Report: Rise Of “Conversation-Hijacking” Phishing Attacks Threatens Businesses

Because the technique involves impersonating a trusted employee, the hacking method has the potential to be unusually effective.

There has been a significant increase in the number of hackers implementing “conversation-hijacking” attacks to trick employees into installing malware, transferring money or disclosing their passwords, according to a new report from Barracuda Networks.

The phishing technique involves a hacker infiltrating real email threads between company employees by taking over accounts with previously stolen login credentials, perhaps bought through the dark web, according to ZDNet. After getting into the email account, attackers will impersonate the worker and attempt to extract information from their colleagues.

In an analysis of 500,000 emails, Barracuda found that conversation hijacking increased by over 400 percent between July and November 2019. The attacks are still relatively rare compared to traditional phishing attacks, which typically involve emails asking employees to click a link that installs malware on their devices and allows the attacker to gain access to a network.

But cybersecurity experts are concerned about the attacks because of how effective the technique could potentially be on gaining access to financial accounts or other sensitive information. Hackers will spend time on reading through conversations, researching victims and impersonating the way they write, according to Olesia Klevchuk, senior product manager for email security at Barracuda.

“These attacks are highly personalized, including the content, and therefore a lot more effective,” Klevchuk told ZDNet. “They have the potential of a very large payout, especially when organizations are preparing to make a large payment, purchase or an acquisition.”

Workers are more likely to believe the impersonation than an email from a random address asking them to click a link, according to Klevchuk. But the attacks are also not impossible to spot.

Attackers usually don’t use the actual compromised account to send the phishing message because the actual user can see if an email has been sent from their account. Instead, the hacker will try to impersonate the employee’s email domain with a technique called “typo squatting” that changes one or two characters to trick recipients into thinking the email is the real deal.

This makes it crucial for recipients to check the email address and domain if they are suspicious that their colleague did not send an email demanding account information or payment. In addition, employees should reach out directly to the employee through another contact method -- in person, by phone or through another email -- to check if they sent the email, according to ZDNet.

About the Author

Haley Samsel is an Associate Content Editor for the Infrastructure Solutions Group at 1105 Media.

Featured

New Products

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.”