The Unhappy Boss
A common strategy of attackers is to not only identify personnel associated with the target but to also identify the relationships between those personnel as well as their interests and corporate culture. If the phisher can craft a message that makes it seem like it is coming from a victim’s trusted colleague, or better yet, the victim’s boss, then the attacker gains an advantage by spoofing a trusted entity. The message below is an example of a phishing campaign that leverages this technique....