Tag: VIPRE Security Group

Zombie Phishing: Email Threats Returning From the Dead In Your Inbox

Usman Choudhary

By Usman Choudhary, general manager, VIPRE Security Group.

When you hear the word zombie, you probably think of something that’s dead, but still walking around, looking disturbingly alive. In the digital world, zombie phishing works the same way: attackers resurrect old email threads to spread malware or steal credentials, hiding danger inside something that looks completely normal.

These malicious “undead” email messages nudge you to “click here to view the full update” or open an attachment. Why not? It’s part of a familiar conversation, from a trusted contact. But behind that link or file is malicious content that can compromise your organization’s defenses. 

Zombie phishing is an ever-growing menace that exploits trust in ways traditional security tools struggle to catch.

What Is Zombie Phishing?

Zombie is a stealthy type of phishing attack that hides amongst your many emails like a wolf in sheep’s clothing. Here’s how it works: 

  1. The phisher compromises a real email account, usually through phishing, weak passwords, or lack of MFA. Now they control a legit, trusted account.
  2. Then they scan old emails, looking for existing threads, especially ones with multiple people or unfinished business.
  3. They revive an email thread by replying to a real message with something like: “See the attached update” or “Please review this doc.” The email looks normal because it’s part of a familiar conversation.
  4. They add a malicious payload, which might include a link to a fake login page or a malicious attachment. Since the message is sent from a real account, it bypasses most security filters.
  5. The victim falls for it because they recognize the sender and click. Here they might enter their credentials, download malware, or open a path into the organization.
  6. The attack spreads, and new victims may have their accounts compromised too. The attacker keeps reusing threads, creating new “zombies” to spread the attack further.

Who Should Be Worried?

No one’s immune, but some are in the crosshairs more so than others. Small and medium-sized businesses (SMBs) often lack the robust security budgets of enterprises, making them prime targets. The Cybersecurity and Infrastructure Security Agency warns that SMBs account for 43% of cyberattack victims, with email as the top vector. 

Larger organizations aren’t safe either, especially those in finance, healthcare, and manufacturing, where supply chain relationships and high-value transactions create juicy opportunities. Employees at all levels, from receptionists to C-suite executives, must stay vigilant, but finance and HR teams, gatekeepers of funds and sensitive data, are significant targets.

Steps to Fight Back

You can’t just hope your employees will spot every zombie in your inbox, and prevention demands a layered approach, technical, procedural, and human. Here’s how to start:

  1. Lock Down Accounts with Multi-Factor Authentication (MFA): CISA reports that MFA blocks 99.9% of account takeover attempts. Make it mandatory for every email login, with no exceptions. A second verification step can stop attacks, even if they snag passwords.
  2. Train the Human Firewall: Awareness is your best defense. Regular training (quarterly refreshers, for example) should teach staff to spot red flags: sudden urgency, odd tone shifts, or unexpected links in old threads. Security awareness training focuses on familiarizing employees with various cyber threats, such as phishing scams, malware, ransomware, and social engineering tactics, aiming to instill a culture of security mindfulness among staff. 
  3. Verify Before You Act: Establish a golden rule: no wire transfers or data shares without voice or face-to-face confirmation. The FBI’s IC3 emphasizes that this simple step could’ve thwarted countless business email compromise (BEC) scams. Email alone isn’t enough.
  4. Monitor and Audit Email Activity: Establish alerts for unusual logins or email forwarding rules, which are common indicators of a compromised account. Implement logging and alert features to detect suspicious logins, unauthorized forwarding rules, and unusual email activity. These measures ensure that potential threats are identified and investigated promptly, preventing significant harm. Email security solutions, such as Secure Email Gateways (SEG) and Integrated Email Security (IES) applications, are crucial for businesses to combat these attacks. These tools offer real-time monitoring and alerting for suspicious activities, enabling the early detection of compromise before attackers can inflict substantial damage.
  5. Up-to-Date Patches and Update Relentlessly: Keep email platforms and endpoints patched and current. Attackers exploit gaps in unpatched systems to plant malware or harvest credentials. Up-to-date patches are critical to robust security, so vulnerabilities are tackled while reducing malware infections and credential theft. Endpoint Detection & Response (EDR) solutions also provide comprehensive reporting features.

The Road Ahead

Zombie phishing isn’t going away, it’s evolving. With AI now powering 43% of phishing attacks, expect more convincing fakes than ever. VIPRE’s latest threat intelligence shows a 74% rise in non-signature-based threats and a 10% increase in BEC attacks, signaling that cybercriminals are getting smarter and stealthier.

You must adapt and blend defenses with a culture of caution, regular security awareness training, and patch management to ensure vulnerabilities are addressed proactively. Security solutions that deliver real-time insights into emerging threats and integrate email security tools add another layer, monitoring email environments for suspicious logins, unauthorized forwarding rules, and unusual activity. These log and alert features allow teams to investigate potential threats before they escalate into breaches.

It’s not just about protecting data or dollars; it’s about preserving trust in the tools we rely on every day.

Zombie email defense requires preserving trust in the tools we rely on daily. The zombies are out there, potentially lurking in your inbox. The question remains: Are you ready to fight back?

VIPRE Launches New Integrated Email Security (IES), a Cloud Email Security Solution to Strengthen Security Measures

VIPRE Security Group, a global leader and award-winning cybersecurity, privacy, and data protection company, today announced the launch of its new VIPRE Integrated Email Security (IES) Solution.

This Integrated Cloud Email Security (ICES) application is a cloud-based email security solution that supplements the native security of cloud email providers (such as Microsoft 365) using advanced detection techniques to identify malicious emails and suspicious activity.

ICES empowers organizations to identify and address email security vulnerabilities to better defend against today’s threats, such as Business Email Compromise, AI-crafted Phishes, Deepfake media, and more. For partners, this solution provides a valuable addition to their offerings, enhancing their ability to deliver comprehensive security solutions to customers.

Integrated Email Security Solution

The VIPRE Integrated Email Security Solution offers organizations a powerful, all-in-one defense system against today’s most persistent email-based threats. Combining advanced AI-powered detection, comprehensive protection of internal emails, real-time threat intelligence, automated policy enforcement, and seamless Microsoft 365 integration, this comprehensive solution helps businesses protect sensitive communications, block malicious content, and ensure compliance with regulatory requirements.

“We are proud to deliver a fully integrated email security solution that empowers organizations to stay protected against the ever-evolving email threat landscape, without sacrificing simplicity,” said Oliver Paterson, director, product management, at VIPRE Security Group. “In a time when email remains the number one attack vector, this solution ensures our customers have the layered, adaptive protection needed to outpace evolving threats.”

The VIPRE Integrated Email Security Solution is available as a standalone service or as part of VIPRE’s broader suite of cybersecurity offerings. Its flexible deployment and integration capabilities support organizations in building a unified, layered security strategy tailored to their evolving business needs. 

Sending Emails No Longer A Security Problem For Healthcare

Profile photo of Oliver Paterson
Oliver Paterson

By Oliver Paterson, director of product management, VIPRE Security Group.

The healthcare sector is predicated on protecting all sensitive information for a practice and its patients. Threats come from every direction, whether through email, an attachment, a malicious link, or simply the penetration of a security system.

Solutions are aplenty but with various degrees of effectiveness and durability, not to mention complexity and quality of protection for the practice, all are important factors when measuring benefits versus risk. As healthcare practice leaders attempt to mitigate their continuous onslaughts of threats, possible breaches, and potential bad actors, automating security measures can alleviate trouble, distractions, and chaos caused by a breach or other malicious activity. 

While most in healthcare don’t like to discuss the ugly but open secret, email is a significant factor in many data breaches. Therefore, advanced levels of protection for Outlook and other email servers are essential, and add-on solutions solve the problem of misaddressed emails and prevent data leakage.

Technology that scans for sensitive keywords, personally identifiable information (PII), or data patterns inside the email body or attachments can provide practices with a critical layer of security.  

Confirm External Recipients and Attachments

Using data loss awareness (DLA) technology, users can confirm the practice’s external recipients (those receiving a message from the practice) before messages are sent. Such an integrated solution “asks” whether everyone on an email recipient list should be seeing the sensitive information contained, so the message is not sent to someone by mistake. Likewise, this prevents misaddressed emails or inadvertent auto-fill email mistakes.

Email breaches from accidental data loss can result in fines, regulatory non-compliance notices, and even litigation for a medical practice. Additionally, medical practices can (and should) seek solutions that proactively help users to prevent accidental data loss and keeps all sensitive information from leaving the organization

In such environments, all settings should be configurable and specified on a per-user or per-group basis. In addition, healthcare organizations should automate activity logs for all potential occurrences with a complete audit trail stored locally or centrally and supporting Outlook local languages, as these are often needed should you be audited.  

Continue Reading