"Cybercriminals Exploit File Sharing Services to Advance Phishing Attacks"

According to Abnormal Security, threat actors are using popular file-hosting or e-signature solutions to trick victims into revealing private information or downloading malware. A file-sharing phishing attack involves a cybercriminal posing as a familiar colleague, file-hosting solution, or e-signature solution and sending a malicious email with a link to what seems to be a shared file or document. Clicking on the link starts the second phase of the attack, which may involve stealing login credentials or infecting the target's device with malware. This article continues to discuss the exploitation of popular file-hosting or e-signature solutions by cybercriminals in phishing attacks.

Help Net Security reports "Cybercriminals Exploit File Sharing Services to Advance Phishing Attacks"

Submitted by grigby1

Submitted by grigby1 CPVI on