"SuperMailer Abuse Bypasses Email Security for Super-Sized Credential Theft"

A massive credential-harvesting campaign uses the legitimate email newsletter program SuperMailer to send out a large number of phishing emails designed to circumvent Secure Email Gateway (SEG) protections. Cofense reported on May 23 that SuperMailer-created emails account for a significant 5 percent of all credential phishing attempts within the company's telemetry for the month of May. The monthly volume of the activity has more than doubled in three of the past four months, which is notable even in a time when credential phishing is on the rise. Combining SuperMailer's customization features and sending capabilities with evasion techniques, threat actors behind the campaign sent customized, legitimate-looking emails to inboxes across all industries, according to Brad Haas, cyber threat intelligence analyst at Cofense and author of the study. According to Cofense, the threat actors behind the activity are casting a wide net, hoping to catch victims in a variety of industries, including construction, consumer goods, energy, financial services, food service, government, healthcare, information and analytics, insurance, manufacturing, media, mining, professional services, retail, transportation, and utilities. This article continues to discuss the credential-harvesting SuperMailer campaign.

Dark Reading reports "SuperMailer Abuse Bypasses Email Security for Super-Sized Credential Theft"

Submitted by Anonymous on