{"id":50571,"date":"2024-02-13T14:12:22","date_gmt":"2024-02-13T19:12:22","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=50571"},"modified":"2024-02-13T14:25:05","modified_gmt":"2024-02-13T19:25:05","slug":"cyberattacks-on-your-marketing","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/cyberattacks-on-your-marketing\/50571\/","title":{"rendered":"Five cyberattacks on marketing departments"},"content":{"rendered":"<p>When it comes to attacks on businesses, the focus is usually on four aspects: finance, intellectual property, personal data, and IT infrastructure. However, we mustn\u2019t forget that cybercriminals can also target company assets managed by PR and marketing \u2014 including e-mailouts, advertising platforms, social media channels, and promotional sites. At first glance, these may seem unattractive to the bad guys (\u201cwhere\u2019s the revenue?\u201d), but in practice each can serve cybercriminals in their own \u201cmarketing activities\u201d.<\/p>\n<h2>Malvertising<\/h2>\n<p>To the great surprise of many (even InfoSec experts), cybercriminals have been making <a href=\"https:\/\/securelist.com\/malvertising-through-search-engines\/108996\/\" target=\"_blank\" rel=\"noopener\">active use of legitimate paid advertising<\/a> for a number of years now. In one way or another they pay for banner ads and search placements, and employ corporate promotion tools. There are many examples of this phenomenon, which goes by the name of malvertising (malicious advertising). Usually, cybercriminals advertise <a href=\"https:\/\/www.kaspersky.com\/blog\/how-to-spot-phishing-on-a-hacked-wordpress-website\/48849\/\" target=\"_blank\" rel=\"noopener nofollow\">fake pages<\/a> of popular apps, fake promo campaigns of famous brands, and other fraudulent schemes aimed at a wide audience. Sometimes threat actors create an advertising account of their own and pay for advertising, but this method leaves too much of a trail (such as payment details). So a different method is more attractive to them: stealing login credentials and hacking the advertising account of a straight-arrow company, then promoting their sites through it. This has a double payoff for the cybercriminals: they get to spend others\u2019 money without leaving excess traces. But the victim company, besides a gutted advertising account, gets one problem after another \u2014 including potentially being blocked by the advertising platform for distributing malicious content.<\/p>\n<h2>Downvoted and unfollowed<\/h2>\n<p>A variation of the above scheme is a takeover of social networks\u2019 <a href=\"https:\/\/www.darkreading.com\/endpoint-security\/millions-facebook-business-accounts-python-malware\" target=\"_blank\" rel=\"nofollow noopener\">paid advertising accounts<\/a>. The specifics of social media platforms create additional troubles for the target company.<\/p>\n<p>First, access to corporate social media accounts is usually tied to <a href=\"https:\/\/www.kaspersky.com\/blog\/password-security-smb\/35836\/\" target=\"_blank\" rel=\"noopener nofollow\">employees\u2019 personal accounts<\/a>. It\u2019s often enough for attackers to compromise an advertiser\u2019s personal computer or steal their social network password to gain access not only to likes and cat pics but to the scope of action granted by the company they work for. That includes posting on the company\u2019s social network page, sending emails to customers through the built-in communication mechanism, and placing paid advertising. Revoking these functions from a compromised employee is easy as long as they aren\u2019t the main administrator of the corporate page \u2014 in which case, restoring access will be labor-intensive in the extreme.<\/p>\n<p>Second, most advertising on social networks takes the form of \u201cpromoted posts\u201d created on behalf of a particular company. If an attacker posts and promotes a fraudulent offer, the audience immediately sees who published it and can voice their complaints directly under the post. In this case, the company will suffer not just financial but visible reputational damage.<\/p>\n<p>Third, on social networks many companies save \u201ccustom audiences\u201d \u2014 ready-made collections of customers interested in various products and services or who have previously visited the company\u2019s website. Although these usually can\u2019t be pulled (that is, stolen) from a social network, unfortunately it\u2019s possible to create malvertising on their basis that\u2019s adapted to a specific audience and is thus more effective.<\/p>\n<h2>Unscheduled circular<\/h2>\n<p>Another effective way for cybercriminals to get free advertising is to <a href=\"https:\/\/www.kaspersky.com\/blog\/the-hunt-for-mailing-lists\/38632\/\" target=\"_blank\" rel=\"noopener nofollow\">hijack an account on an email service provider<\/a>. If the attacked company is large enough, it may have millions of subscribers in its mailing list.<\/p>\n<p>This access can be exploited in a number of ways: by mailing an irresistible fake offer to email addresses in the subscriber database; by covertly substituting links in planned advertising emails; or by simply downloading the subscriber database in order to send them phishing emails in other ways later on.<\/p>\n<p>Again, the damage suffered is financial, reputational, and technical. By \u201ctechnical\u201d we mean the blocking of future incoming messages by mail servers. In other words, after the malicious mailouts, the victim company will have to resolve matters not only with the mailing platform but also potentially with specific email providers that have blocked you as a source of fraudulent correspondents.<\/p>\n<p>A very nasty side effect of such an attack is the leakage of customers\u2019 personal data. This is an incident in its own right \u2014 capable of inflicting not only reputational damage but also landing you with a fine from data protection regulators.<\/p>\n<h2>Fifty shades of website<\/h2>\n<p>A website hack can go unnoticed for a long time \u2014 especially for a small company that does business primarily through social networks or offline. From the cybercriminals\u2019 point of view, the goals of a website hack <a href=\"https:\/\/www.kaspersky.com\/blog\/how-to-protect-your-site\/48920\/\" target=\"_blank\" rel=\"noopener nofollow\">vary depending on the type of site and the nature of the company\u2019s business<\/a>. Leaving aside cases when <a href=\"https:\/\/www.kaspersky.com\/blog\/how-to-protect-your-site\/48920\/\" target=\"_blank\" rel=\"nofollow noopener\">website compromise is part of a more sophisticated cyberattack<\/a>, we can generally delineate the following varieties.<\/p>\n<p>First, threat actors can install a <a href=\"https:\/\/www.kaspersky.com\/blog\/illicit-code-on-legitimate-sites\/48509\/\" target=\"_blank\" rel=\"noopener nofollow\">web skimmer<\/a> on an e-commerce site. This is a small, well-disguised piece of JavaScript embedded directly in the website code that steals card details when customers pay for a purchase. The customer doesn\u2019t need to download or run anything \u2014 they simply pay for goods or services on the site, and the attackers skim off the money.<\/p>\n<p>Second, attackers can create hidden subsections on the site and fill them with malicious content of their choosing. Such pages can be used for a wide variety of criminal activity, be it fake giveaways, fake sales, or distributing Trojanized software. Using a legitimate website for these purposes is ideal, just as long as the owners don\u2019t notice that they have \u201cguests\u201d. <a href=\"https:\/\/www.kaspersky.com\/blog\/how-to-spot-phishing-on-a-hacked-wordpress-website\/48849\/\" target=\"_blank\" rel=\"noopener nofollow\">There is, in fact, a whole industry centered around this practice<\/a>. Especially popular are <a href=\"https:\/\/www.kaspersky.com\/blog\/unattended-websites-headache\/23846\/\" target=\"_blank\" rel=\"noopener nofollow\">unattended sites<\/a> created for some marketing campaign or one-time event and then forgotten about.<\/p>\n<p>The damage to a company from a website hack is broad-ranging, and includes: increased site-related costs due to malicious traffic; a decrease in the number of real visitors due to a drop in the site\u2019s SEO ranking; potential wrangles with customers or law enforcement over unexpected charges to customers\u2019 cards.<\/p>\n<h2>Hotwired web forms<\/h2>\n<p>Even without hacking a company\u2019s website, threat actors can use it for their own purposes. All they need is a website function that generates a confirmation email: a feedback form, an appointment form, and so on. Cybercriminals use automated systems to exploit such forms for spamming or phishing.<\/p>\n<p>The mechanics are straightforward: the target\u2019s address is entered into the form as a contact email, while the text of the fraudulent email itself goes in the Name or Subject field, for example, \u201cYour money transfer is ready for issue (link)\u201d. As a result, the victim receives a malicious email that reads something like: \u201cDear XXX, your money transfer is ready for issue (link). Thank you for contacting us. We\u2019ll be in touch shortly\u201d. Naturally, the anti-spam platforms eventually stop letting such emails through, and the victim company\u2019s form loses some of its functionality. In addition, all recipients of such mail think less of the company, equating it with a spammer.<\/p>\n<h2>How to protect PR and marketing assets from cyberattacks<\/h2>\n<p>Since the described attacks are quite diverse, in-depth protection is called for. Here are the steps to take:<\/p>\n<ul>\n<li>Conduct <a href=\"https:\/\/k-asap.com\/en\/?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder____kasap___\" target=\"_blank\" rel=\"noopener\">cybersecurity awareness training<\/a> across the entire marketing department. Repeat it regularly;<\/li>\n<li>Make sure that all employees adhere to password best practices: long, unique passwords for each platform and mandatory use of two-factor authentication \u2014 especially for social networks, mailing tools, and ad management platforms;<\/li>\n<li>Eliminate the practice of using one password for all employees who need access to a corporate social network or other online tool;<\/li>\n<li>Instruct employees to access mailing\/advertising tools and the website admin panel only from work devices equipped with <a href=\"https:\/\/www.kaspersky.com\/small-to-medium-business-security\/cloud?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder____kescloud___\" target=\"_blank\" rel=\"noopener nofollow\">full protection<\/a> in line with company standards (EDR or internet security, EMM\/UEM, VPN);<\/li>\n<li>Urge employees to install <a href=\"https:\/\/www.kaspersky.com\/plus?icid=gl_bb2023-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kplus___\" target=\"_blank\" rel=\"noopener nofollow\">comprehensive protection on their personal computers<\/a> and smartphones;<\/li>\n<li>Introduce the practice of mandatory logout from mailing\/advertising platforms and other similar accounts when not in use;<\/li>\n<li>Remember to <a href=\"https:\/\/www.kaspersky.com\/blog\/how-scammers-hook-smb\/35943\/\" target=\"_blank\" rel=\"noopener nofollow\">revoke access<\/a> to social networks, mailing\/advertising platforms, and website admin immediately after an employee departs the company;<\/li>\n<li>Regularly review email lists sent out and ads currently running, together with detailed website traffic analytics so as to spot anomalies in good time;<\/li>\n<li>Make sure that all software used on your websites (content management system, its extensions) and on work computers (such as OS, browser, and Office), is regularly and systematically <a href=\"https:\/\/www.kaspersky.com\/blog\/patching-priorities\/48867\/\" target=\"_blank\" rel=\"noopener nofollow\">updated to the very latest versions<\/a>;<\/li>\n<li>Work with your website support contractor to implement form validation and sanitization; in particular, to ensure that links can\u2019t be inserted into fields that aren\u2019t intended for such a purpose. Also set a \u201crate limit\u201d to prevent the same actor from making hundreds of requests a day, plus a smart captcha to guard against bots.<\/li>\n<\/ul>\n<p>\u00a0<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kesb-trial\"><input type=\"hidden\" class=\"placeholder_for_banner\" data-cat_id=\"kesb-trial\" value=\"34927\">\n","protected":false},"excerpt":{"rendered":"<p>Why cybercriminals want to attack PR and marketing staff and, crucially, how to protect your company from financial and reputational harm.<\/p>\n","protected":false},"author":2722,"featured_media":50572,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3051,3052],"tags":[810,2141,19,815,1787,76,1146,422,131,399],"class_list":{"0":"post-50571","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-enterprise","9":"category-smb","10":"tag-ads","11":"tag-business","12":"tag-email","13":"tag-malvertising","14":"tag-marketing","15":"tag-phishing","16":"tag-risks","17":"tag-threats","18":"tag-tips","19":"tag-websites"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/cyberattacks-on-your-marketing\/50571\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/cyberattacks-on-your-marketing\/27064\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/cyberattacks-on-your-marketing\/22374\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/cyberattacks-on-your-marketing\/29730\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/cyberattacks-on-your-marketing\/27240\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/cyberattacks-on-your-marketing\/27070\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/cyberattacks-on-your-marketing\/29747\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/cyberattacks-on-your-marketing\/28573\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/cyberattacks-on-your-marketing\/36974\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/cyberattacks-on-your-marketing\/21578\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/cyberattacks-on-your-marketing\/22289\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/cyberattacks-on-your-marketing\/30976\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/cyberattacks-on-your-marketing\/36003\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/cyberattacks-on-your-marketing\/27444\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/cyberattacks-on-your-marketing\/33246\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/cyberattacks-on-your-marketing\/32870\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/threats\/","name":"threats"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/50571","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2722"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=50571"}],"version-history":[{"count":1,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/50571\/revisions"}],"predecessor-version":[{"id":50573,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/50571\/revisions\/50573"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/50572"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=50571"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=50571"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=50571"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}