• About
  • Disclaimer
  • Privacy Policy
  • Contact Us
Saturday, September 23, 2023
Tech Fashion Web
  • Home
  • Fashion
    • Footwear
    • Culture
  • Technology
    • Tech Solution
    • Website Design
    • Cyber Security
    • Software
  • Business
  • Digital Marketing
    • SEO
    • Social Media
  • Travel
  • Entertainment
    • Music
    • Celebrity
  • Health
    • Food
  • lifestyle
    • Home
  • More
    • Gaming
    • Gadgets
    • Education
    • Electronics
    • Gadgets
    • Reviews
    • Law
No Result
View All Result
  • Home
  • Fashion
    • Footwear
    • Culture
  • Technology
    • Tech Solution
    • Website Design
    • Cyber Security
    • Software
  • Business
  • Digital Marketing
    • SEO
    • Social Media
  • Travel
  • Entertainment
    • Music
    • Celebrity
  • Health
    • Food
  • lifestyle
    • Home
  • More
    • Gaming
    • Gadgets
    • Education
    • Electronics
    • Gadgets
    • Reviews
    • Law
No Result
View All Result
Tech Fashion web
No Result
View All Result
How phishing attacks are exploiting Amazon Web Services

How phishing attacks are exploiting Amazon Web Services

by Tech Fashion
August 18, 2022
in Technology
0
325
SHARES
2.5k
VIEWS
Share on FacebookShare on Twitter


Using a legitimate service like AWS to create phishing pages allows attackers to bypass traditional security scanners, Avanan says.

Image: Adobe Stock

Cyber ​​criminals prefer to use legitimate sites and services in their phishing scams, not just to trick unsuspecting victims, but to sneak past security scanners that would otherwise block a suspicious site’s traffic. In a report released ThursdayEmail security provider Avanan describes a new phishing campaign that takes advantage of: Amazon Web Services.

Must-Read Security Coverage

As one of the most popular cloud storage and hosting products, AWS is a tempting target for cybercriminals, especially since it allows anyone to create and host web pages. The service allows you to design and host a website using WordPress or your own custom code. But just as legitimate users can use AWS, so can malicious attackers.

How attackers use AWS

Example phishing email.
Image: Avanan

In the system analyzed by Avanan, cyber criminals have built phishing pages on AWS. By sending a link to such a page via a phishing email, the scammers can bypass the security tools and convince the recipient to share credentials for sensitive accounts.

In one example, the attacker uses a phishing page created and hosted via AWS to warn people about the alleged password expiration. The phishing email, which pretends to be Microsoft, complete with a Microsoft logo, claims that the user’s password expires today and asks them to click a button to keep the same password.

Clicking the button will take the user to the phishing page set up with a fake login prompt. The page even includes the victim’s company domain name and fills most of the fields. The user is only asked to enter their password, which is then collected by the people behind the attack.

TO SEE: Password Breach: Why Pop Culture and Passwords Don’t Mix (Free PDF) (TechRepublic)

Why this phishing attack works

This type of scam often succeeds because the attacker manages to breach the usual security measures. Traditional email security tools use static allow and block lists to determine if the content is legitimate by analyzing the linked website. As a prominent website and service, Amazon Web Services is always on the Allow list, which causes the phishing email to reach the user’s inbox.

Avanan said it has notified AWS of its findings and will provide further updates with additional details.

How to avoid falling victim to this scam

To protect your organization and employees from these types of phishing attacks, Avanan offers the following tips:

  • Always hover over a link in an email to see the destination URL before clicking it
  • Always research the content of the email before taking any action
  • Encourage employees to contact the helpdesk or IT support if they have any doubts about the legality of an email



Source link

Share130Tweet81Share33
Previous Post

Browser extension threat targets millions of users

Next Post

Top 5 ways to make your phone your computer

Tech Fashion

Tech Fashion

Related Posts

Which tool is best for your business?
Technology

Which tool is best for your business?

by Tech Fashion
March 24, 2023
LG Will Spend $5.5 Billion on a Battery Factory in Arizona
Technology

LG Will Spend $5.5 Billion on a Battery Factory in Arizona

by Tech Fashion
March 24, 2023
Intel Announces New vPro Platform Running on 13th Generation Core
Technology

Intel Announces New vPro Platform Running on 13th Generation Core

by Tech Fashion
March 24, 2023
Beat the roaming charges with this eSIM
Technology

Beat the roaming charges with this eSIM

by Tech Fashion
March 23, 2023
Next Post
Top 5 ways to make your phone your computer

Top 5 ways to make your phone your computer

Tech news you may have missed: Aug. 11 – 18

Tech news you may have missed: Aug. 11 - 18

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

No Result
View All Result

Categories

  • Business (2)
  • Celebrity (10)
  • Culture (8)
  • Education (8)
  • Entertainment (3)
  • Fashion (12)
  • Food (7)
  • Footwear (7)
  • Health (6)
  • Lifestyle (14)
  • Music (6)
  • Social Media (2)
  • Software (4)
  • Tech Solution (1)
  • Technology (1,884)
  • Travel (12)
  • Website Design (2)

Recent.

Which tool is best for your business?

Which tool is best for your business?

March 24, 2023
LG Will Spend $5.5 Billion on a Battery Factory in Arizona

LG Will Spend $5.5 Billion on a Battery Factory in Arizona

March 24, 2023
Intel Announces New vPro Platform Running on 13th Generation Core

Intel Announces New vPro Platform Running on 13th Generation Core

March 24, 2023
Tech Fashion Web

We bring you the best Premium WordPress Themes that perfect for news, magazine, personal blog, etc. Check our landing page for details.

Category

  • Business
  • Celebrity
  • Culture
  • Education
  • Entertainment
  • Fashion
  • Food
  • Footwear
  • Health
  • Lifestyle
  • Music
  • Social Media
  • Software
  • Tech Solution
  • Technology
  • Travel
  • Website Design

Recent Posts

  • Which tool is best for your business? March 24, 2023
  • LG Will Spend $5.5 Billion on a Battery Factory in Arizona March 24, 2023
  • Intel Announces New vPro Platform Running on 13th Generation Core March 24, 2023

Contact Us

    © 2021 techfashionweb.com . All rights reserved.

    No Result
    View All Result
    • Home
    • Fashion
      • Footwear
      • Culture
    • Technology
      • Tech Solution
      • Website Design
      • Cyber Security
      • Software
    • Business
    • Digital Marketing
      • SEO
      • Social Media
    • Travel
    • Entertainment
      • Music
      • Celebrity
    • Health
      • Food
    • lifestyle
      • Home
    • More
      • Gaming
      • Gadgets
      • Education
      • Electronics
      • Gadgets
      • Reviews
      • Law

    © 2021 techfashionweb.com . All rights reserved.