{"id":18514,"date":"2021-07-06T17:35:37","date_gmt":"2021-07-06T13:35:37","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/adobe-online-imitation\/18514\/"},"modified":"2021-07-06T17:36:00","modified_gmt":"2021-07-06T13:36:00","slug":"adobe-online-imitation","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/adobe-online-imitation\/18514\/","title":{"rendered":"Online PDFs for corporate e-mail phishing"},"content":{"rendered":"<p>The latest in phishers\u2019 battle for corporate e-mail credentials involves notifications allegedly from Adobe online services. And because they\u2019ve begun using an online PDF file (supposedly stored on Adobe\u2019s website), we created a real file to highlight the signs of a fishy e-mail and a fake \u201conline PDF.\u201d<\/p>\n<h2>Adobe PDF Online phishing message<\/h2>\n<p>In the phishing messages, the first thing that stands out is the description of the file \u2014 shared with you through \u201csecure Adobe PDF online.\u201d Right away, ask yourself, does the service actually exist? It sounds plausible, and a quick Google search will tell you Adobe does indeed have a service for storing PDF files online, and that service does enable users to share encrypted files. But you won\u2019t find the name \u201cAdobe PDF online\u201d anywhere on a real Adobe website. It\u2019s either \u201cAdobe Acrobat online\u201d or \u201cAdobe Document Cloud.\u201d Curious, I asked a colleague to send a file to me so I could compare the notifications.<\/p>\n<div id=\"attachment_40511\" style=\"width: 1470px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2021\/07\/06173545\/adobe-online-imitation-letter.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-40511\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2021\/07\/06173545\/adobe-online-imitation-letter.jpg\" alt=\"The real message is on the right\" width=\"1460\" height=\"726\" class=\"size-full wp-image-18515\"><\/a><p id=\"caption-attachment-40511\" class=\"wp-caption-text\">The real message is on the right<\/p><\/div>\n<p>Let\u2019s assume you don\u2019t know what a real file-sharing e-mail from Adobe looks like. Here are some signs. Not one of the following is a guarantee of fraud, and there are exceptions to every rule, but each should raise your suspicions and prompt you to pay close attention and investigate further:<\/p>\n<ol>\n<li>The sender. If an e-mail is from an online service, that should be obvious from the sender\u2019s name and address. Conversely, if the sender is a specific person, a message from them won\u2019t look like a notification from a service;<\/li>\n<li>The subject line. If you\u2019re writing to someone called Leo, would you write something like \u201cleonides@gmail.com received a PDF file\u201d as the subject?<\/li>\n<li>The name of the service. You don\u2019t have to remember the name of every single online service, but if you\u2019re not totally sure, use a search engine to check it;<\/li>\n<li>Hyperlink\/icon. Before clicking on a Download or Open icon, hover your cursor over them to inspect the hyperlink and make sure it goes where it should;<\/li>\n<li>E-mail footer. An e-mail from Adobe is highly unlikely to end with an assurance that Microsoft respects your privacy;<\/li>\n<li>The words \u201cplease read our Privacy Statement\u201d without a hyperlink.<\/li>\n<\/ol>\n<h2>Not Adobe Document Cloud\u2019s website<\/h2>\n<p>At the moment, we can still depend on phishers to make stupid mistakes, but nothing is stopping them from doing a good job. Suppose the e-mail looks great. Now it\u2019s time to check out the website, which in this case looks like an authentication window obscuring the blurred interface of Adobe Acrobat Reader DC. That\u2019s actually plausible, although only if the person who received the e-mail doesn\u2019t know what the real website for Adobe\u2019s online services and its password request window look like.<\/p>\n<div id=\"attachment_40512\" style=\"width: 1470px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2021\/07\/06173554\/adobe-online-imitation-file.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-40512\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2021\/07\/06173554\/adobe-online-imitation-file.jpg\" alt=\"Password request on phishing website (top) and on Adobe's real website\" width=\"1460\" height=\"1224\" class=\"size-full wp-image-18517\"><\/a><p id=\"caption-attachment-40512\" class=\"wp-caption-text\">Password request on phishing website (top) and on Adobe\u2019s real website<\/p><\/div>\n<p>Here, the warning signs vary somewhat. Start with the blurred background: fairly unprofessional protection for confidential data; some of the text is easy to decipher with the naked eye.<\/p>\n<ol>\n<li>The URL. The website for an Adobe service should have an Adobe domain in its address;<\/li>\n<li>Despite the blurring, you can still make out the filename: EMInvoice_R6817-2.pdf. That doesn\u2019t match the authentication window, which says the file available for download is called \u201cWire Transfer Receipt.pdf\u201d;<\/li>\n<li>Mixed-up terms. The blurred document has \u201cInvoice\u201d written on it (as in, request for payment), but the filename says \u201creceipt,\u201d (confirming payment already received);<\/li>\n<li>Program versions. The name \u201cAdobe Acrobat Reader DC\u201d is apparent in the blurred background, whereas the program named in the authentication window is Adobe Reader XI. Someone who rarely uses PDFs might not know XI is an older version of the software, but the discrepancy should stand out regardless;<\/li>\n<li>AdobeDoc Security. You might not keep track of the names Adobe uses for its technologies, but there\u2019s a registered trademark symbol next to \u201cAdobeDoc,\u201d and that\u2019s worth checking;<\/li>\n<li>Request for an e-mail password. A legitimate Adobe service does not need your e-mail password, period.<\/li>\n<\/ol>\n<h2>How to protect corporate e-mail from phishers<\/h2>\n<p>To keep company employees safe from phishing:<\/p>\n<ul>\n<li>Regularly <a href=\"https:\/\/k-asap.com\/en\/?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder____kasap___\" target=\"_blank\" rel=\"noopener\">increase employee awareness<\/a> of current cyberthreats to help them avoid falling for phishing tricks;<\/li>\n<li>Install an <a href=\"https:\/\/www.kaspersky.com\/small-to-medium-business-security\/mail-server?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder____ksms___\" target=\"_blank\" rel=\"noopener nofollow\">antiphishing solution<\/a> on the corporate e-mail server to keep most phishing e-mails from reaching employees\u2019 inboxes;<\/li>\n<li>Install <a href=\"https:\/\/me-en.kaspersky.com\/small-to-medium-business-security?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener\">security products with antiphishing components<\/a> on every work computer; their filters will prevent employees from opening phishing links.<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kesb-trial\">\n","protected":false},"excerpt":{"rendered":"<p>Attackers claiming to represent Adobe online services are sending fake notifications to obtain corporate e-mail credentials. <\/p>\n","protected":false},"author":2598,"featured_media":18519,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1318,1916,1917],"tags":[1815,390,76],"class_list":{"0":"post-18514","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-enterprise","9":"category-smb","10":"tag-e-mail","11":"tag-pdf","12":"tag-phishing"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/adobe-online-imitation\/18514\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/adobe-online-imitation\/23032\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/adobe-online-imitation\/9260\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/adobe-online-imitation\/24983\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/adobe-online-imitation\/22990\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/adobe-online-imitation\/22269\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/adobe-online-imitation\/25597\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/adobe-online-imitation\/25069\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/adobe-online-imitation\/31014\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/adobe-online-imitation\/9809\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/adobe-online-imitation\/40510\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/adobe-online-imitation\/17289\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/adobe-online-imitation\/17746\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/adobe-online-imitation\/15014\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/adobe-online-imitation\/27024\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/adobe-online-imitation\/27260\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/adobe-online-imitation\/24073\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/adobe-online-imitation\/29408\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/adobe-online-imitation\/29200\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/phishing\/","name":"phishing"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/18514","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2598"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=18514"}],"version-history":[{"count":2,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/18514\/revisions"}],"predecessor-version":[{"id":18518,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/18514\/revisions\/18518"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/18519"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=18514"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=18514"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=18514"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}