June 11, 2019

Attack Targeting AT&T Corporate Employees

Overview

On April 16, 2019, Lookout discovered a new phishing attack targeting AT&T employees. The attacker developed a copy of the AT&T Global portal login screen in an effort to steal user credentials including multi-factor identification values. The moment the attacker began building the phishing site, Lookout flagged it as suspicious and monitored its development.

First, the attacker registered a spoofed version of the AT&T domain. Next, Phishing AI applied computer vision to analyze the use of logos and graphics, resulting in a final conviction. Lookout quickly notified AT&T and continued to monitor changes until the malicious site was taken down.

Potential impact

AT&T employees would have risked having their accounts taken over, compromising their privacy and exposing themselves to fraud and identity theft. This login provides access to proprietary corporate applications and could have exposed AT&T to significant business risk as well as a longer term advanced persistent threat.

Early detection by Lookout Phishing AI

With its advanced Phishing & Content Protection technology, Lookout is able to identify early signals of a phishing attack and build protection for Lookout users, as well as provide early warning to Lookout partners before their customers are impacted.

Authors

Lookout

Cloud & Endpoint Security

Lookout, Inc. is the data-centric cloud security company that uses a defense-in-depth strategy to address the different stages of a modern cybersecurity attack. Data is at the core of every organization, and our approach to cybersecurity is designed to protect that data within today’s evolving threat landscape no matter where or how it moves.

Discovered By
Lookout
Threat Type
Phishing
Entry Type
Threat Summary
Platform(s) Affected
Lookout
Phishing
Threat Summary

Stop Cyberattacks Before They Start With Industry-Leading Threat Intelligence.

HeaderHeaderHeaderHeader
CellCellCellCell
CellCellCellCell
CellCellCellCell
CellCellCellCell