Case lead Frank Breedijk
Researchers: Bauke Gehem
At the end of November 2020, criminals engaged in a phishing campaign mimicking Zoom message invites and a message on mail quarantine. This campaign was reported on Twitter by TheAnalyst.
While researching this phishing campaign, Bauke Gehem of Summa College, discovered that the phishing infrastructure used by the criminals was not properly secured and leaked the captured usernames and passwords because of unsecured directories. From a partner CERT, DIVD CSIRT has been given the Dutch part of the harvested credentials to inform potential victims.
After an internal discussion we came to the conclusion that victims of the attack should be informed. We started processing the data internally to prepare for informing the victims and to give them some additional advice on how to proceed. Since we received the Dutch part of the data it was decided to write the emails in Dutch and English.
On 1-1-2021 email notifications were sent to the victims of the phishing campaign. A total of 370 emails were sent.
As there was no new information and the victims were informed, the case was closed after the emails were sent. Involved researchers deleted their local data, with only report writing waiting to be done. This was done in June 2021.
Date Description 29-11-2020 Phishing campaign reported on Twitter 08-12-2020 Dutch list received by DIVD CSIRT 08-12-2020 - 20-12-2020 Internal discussion about how to best handle cases like this 1-1-2021 Emails sent 22-06-2021 This report was written