An Armorblox report revealed that threat actors have launched an advanced phishing campaign leveraging DocuSign and a compromised email domain of a third party against a leading US-based integrated payments solution firm in an effort to exfiltrate Microsoft Outlook login credentials, according to Threatpost.
Researchers noted that nearly 550 employees of the targeted firm were sent the same emails from "Hannah Mcdonald" that includes a link for a revised contract. Recipients clicking the link have been redirected to a DocuSign preview of an electronic document, which researchers found to be hosted on the legitimate cloud-based prototyping portal Axure, and those who have put their login credentials on the phony Microsoft single sign-in login page could have been compromised, researchers said.
Meanwhile, the emails' TermBrokersInsurance domain origins helped facilitate concealment.
Armorblox product marketing manager Lauryn Cash said the incident highlighted the importance of integrated cloud email security as part of an organization's collection of security tools.
"Tools that leverage natural language understanding (NLU) can help stop zero-day attacks," Cash said.
Modern integrated graphics processing units, including those manufactured by AMD, Arm, Apple, Intel, Qualcomm, and Nvidia, could be targeted to expose sensitive data through the new GPU.zip side-channel attack, which exploits graphical data compression, The Hacker News reports.
U.S. critical infrastructure organizations have been noted by the Department of Homeland Security to be at risk of cyberattacks leveraging artificial intelligence, with China and other nation-states exploiting the technology to deploy more advanced malware attacks and influence operations, CyberScoop reports.