Private Industry Notification warns of the role email auto-forwarding could be used in business email compromise attacks.
The FBI's Cyber Division has issued a Private Industry Notification (PIN) warning companies of the risks posed by auto-forwarding email rules. PIN 20201125-001 explains that the shift to working from home has raised the risk inherent in many email vulnerabilities, but that auto-forwarding threats are particularly serious because the results can be unseen by employees and security teams until long after a breach has occurred.
In the PIN, which was coordinated with DHS-CISA, the FBI gives examples of how auto-forwarding rules can be exploited to make more effective business email compromise (BEC) attacks. They make special note of the differences that can exist between the ways that auto-forwarding rules are entered and enforced on Web pages and email clients. Those differences can be the stress points that attackers hit to gain access to accounts and make fraudulent messages more believable.
Among the FBI's recommendations: make sure that email software versions are the same on email clients and Web browsers, and that auto-forwards to external email addresses are blocked.
For more, read here.
About the Author(s)
You May Also Like
Defending Against Today's Threat Landscape with MDR
April 18, 2024The fuel in the new AI race: Data
April 23, 2024Securing Code in the Age of AI
April 24, 2024Beyond Spam Filters and Firewalls: Preventing Business Email Compromises in the Modern Enterprise
April 30, 2024Key Findings from the State of AppSec Report 2024
May 7, 2024
Black Hat USA - August 3-8 - Learn More
August 3, 2024Cybersecurity's Hottest New Technologies: What You Need To Know
March 21, 2024