<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1626328370711236&amp;ev=PageView&amp;noscript=1">

Download the Research Report

Anatomy of a Spear Phishing Attack

Menlo Security’s researchers recently uncovered a spear phishing attack at a popular enterprise that went undetected by existing security solutions.

A close examination of this spear phishing event revealed the following details. The attackers:

  • Performed various checks on the password entered by the victim and their IP address to determine whether it was a true compromise vs. somebody who had figured out the attack
  • Supported various email providers. This was determined by the fact that they served custom pages based on the email domain. For example, a victim whose email address was john.doe@gmail.com, would be served a page that looked like a Gmail login page
  • Exfiltrated victim’s personally identifiable information (PII) to an attacker controlled account

Download the report now to get the full story.

MS Spear Phishing Report.jpg

Download the Report


You may opt out of Menlo Security marketing communications by clicking on the unsubscribe link in any marketing emails you receive from us.