In their recent blog post Darktrace goes over a case study of how the adversaries used ‘Spam Bombing‘ to ultimately convince the target to give them access to their computer via Microsoft Quick Access remote management tool.
What happened
- The attackers used the targets email address to sign them up to 100+ legitimate services.
- Within minutes the target got bombarded with107 different e-mails in 3 different languages
- All these e-mails came from reputable sources – because ultimately they were valid – newsletter, service signup e-mails. Hence, they were not flagged as suspicious.
- To help with the flood of emails a “helpful IT person” reached out to the target and convinced them to give them remote access to their computer.
Protection against “Spam Bombing“
- Make sure your monitoring tools are not only looking and analysing individual e-mails. Overall patterns are important to notice as well.
- Share this example within your organisations so they too can recognize the suspiciousness of such patters.
- And as always, be suspicious about helpful it people reaching out at the most convenient moment. When something like this happens, hang-up, ignore and reach out to them yourself using official channels.