home.aspx
 
. https://www.proofpoint.com/us/corporate-blog/post/how-fight-phishing-attacks-real-world-examples-and-solutions
blog article
HOW TO FIGHT PHISHING ATTACKS: REAL-WORLD EXAMPLES AND SOLUTIONS
At Proofpoint, we have seen a rise in highly targeted phishing attacks. 30% of organizations whose O365 environments we've analyzed suffered compromised accounts, mostly via brute force attacks on their O365 credentials. Sometimes these phishing attacks lead to compromised accounts that attackers can then use to carry on future attacks and start stealing confidential data. How does this type of email attack unfold? Here’s a breakdown: Attackers compromise (or buy stolen credentials for) legitimate business email accounts. They then iterate through messages in the victim’s inbox/archive and reply to each one with a malicious document. Because the malicious documents are being sent in response to a legitimate business email, human recipients are (probably) much more likely to engage with this content. READ MORE