICROSOFT STOPPED HACKERS USING GIFS TO ACCESS USER DATA * DARK MODE ON ANDROID PHONES EXTENDS BATTERY LIFE * FAX MACHINES MIGHT BE GATEWAY TO NEXT HACKER ATTACK * BOOST YOUR SECURITY: BE AWARE OF THIRD-PARTY COOKIE RISKS * WHEN YOUR FACEBOOK OR OTHER ONLINE ACCOUNT GETS HACKED, WHO’S RESPONSIBLE FOR THE LOSSES? Schedule a 15-Minute Discovery Call FREE REPORT 6 CRITICAL CYBER SECURITY PROTECTIONS EVERY BUSINESS MUST HAVE IN PLACE NOW TO AVOID BEING HACKED If You Depend On Your Computer Network To Run Your Business, This Is One Report You DON’T Want To Overlook! First Name * Last Name * Company Email * Main Company Phone I Agree That I Am An Artificial Being. Yes! Sign me up for the Honeypot! Submit CONTACT Information Management Systems $$$ * 303 14th Street North Fargo, ND 58102 * Phone: 701-409-2623 * Phone: 701-409-2623 * Email: info@imsnetworking.com LATEST ARTICLES THE DANGERS OF DATA BREACHES January 23rd, 2024 CYBERSQUATTING January 23rd, 2024 SOCIAL MEDIA FacebookTwitterLinkedInYouTube © Copyright 2024 Information Management Systems Icons made by Scott de Jonge from www.flaticon.com is licensed by CC 3.0 BY