Top Email Protections Fail in Latest COVID-19 Phishing Campaign

Top Email Protections Fail in Latest COVID-19 Phishing Campaign
[Montalbano, Elizabeth. "Top Email Protections Fail in Latest Covid-19 Phishing Campaign." Threatpost, April 1, 2020, www.threatpost.com]

“Threat actors continue to capitalize on fears surrounding the spread of the COVID-19 virus through a surge in new phishing campaigns that use spoofing tactics to effectively evade Proofpoint and Microsoft Office 365 advanced threat protections (ATPs), researchers have found.”

“The emails evade basic security checks and user common sense in a number of ways, to circumvent detection and steal the user’s Microsoft log-in credentials, he said. They also don’t include specific names or greetings in the body of the messages, suggesting they are being sent out to a broad target audience, according to Cofense.”

“While these secure email gateways (SEGs) are designed to safeguard end users from clicking on malicious links and attachments, both failed in a new phishing attack we recently observed,” Mahdavi wrote in the post.”

Sophisticated phishing emails are designed to penetrate through traditional gateway solutions because of their inherit weakness, which is, to prevent delivery latency in email production, analysis needs to be fast and not too deep. RevBits Email Security is designed to stop sophisticated phishing emails by supporting by closing the gap between the outer layer of email security and the users’ inbox. Operating at the client-side, RevBits Email Security conducts powerful-deep analysis on each users’ emails without creating latency. Some of the unique features which provide for superior detection of sophisticated phishing emails are:

  • Email security analysis is conducted at the user endpoint-complete analysis without latency

  • Scaled email security–keep the gateway and add RevBits Email Security to the security stack

  • Patented methodology for detecting page impersonation attacks

  • Thorough DKIM, DMARC, SPF verification

  • Blacklist IP addresses from threat countries.

Related Insights

Difference Between Sandbox and Honeypot Security
March 02, 2020

The Difference Between Sandbox and Honeypot Security Technology

When it comes to cybersecurity, different tactics emerge on a daily basis, which can make it difficult to keep up with current trends. Sandboxing and honeypot security are two cybersecurity tactics that are constantly evolving but can be confused. These two technologies are quite different and both offer valuable solutions to various cybersecurity issues. By understanding the differences in these two technologies, businesses can be sure they have the right solution for their cybersecurity needs.

Why Every Enterprise Needs Honeypot Security
February 17, 2020

Why Every Enterprise Needs Honeypot Security

Cyber attacks have been on the rise for the past five years and traditional, passive defenses are no longer enough to protect businesses and enterprises. Many companies are pairing defensive and offensive cybersecurity approaches and are implementing measures like honeypots and deception technologies to protect against future attacks.

How to Get the Most Out of Honeypot and Deception Technology
February 03, 2020

How to Get the Most Out of Honeypot and Deception Technology

Cyber attacks have been on the rise for the past five years and are projected to occur every 11 seconds by 2021. The frequency and sophistication of new-age cyber attacks means cybersecurity efforts need to extend beyond traditional defense methods. As more entities implement offensive cybersecurity, global spending on cybersecurity is expected to reach $133.7 billion in 2022. As a part of these offensive cybersecurity efforts, many companies are implementing proactive measures such as honeypots and deception technology to protect from attack.

Contact Details

Contact RevBits

Message icon Request a Demo