Phishing: Extremely high number of malicious emails with Adobe InDesign links

B2B Cyber ​​Security ShortNews

Share post

A new phishing scam is on the rise that abuses Adobe InDesign and uses it to distribute malicious links. Apparently the campaign was so successful that Barracuda saw an increase in said phishing emails from 75 to 2.000 per day. 

Phishing attacks are becoming increasingly sophisticated, using various methods to evade detection and trap victims. There is currently an increase in phishing attacks that abuse Adobe InDesign, a well-known and trusted document publishing system.

Increase by a factor of 30: Phishing with Adobe InDesign links

🔎 The email is classic phishing, but is currently extremely successful (Image: Barracuda).

According to Barracuda Telemetry, the number of emails containing Adobe InDesign links has increased nearly 30x since October. While the daily number was previously around 75 per email per day, it has now increased to around 2.000. Almost one in 10 (9 percent) of these emails contain active phishing links. Many of these links have the top-level domain “.ru” and are hosted behind a Content Delivery Network (CDN) that acts as a proxy for the source site. This helps obscure the source of the content and makes it harder for security technologies to detect and block the attacks.

In addition, legitimate brand logos are used in the phishing emails because they are known to the target persons and inspire trust. This suggests that the attackers invested time and resources in creating these messages. The messages ask the recipient to click on a link that will take them to another website hosted on the indd.adobe(.)com subdomain but actually controlled by the attackers to carry out the next phase of the attack .

Why these attacks are successful

The attacks that exploit Adobe InDesign use several tactics to evade detection and trick their victims:

  • You use a well-known and trusted domain that is usually not blocked.
  • Additionally, by using a publishing program, they can create very convincing social engineering attacks.
  • As soon as the recipient clicks on the link, they will be redirected to another website. This means that there is no known malicious URL link in the body of the message that traditional security tools could detect and block.
  • For attacks hosted behind the CDN, this helps obscure the malicious source of the content and makes it more difficult for security technologies to detect and block the attack.

Measures for protection

To defend against these attacks, it is important for organizations to have advanced, multi-layered, AI-powered email security capable of detecting both new and known threats. This should also include a link protection feature to ensure that users do not click on malicious URLs. The technology checks each URL at the time of click to determine whether the link is safe before allowing a redirect. As a layer of protection between email and recipient, this feature provides a critical last line of defense when threats are new or unknown.

More at Barracuda.com

 


Via Barracuda Networks

Striving to make the world a safer place, Barracuda believes that every business should have access to cloud-enabled, enterprise-wide security solutions that are easy to purchase, implement and use. Barracuda protects email, networks, data and applications with innovative solutions that grow and adapt as the customer journey progresses. More than 150.000 companies worldwide trust Barracuda to help them focus on growing their business. For more information, visit www.barracuda.com.


 

Matching articles on the topic

Report: 40 percent more phishing worldwide

The current spam and phishing report from Kaspersky for 2023 speaks for itself: users in Germany are after ➡ Read more

BSI sets minimum standards for web browsers

The BSI has revised the minimum standard for web browsers for administration and published version 3.0. You can remember that ➡ Read more

Stealth malware targets European companies

Hackers are attacking many companies across Europe with stealth malware. ESET researchers have reported a dramatic increase in so-called AceCryptor attacks via ➡ Read more

IT security: Basis for LockBit 4.0 defused

Trend Micro, working with the UK's National Crime Agency (NCA), analyzed the unpublished version that was in development ➡ Read more

MDR and XDR via Google Workspace

Whether in a cafe, airport terminal or home office – employees work in many places. However, this development also brings challenges ➡ Read more

Test: Security software for endpoints and individual PCs

The latest test results from the AV-TEST laboratory show very good performance of 16 established protection solutions for Windows ➡ Read more

FBI: Internet Crime Report counts $12,5 billion in damage 

The FBI's Internet Crime Complaint Center (IC3) has released its 2023 Internet Crime Report, which includes information from over 880.000 ➡ Read more

HeadCrab 2.0 discovered

The HeadCrab campaign against Redis servers, which has been active since 2021, continues to successfully infect targets with the new version. The criminals' mini-blog ➡ Read more