123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computers >> View Article

Scammers Attempt To Gain Access To E-mail Accounts Through Fake Outlook Notifications

Profile Picture
By Author: eccuni
Total Articles: 211
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

Security researchers have alerted Microsoft Outlook users on a fake notification scam. The new phishing scam first identified by security experts at Internet Security firm Sophos attempts to gain access to e-mail accounts. Users receive an e-mail that asks users to download an attachment to reconfigure their Microsoft Outlook. Users, who download and open the attachment, receive a fake form, which appears strikingly similar to a genuine form of Outlook. The form seeks username, password and outgoing server details. Outlook users, who provide the requested information, inadvertently provide opportunity for remote scammers to compromise their e-mail accounts. Cybercriminals may use the information to impersonate as the legitimate user and send arbitrary mails, propagate spam and steal personal information. They may also attempt to gain access to other online accounts of the user through brute-force attacks or forget password option.

On the other hand phishers are facing threat from whalers, who attempt to gain access to online databases, where phishers store the stolen information by using a tool called autowhaler. The ...
... tool allows whalers to search common Phishing URLs, where phishers hide their login credentials. Recently, security researchers at GFI Labs identified a unique tool termed as '666 autowhaler'. When a whaler downloads the tool, they inadvertently download a Trojan designed to extract login credentials. The detection again reveals the vicious nature of cybercrime world.

Internet users must be wary of e-mails seeking login credentials or suggesting reconfiguration of e-mail clients. Phishing e-mails attempt to deceive users into compromising sensitive information by urging prompt action and spoofing the e-mail address to make them appear as coming from a legitimate source. They may also spoof the links in the e-mail to make them appear as a web address of a legitimate company. As such, they must prefer visiting a website by typing the web address rather than following a link on Instant Messengers (IMs), Internet Relay Chat (IRC) or e-mail addresses. Cyber security training programs and online degree programs may help users in improving their online computing practices. They may also report fraudulent e-mails to respective legitimate companies or concerned regulatory authorities in their country. Such attempts will help organizations and regulatory agencies to initiate appropriate action and prevent other Internet users from falling prey to fraudulent scams.

E-mail clients help employees to manage and organize their e-mails. Phishers may attempt to gain sensitive information regarding organizational networks by targeting employees through sophisticated schemes. Employees who receive e-mails seeking such information must immediately report to the concerned head of the IT department. Organizations must educate employees on the incident response procedures and information security practices through induction and e-learning programs. They may also collaborate with technical institutions and educational institutions and encourage employees to undertake online university degree programs and improve cyber security practices in the organization.

Cybercriminals constantly endeavor to improve their attack techniques. Professionals qualified in masters of security science may help organizations to assess prevalent security threats, envisage future threats and devise appropriate policies to improve the defenses of the organization.

Total Views: 344Word Count: 507See All articles From Author

Add Comment

Computers Articles

1. Remote Connectivity | Business Broadband Without Fibre India | Viva Digitally
Author: Viva

2. Spark Matrix™: Speech Analytics
Author: Umangp

3. Custom Computer Manufacturer: How To Choose The Right One For Your Needs?
Author: Jack Williams

4. Riding Up: The Surge Of Elevators And Escalators Across Asia Pacific
Author: Pujitha

5. Why Businesses In Mumbai Need Custom Software Development
Author: Aimbeat Insights

6. How A Multi-service App Can Transform Your Business Growth
Author: Swiza Joy

7. Advanced Humidity Monitor And Equipment Temperature Monitoring Solutions For Reliable Healthcare And Business Environments With Tempgenius Expertise
Author: Chris Miller

8. Why You Need Modern Telecom Sales Commission Management Systems To Boost Sales Efficiency
Author: Kevin

9. Why Access Reviews Keep Failing In Regulated, Hybrid Environments
Author: Soham Biswas

10. Building A Modern Real Estate App With Trulia Clone App Script
Author: Swiza Joy

11. Spark Matrix™: Multi-carrier Parcel Management Solutions
Author: Umangp

12. Best Odoo Erp Software Company In Dubai For Business Growth
Author: Mayur Meheshwari

13. Top Challenges Faced By Equipment Rental Companies In The Uae — And How Erp Solves Them
Author: Al murooj solutions

14. Spark Matrix™: Intelligent Virtual Assistants (iva)
Author: Umangp

15. Pos Software Designed For Retail Operations
Author: EPOS Direct

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: