{"id":20986,"date":"2023-04-26T00:18:01","date_gmt":"2023-04-25T20:18:01","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/what-is-conversation-hijacking\/20986\/"},"modified":"2023-04-26T00:18:12","modified_gmt":"2023-04-25T20:18:12","slug":"what-is-conversation-hijacking","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/what-is-conversation-hijacking\/20986\/","title":{"rendered":"Conversation hijacking and how to deal with it"},"content":{"rendered":"<p>Targeted e-mail attacks aren\u2019t limited to spear phishing and <a href=\"https:\/\/www.kaspersky.com\/blog\/what-is-bec-attack\/34135\/\" target=\"_blank\" rel=\"noopener nofollow\">business e-mail compromise (BEC)<\/a>. Another serious threat is conversation hijacking. In a nutshell, this is scheme where attackers insert themselves into a business e-mail conversation and pose as one of the participants. This post analyzes how such attacks work and what to do to minimize their chances of succeeding.<\/p>\n<h2>How do attackers gain access to e-correspondence?<\/h2>\n<p>\nTo worm their way into a private e-mail conversation, cybercriminals need to somehow gain access to either a mailbox or (at least) the message archive. There are various tricks they can deploy to achieve this.<\/p>\n<p>The most obvious is to hack the mailbox. For cloud services, password brute-forcing is the method of choice: attackers look for passwords associated with a particular e-mail address in leaks from online services, then try them out on work e-mail accounts. That\u2019s why it\u2019s important, first, not to use the same credentials for different services, and, second, not to give a work e-mail address when registering on sites unrelated to your work. An alternative method is to access e-mail through vulnerabilities in server software.<\/p>\n<p>Malicious actors rarely stay in control of a work e-mail address for long, but they do usually have enough time to download the message archive. Sometimes they create forwarding rules in the settings so as to receive e-mail coming into the mailbox in real time. Thus, they can only read messages and not send any. If they could send messages they\u2019d most likely try to pull off a BEC attack.<\/p>\n<p>Another option is malware. Recently our colleagues <a href=\"https:\/\/www.kaspersky.com\/blog\/qbot-pdf-mailout\/47902\/\" target=\"_blank\" rel=\"noopener nofollow\">uncovered a mass conversation hijacking campaign<\/a> aimed at infecting computers with the QBot Trojan. The e-mails in which the cybercriminals planted their malicious payload most likely came from previous victims of that same QBot malware (which can access local message archives).<\/p>\n<p>But self-styled hackers or malware operators don\u2019t necessarily go in for conversation hijacking themselves\u00a0\u2014 sometimes message archives are sold on the dark web and used by other scammers.<\/p>\n<h2>How does conversation hijacking work?<\/h2>\n<p>\nCybercriminals scour message archives for e-mails among several companies (partners, contractors, suppliers, etc.). The dates don\u2019t matter \u2014 scammers can resume conversations that go back years. After finding a suitable exchange of e-mails, they write to one of the parties involved, impersonating another party. The goal is to dupe the person at the other end into doing something required by the attackers. Before getting down to business, they sometimes exchange a few messages just to lower the other\u2019s vigilance.<\/p>\n<p>Because conversation hijacking is a targeted attack, it often uses a look-alike domain; that is, a domain visually very close to that of one of the participants but with some small mismatch \u2014 say, a different top-level domain, an extra letter, or a symbol substituted for a similar-looking one.<\/p>\n<div id=\"attachment_48011\" style=\"width: 498px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-48011\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2023\/04\/26001809\/what-is-conversation-hijacking-letter.jpg\" alt=\"Attackers' e-mail: the letter \" n appears instead of in the domain name. width=\"488\" height=\"468\" class=\"size-full wp-image-48011\"><p id=\"caption-attachment-48011\" class=\"wp-caption-text\">Attackers\u2019 e-mail: the letter \u201cn\u201d appears instead of \u201cm\u201d in the domain name.<\/p><\/div>\n<h2>What is conversation hijacking used for in particular?<\/h2>\n<p>\nThe objectives of conversation hijacking are generally rather banal: to gain access to some resource by stealing login credentials; to dupe the victim into sending money to the attackers\u2019 account; or to get the victim to open a malicious attachment or follow a link to an infected site.<\/p>\n<h2>How to guard against conversation hijacking?<\/h2>\n<p>\nThe main threat posed by conversation hijacking is that e-mails of this kind are quite difficult to detect by automated means. Fortunately, our arsenal includes <a href=\"https:\/\/www.kaspersky.com\/small-to-medium-business-security\/microsoft-office-365-security?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder____kso365___\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Security for Microsoft Office 365<\/a>, a solution that detects attempts to sneakily join other people\u2019s conversations. To further reduce the risks to both you and your business partners, we recommend:\n<\/p>\n<ul>\n<li><a href=\"https:\/\/me-en.kaspersky.com\/small-to-medium-business-security?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener\">Protecting employees' devices<\/a> to make it harder to steal message archives from them.<\/li>\n<li>Using unique passwords for work e-mail accounts.<\/li>\n<li>Minimizing the number of external services registered to work e-mail addresses.<\/li>\n<li>Not only changing the password after an e-mail incident, but also checking to see if any unwanted forwarding rules have appeared in the settings.<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kesb-top3\"><input type=\"hidden\" class=\"placeholder_for_banner\" data-cat_id=\"kesb-top3\" value=\"32360\">\n","protected":false},"excerpt":{"rendered":"<p>Cybercriminals can access the e-mails of folks you\u2019re in correspondence with and then try to hijack your conversations. <\/p>\n","protected":false},"author":2598,"featured_media":20989,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1318,1916,1917],"tags":[2176,1815,81],"class_list":{"0":"post-20986","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-enterprise","9":"category-smb","10":"tag-bec","11":"tag-e-mail","12":"tag-targeted-attacks"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/what-is-conversation-hijacking\/20986\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/what-is-conversation-hijacking\/25567\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/what-is-conversation-hijacking\/28196\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/what-is-conversation-hijacking\/25865\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/what-is-conversation-hijacking\/26246\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/what-is-conversation-hijacking\/28734\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/what-is-conversation-hijacking\/35187\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/what-is-conversation-hijacking\/48010\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/what-is-conversation-hijacking\/20490\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/what-is-conversation-hijacking\/21166\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/what-is-conversation-hijacking\/30059\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/what-is-conversation-hijacking\/26180\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/what-is-conversation-hijacking\/31872\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/what-is-conversation-hijacking\/31556\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/e-mail\/","name":"e-mail"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/20986","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2598"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=20986"}],"version-history":[{"count":1,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/20986\/revisions"}],"predecessor-version":[{"id":20988,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/20986\/revisions\/20988"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/20989"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=20986"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=20986"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=20986"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}