April 5, 2017 By Larry Loeb 2 min read

Barracuda Networks has reported that many of its customers have been hit by a so-called “airline phishing attack” that focuses on industries related to logistics, shipping and manufacturing, according to CSO Online. Attackers assume the identities of travel agents and send emails that appear to contain airline passes or other types of e-tickets.

Analyzing the Airline Phishing Attack

According to Barracuda, the fraudsters behind the campaign do their homework. Before launching an attack, they research their targets to determine which airlines, destinations and prices might feasibly appear in a legitimate email.

The fraudulent email contains a .pdf or .docx attachment, which, when opened, executes the malware and redirects the victim to a website designed to imitate an airline or corporate travel center. Once there, the victim is encouraged to enter company credentials, which the attackers can then use to breach corporate networks.

BEC Attacks on the Rise

Proofpoint found that business email compromise (BEC) attacks have increased by 45 percent in the last three months of 2016 compared to prior months. The company also discovered that two-thirds of all BEC attacks spoofed email address domains so that fraudulent emails would display the same domain as that of the targeted company. Interestingly, Proofpoint found no correlation between the size of the company and BEC attack volume.

Asaf Cidon, vice president of content security services at Barracuda, told CSO Online that these attacks were influencing firms to change their defense strategies.

“The market is moving from a static, rule-based approach that relies on seeing the same virus or spam message across many customers to dynamic, machine learning-based systems that learn and adapt to the attacks,” he noted. “Future email security systems will need to learn each customer’s environment and find anomalies in real time.”

Vigilance against email phishing has long been a crucial component of security. These attacks demonstrate the importance of user awareness and employee training to mitigate all types of threats, even those as simplistic as phishing.

More from

When ransomware kills: Attacks on healthcare facilities

4 min read - As ransomware attacks continue to escalate, their toll is often measured in data loss and financial strain. But what about the loss of human life? Nowhere is the ransomware threat more acute than in the healthcare sector, where patients’ lives are literally on the line.Since 2015, there has been a staggering increase in ransomware attacks on healthcare facilities. And the impacts are severe: Diverted emergency services, delayed critical treatments and even fatalities. Meanwhile, the pledge some ransomware groups made during…

AI and cloud vulnerabilities aren’t the only threats facing CISOs today

6 min read - With cloud infrastructure and, more recently, artificial intelligence (AI) systems becoming prime targets for attackers, security leaders are laser-focused on defending these high-profile areas. They’re right to do so, too, as cyber criminals turn to new and emerging technologies to launch and scale ever more sophisticated attacks.However, this heightened attention to emerging threats makes it easy to overlook traditional attack vectors, such as human-driven social engineering and vulnerabilities in physical security.As adversaries exploit an ever-wider range of potential entry points…

4 trends in software supply chain security

4 min read - Some of the biggest and most infamous cyberattacks of the past decade were caused by a security breakdown in the software supply chain. SolarWinds was probably the most well-known, but it was not alone. Incidents against companies like Equifax and tools like MOVEit also wreaked havoc for organizations and customers whose sensitive information was compromised.Expect to see more software supply chain attacks moving forward. According to ReversingLabs' The State of Software Supply Chain Security 2024 study, attacks against the software…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today