Bounced Email Phish

BY | AREA 1 SECURITY

 


 
Area 1 Security dives deep into an interesting Phish and how it was caught. This week, we take a look at the Bounce Phish, where attackers attempt to exploit a weakness in the SMTP protocol to bypass existing phishing defenses. We’ll look at a few examples and understand how and why they work.
 

Previous Editions:

Office 365 Phish

Netflix Phish

Business Email Compromise

BEC Phish

Missed Voicemail Phish

Phishing Campaign

Order Confirmation Phish.

Advanced Credential Harvesting Phish

IRS Impersonation Phish

Fear Ransom Phish

Credential Harvester Past SEG

Business Email Compromise

Support Email Spoof

Credential Harvester