When a company generating more than $86 billion in net revenue reaches out to do business with you, chances are they’ll have your full attention.
INKY has detected bad actors impersonating PepsiCo in a phishing campaign that infects victims’ computers with malware. As usual, it all starts with a phishing email.
What the would-be victim doesn’t know is that attached to the email is a malicious disk image, disguised as a RFQ (Request for Quote). One click will infect the victim’s computer.
A disk image is a single file that reproduces all the contents and functionality of a hard disk, optical disk, or other storage device. The disk image file is usually quite large and could be anywhere from several megabytes to several gigabytes in size. Malicious disk drives end in one of several extensions including .iso, .cue., .bin, .img, or .dmg.2
A disk image is a great way to backup hard disks because unlike conventional backup programs, a disk image makes a copy of the structure of the drive, including data, programs, and formatting. A disk image so closely mirrors the actual drive that if your main drive ever fails, you can restore everything from the disk image, including personal preferences and plugins.2
That all said, when a malicious disk image is at play, it can give attackers a great deal of access. In fact, Trojan infected machines may give attackers the ability to:
Looking at the top half of the email, we can see how the bad actors are luring in victims.
There are also a few things to point out in the bottom half of the email.
With phishing emails, it’s important to choose a brand that prompts readers to act. PepsiCo’s product portfolio boasts more than 500 different brands, including its flagship Pepsi product, Frito-Lays, Gatorade, Quaker, Lipton, Doritos, Rold Gold, Starbucks RTD beverages, and many more. With 291,000 employees located all over the world, PepsiCo is a global powerhouse.1
The way in which this phishing email was deployed also aids in its success. To evade geographical filters, these emails were sent from several U.S.-based virtual private servers controlled by bad actors. Also, the phishers used a “spray and pray” technique - meaning they sent out large quantities of the email in hopes that a percentage of recipients would fall for the scam and click on the malicious link.
Recap of Techniques
Best Practices: Guidance and Recommendations
To truly have a handle on phishing threats, you need a third party’s assistance. INKY offers a relentlessly effective level of security, capable of detecting and stopping phishing threats before anyone becomes a victim. Using computer vision, artificial intelligence, and machine learning, INKY provides a level of ingenuity that is unlike other email security platforms. INKY sees things the way humans do, recognizing logos, brand colors, email signatures, and more — but it also sees the millions of things humans can’t, spotting imposters by as little as a pixel.
See what INKY can do for your business and your customers. Schedule a free demonstration today.
----------------------
INKY is an award-winning, behavioral email security platform that blocks phishing threats, prevents data leaks, and coaches users to make smart decisions. Like a cybersecurity coach, INKY signals suspicious behaviors with interactive email banners that guide users to take safe action on any device or email client. IT teams don’t face the burden of filtering every email themselves or maintaining multiple systems. Through powerful technology and intuitive user engagement, INKY keeps phishers out for good. Learn why so many companies trust the security of their email to INKY. Request an online demonstration today.
1Source: www.pepsico.com
2Source: www.easytechjunkie.com/what-is-a-disk-image.htm#google_vignette