Email Impersonation

18th May 2020 | Cybrary Email Impersonation

email impersonation cybrary term

Email Impersonation is a form of phishing attack where a hacker impersonates someone else in the hopes it was convince an employee to act in some fashion.

Email impersonation attacks often use senior company executives such as the CEO or CFO to make an initial email inquiry.  Sometimes it will be worded like this:

Jane, heading into a meeting, are you busy?  John 

The sender name looks like the senior person in your organization and at first glance might be indistinguishable from the real person. These emails always ask the victims to perform a task, urgently. Examples of such attacks include purchasing gift cards, sending personel records or W2’s, or logging into a website to retrieve a critical file for the CEO/CFO.  In each case, the real sender is a hacker impersonating that Very Important Person (VIP).

Impersonation emails are a common form of social engineering to be on the lookout for. They are easy to complete using public information from the corporate website and very difficult to prevent from delivery.

Source: Barclays Corporate Banking

Additional Reading: What is Business Email Compromise?

Related Terms: Phishing, Spear-Phishing, Whaling

What should you do as an SMB?

SMBs are big targets for phishing attacks, as attackers know that SMBs tend to lack the resources available to defend against them. The good news is that phishing attacks are one of the easiest topics to train employees on how to spot and avoid. Follow these best practices to reduce your likelihood of being breached by a phishing attack, especially impersonation-based attacks.

  1. Train your employees on how to spot, avoid and delete phishing attacks.
    • Watch out for unexpected emails with urgent tasks to complete.
    • Be very wary of generically addressed messages.
    • Spelling, Grammar, and punctuation mistakes are all a red flag.
    • Be wary of attachments and do not click links to unknown websites.
  2. Test your employees with Phish Testing attacks in CyberHoot’s Phishing module; re-train those that fail in your tests.
  3. Purchase and train your employees on how to use a Password Manager. If you visit a phishing website and try to enter your password credentials using a Password Manager, you will NOT be able to. Employees reusing passwords will absolutely enter their credentials.
  4. To protect the Internet  from phishing attacks using your domain name, setup SPF, DKIM and DMARC records to block the receipt of emails masquerading as your domain name.

To learn more about Email Impersonation, watch this short 2 minute video:

https://youtube.com/watch?v=PszKH3fbWzg

Are you doing enough to protect your business?

Sign up with CyberHoot today and sleep better knowing your

employees are cyber trained and on guard!


Sign Up Today!

Latest Blogs

Stay sharp with the latest security insights

Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.

Safe AI Adoption: Five Rules Every Business Must Follow

Safe AI Adoption: Five Rules Every Business Must Follow

Artificial Intelligence (AI) tools are entering our businesses like a new intern with great ideas but no...

Read more
From Fear to Feedback: Report Phishing Channel Works Wonders

From Fear to Feedback: Report Phishing Channel Works Wonders

CyberHoot believes security awareness should feel positive, empowering, and rewarding. Traditional phishing...

Read more
Why Security Culture is Critical — And How CyberHoot Makes It Stick

Why Security Culture is Critical — And How CyberHoot Makes It Stick

In today’s cybersecurity landscape, breaches are rarely caused by a lack of technology. Instead, they stem from...

Read more