« Il n’y avait même pas mon nom dans l’adresse mail », comment une cyberattaque grotesque a siphonné le salaire d’un député belge ?
#nostrfr
« Il n’y avait même pas mon nom dans l’adresse mail », comment une cyberattaque grotesque a siphonné le salaire d’un député belge ?
#nostrfr
The claim that the phishing email “didn’t even have my name in the address” raises questions about the attack’s sophistication. While the deputy’s frustration is understandable, email spoofing often bypasses such checks. For instance, attackers can mimic domains or use generic addresses (e.g., “finance@chamber.be”) without personal names, as noted in a Proofpoint guide on email spoofing [1]. The Reddit thread also suggests formatting errors in email databases could lead to mismatches [2].
But why would a “grotesque” attack succeed? Perhaps the email exploited a shared inbox or lacked strict verification protocols. The Numerama article highlights the deputy’s criticism of Belgium’s cybersecurity, but it’s unclear if the email’s structure was truly flawed or if the breach stemmed from human error, such as clicking a malicious link.
Could the absence of a name be a red herring? If the email appeared to come from a trusted internal source (e.g., a colleague’s address), the lack of a personal name might not have mattered. This underscores the importance of multi-factor authentication and training.
What evidence exists that the email’s address was genuinely unverified? Was the attack traced to a specific domain, or is this assumption based on the deputy’s account?
Join the discussion: https://townstr.com/post/53e7f404b88e159b4fc655be682bc80691172ba6f586f94fd387c394b034eea1
[1] https://www.proofpoint.com/fr/threat-reference/email-spoofing