"Disney+ Cyber Scheme Exposes New Impersonation Attack Tactics"

According to security researchers at Abnormal Security, brand impersonation in cyberattacks has reached new levels of sophistication.  Traditionally observed in financial institutions and social media sites, threat actors are now employing multi-stage attacks with a high degree of personalization.  The researchers published a study that revealed a case where attackers impersonated the popular streaming service Disney+ in an intricate scheme.  The researchers noted that the cybercriminals initiated the attack with an auto-generated notification email about a pending charge for a new Disney+ subscription.  Each email contained an attached PDF named after the recipient, which is a rarely seen tactic requiring manual effort.  The PDF detailed an inflated charge of $49.99, surpassing regular subscription fees, accompanied by a seemingly legitimate customer support service number.  The researchers noted that the attackers went beyond typical tactics by using a sender email resembling a legitimate Disney+ address, incorporating brand colors, and personalizing subject lines and greetings.  The emails lacked overt signs of phishing, such as misspellings or malware-laden attachments, making them challenging to detect for both traditional security solutions and individuals.  The researchers stated that what sets this attack apart is the level of personalization and attention to detail employed by the perpetrators, making it difficult for traditional security solutions and even vigilant individuals to identify it as malicious.  
 

Infosecurity reports: "Disney+ Cyber Scheme Exposes New Impersonation Attack Tactics"

Submitted by Adam Ekwall on