Back to Email phishing

Email phishing

Ukraine blames Russia for attempted cyberattack on its telecommunications network.

On December 4th, the Security Service of Ukraine, known as SBU, reported that it contained an attempted cyberattack on its information and telecommunication systems. Ukrainian authorities have blamed Russia for the attack. Attackers utilized email phishing as a means to target Ukraine’s critical infrastructure.

Details of the phishing attack.

SBU reported that hackers tried to trick SBU employees into downloading counterfeit accounting documents infected with a virus, in the hopes of interfering with Ukraine’s judicial information systems and stealing official information. SBU identified that the malware was connected to control-command servers with Russian IP addresses. The State Judicial Administration and the State Special Communications Services together managed to contain the cyberattack. However, they did not provide details on when the attack took place or how many systems were targeted. SBU has taken steps to implement stringent security measures to avoid such incidents in the future.

In recent years, organizations in Ukraine have been the target of several cyberattacks originating from Russia. In 2014, pro-Russian hackers launched a series of cyberattacks to disrupt Ukraine’s presidential elections. In 2015 and 2016, hackers compromised the information systems of three Ukrainian energy distribution companies. And in 2017, many organizations in Ukraine fell victim to the powerful NotPetya ransomware attack.

Don't want to make the news for the wrong reasons? Download ManageEngine Exchange Reporter Plus, a wholesome Exchange mailbox monitoring and reporting tool, to ward off any mail-bound threats

What best practices can your business adopt to avoid becoming the next victim?

  • Educate your employees about phishing scams and spread awareness about attackers masquerading as trusted entities.
  • Use a third-party tool to scan all incoming emails and detect possible threats.

How can ManageEngine help prevent such attacks?

Exchange Reporter Plus provides a host of reports that help you locate suspicious emails, both sent and received, based on keywords in their subject or body. Often the content and the sender of the email come across as valid, tricking users into clicking malicious emails and causing serious damage to businesses. This is why email attachments deserve critical attention.

With Exchange Reporter Plus, it's easy to set up filters to look out for malicious attachments—be they TXT, PPT, or BAT files.

You can locate emails based on:

  • Attachment name: Display all messages in your organization that have an attachment with a specific name. Knowing the names of malicious files helps you take necessary steps to stop email-bound threats.
  • Attachment type: Identify mailbox content based on an attachment’s file format to spot malicious software transfer over email.

Exchange Reporter Plus’ reports also provide details on the date an attachment was received. Any dubious attachment can be easily identified from these reports.

Attachments by file name keyword
Attachments by file extension keyword

In attacks where the content and sender information vary, you can customize mailbox content reports to include all the keywords these different emails use.

Get started now with your free, 30-day trial of Exchange Reporter Plus.

+

Stay In The Know

Thank you

You will receive weekly cybersecurity news soon!

  • Please enter a business email id
  •  
  •  
    By clicking 'I'm Interested', you agree to processing of personal data according to the Privacy Policy.

© 2022 Zoho Corporation Pvt. Ltd. All rights reserved.