By Jeremy Fuchs, Cybersecurity Researcher/Analyst, Check Point Software Company
Introduction
Successful hacks rarely spell out what’s about to happen. Instead, hackers rely on deceptive social engineering tactics. The idea is to get you to think you’re doing something legitimate but is, in fact, not.
One way to do that is through obfuscation. By hiding the true intent of the email, it may be more likely that a security scanner thinks it is clean, and that an end-user engages with it. One way to do that is to use something expected–like a picture–and hide the malicious stuff behind it. In this Attack Brief, Check Point Harmony Email researchers will discuss how hackers hide malicious links within pictures to redirect users to phishing sites.
- Jeremy Fuchs, Cybersecurity Researcher/Analyst, Check Point Software Company
- Cyber Security & e-Crime
- Posted On




