A recent article on threatpost.com describes how researchers from Armorblox discovered a phishing campaign from bad actors impersonating the well-known security company Proofpong. These criminals targeted a global communications company with over 1,000 employees with a phishing email containing a link that led to a site that looked like a Proofpoint login page designed harvest credentials for Micorosft Offfice365 and Google email. What makes this particularly newsworthy is that the attackers were targeting a cyber security company by impersonating their brands. As a cyber security vendor, they have an obligation to have robust security measures in place to instill confidence in their customers.
I have spoken to multiple CISOs, and a large number of them consider brand impersonation and typosquatting as a big issue and are looking for tools to provide continuous monitoring and deliver defense-in-depth. However, many in the security community see brand impersonation and typosquatting as a problem for legal teams or a concern only for enterprises who sell to consumers. For many, cyber security is focused on protecting the enterprise and its assets, i.e., employees, endpoints, data, infrastructure. They would argue that the Proofpoint phishing attack is not a Proofpoint issue since they cannot control who is targeted, and each enterprise needs to own their own security.
This is an outdated assumption and creates a huge opening for cyber criminals to take advantage of this “not my problem” mentality. Should a company care whether cyber criminals are impersonating the company to perform illicit acts and harm, among other, their customers, employees, partners, and even other vendors? If Proofpoint cyber security does not own the taking down of a site impersonating their brand then who does?
The point of this blog is not to say that Proofpoint does not care. I actually believe they do. But I talk to many CISOs who believe that this is not a cyber security issue, which is simply wrong. Cyber criminals do not care what your team’s responsibilities are. The most prolific attack is to set up a fake website, send phishing emails, and harvest credentials. It is an extremely simple tactic, but it works. Cyber security teams are the best equipped to detect, monitor, and remediate these sites because they know how to operate at Internet scale. In 2020, Bolster Research data showed that there were 19,000 of these types of pages created every day.
Bad guys do not care what industry you are in or what type of company you are. We have seen small cancer research companies to large, global financial institutions like Blackrock be spoofed. At Bolster we see typo-squats and brand impersonating sites targeting all kinds of enterprises across all verticals. Legal professionals do their best, but their toolsets consist of cease and desist letters, temporary restraining orders, or manual takedown requests. Their profession is not designed to solve this problem through AI and automation, which is exactly what is needed to keep up with the bad guys.
Proofpoint Phish Analysis
This Proofpoint phish led us to run a typosquatting report for Proofpoint and hunt for other Proofpoint phish and this what we found. The output of our research can be viewed using our CheckPhish Insights pages, which is free for anybody to use.
We quickly found a typosquat domain https[:]//proofpoint-zak.com. This domain looks highly suspicious as it hosted behind Cloudflare and the SSL provider is also Cloudflare. Also, Whois information doesn’t reveal much information. There is a slight chance that it is owned by Proofpoint but for all practical purposes it seems like a phishing site. The domain was created on 2018-10-22 and the domain registrar is Tucows–unlikely Prrofpoint’s registrar of choice since the registrar for proofpoint.com is MarkMonitor. Inc. We would expect all Proofpoint domains to be managed by MarkMonitor. That is why this domain seems like a phish.
Another example of a Proofpoint phishing site is http[:]//ace-mortgage[.]space/ , which redirects to https[:]//sosmacomsv[.]com.br/sled/proofpoint-RD689-main-virtrudesign. This site is now currently blocked by safe browsing. We first saw it on October 31st, 2021. When screenshot below was taken. It looks like the site was taken down, most likely by Proofpoint.
As previously mentioned, Proofpoint is not alone in attracting the attention of bad actors trying to impersonate their brand to do nefarious things. The recent phishing attacks demonstrate the need for companies to take ownership of the brand impersonation problem and not leave it to other groups such as legal or brand protection.
*** This is a Security Bloggers Network syndicated blog from Bolster Blog authored by Abhishek Dubey. Read the original post at: https://bolster.ai/blog/proofpoint-phishing-attackproofpoint-phishing-attack-means-every-ciso-needs-to-protect-against-brand-impersonation/