Armorblox researchers uncovered a new phishing campaign that is targeting American Express customers.
The messages use a malicious attachment and their content attempt to trick cardholders into opening it.
The subject of the emails reads “Important Notification About Your Account” in an attempt to urge recipients to open it. Once opened, the email appears as a legitimate email communication from American Express, while the content instructs the cardholder on how to view the secure, encrypted message attached.
“Upon opening the attachment, victims were greeted with a message announcing additional verification requirements for the associated account. Urgency was instilled within the victims through the inclusion of the language, “This is your last chance to confirm it before we suspend it”, and a prompt for victims to complete a one-time verification process that was needed as part of a global update from the American Express team.” reads the analysis published by the Armorblox.
Upon clicking on the link in the message, victims are redirected to a fake American Express login page, which includes the company’s logo and a link to download the American Express app.
The page was crafted to request the victims to enter their user ID and password.
The phishing campaign bypassed native Google Workspace email security controls because it passed both DKIM and SPF email authentication.
Threat actors behind the campaign used a valid domain to send this malicious email, the domain used by the sender received a reputation score of trustworthy and global threat history of zero security events. The phishing email, marked by Google as safe, was delivered to more than 16,000 users’ addresses.
Below are the recommendations provided by Armorblox to identify phishing messages:
Follow me on Twitter: @securityaffairs and Facebook
[adrotate banner=”9″] | [adrotate banner=”12″] |
(SecurityAffairs – hacking, American Express)
[adrotate banner=”5″]
[adrotate banner=”13″]
Meta stopped three covert operations from Iran, China, and Romania using fake accounts to spread…
The U.S. sanctioned Funnull Technology and Liu Lizhi for aiding romance scams that caused major…
ConnectWise detected suspicious activity linked to a nation-state actor, impacting a small number of its…
Victoria’s Secret took its website offline after a cyberattack, with experts warning of rising threats…
Google says China-linked group APT41 controlled malware via Google Calendar to target governments through a…
GreyNoise researchers warn of a new AyySSHush botnet compromised over 9,000 ASUS routers, adding a…
This website uses cookies.