Share This:

Cybercriminals have started new phishing campaigns that targets organizations and individuals who were members of affected banks. Fraudulent messages are being sent in an attempt to trick victims into revealing personal/account information such as social security numbers, passwords, and account numbers. Barracuda SOC recommends providing end-users with email security awareness training, implementing email protection that includes artificial intelligence to prevent phishing attacks, and being extra vigilant before sharing any type of account information.

What is the threat?

Multiple banks have collapsed in recent weeks. During this heightened sensitivity, threat actors are using this as an opportunity to drive social engineering attacks. Phishing campaigns have been designed to take advantage of the banking crisis by impersonating cryptocurrencies, loan lenders, founders of financials teams, and more. Threat actors are pretending to be companies impacted by the bank failure incident and sending out phishing emails to extract users’ personal information.

Why is it noteworthy?

Threat actors are creating convincing fraudulent emails or text messages pretending to be a member of the collapsed bank and encouraging recipients to click links to re-activate frozen accounts or trick clients to transfer money to new accounts to recover funds. Finance employees are the most vulnerable as they have access to an organization banking information for billing/payments.

Researchers are claiming threat actors might contact former clients/employees to offer fake services such as loans, legal services, and more, to obtain personal account information. “An attack already seen in the wild is from BEC threat actors who are impersonating customers and telling customers that they need payments sent to a new bank account after the bank’s collapse” (Bleeping Computer).

On March 13, 2023, it was observed that threat actors were hosting cryptocurrency scams as well. Customer were sent a “payback” program email, however when customer clicked the “Click Here to Claim” button it would attempt to attempts to compromise MetaMask, Exodus, and the Trust Wallet crypto wallets.

What is the exposure or risk?

The phishing campaigns/scams will continue to target organizations and individuals’ personal identifiable information and other account information that these bank entities own. Threat actors can steal customers information/identity, and steal money from the individual and organization causing further compromise.

What are the recommendations?

Barracuda SOC recommends the following actions to limit the impact of a phishing attack:

  • Provide end-user security awareness training
  • Ignore emails from unusual domains
  • Do not click links without verifying if it is legitimate
  • Implement Email Protection
  • Confirm with financial institutions if they are requesting bank account details via phone

References

For more in-depth information about the recommendations, please visit the following links:

If you have any questions, please contact our Security Operations Center.


Share This:
Anika Jishan

Posted by Anika Jishan

Anika is a Cybersecurity Analyst at Barracuda MSP. She's a security expert, working on our Blue Team within our Security Operations Center. Anika supports our XDR service delivery and is highly skilled at analyzing security events to detect cyber threats, helping keep our partners and their customers protected.

Leave a reply

Your email address will not be published. Required fields are marked *