SAP Concur impersonation attack tricks employees with a fake “report pending approval” notification

Post hero image

Table of contents

In the world of cybersecurity, there is no shortage of threats that individuals and organizations must be aware of. From phishing campaigns to malware attacks, it seems that the bad actors behind these threats are always finding new and innovative ways to exploit unsuspecting victims.

One such threat that has recently come to our attention is an SAP alert impersonation that utilizes a realistic-looking template to trick users into clicking on a malicious link. This campaign is particularly dangerous, as it is designed to steal the user's login credentials when entered into the fake SAP report.

What makes this threat even more insidious is the fact that the 'From' field has been spoofed to show the email originating from Concur Solutions, a legitimate company. This is a clear indication that the phishers behind this campaign are using advanced tactics to trick users into falling for their trap.

If you receive an email claiming to be from SAP, it's important to be extra cautious. Always take the time to carefully review the email and verify that it's legitimate before clicking on any links or downloading any attachments. If you're unsure, it's always best to err on the side of caution and delete the email.

In conclusion, this latest SAP alert impersonation campaign is just one example of the many threats that individuals and organizations face in the digital age. By remaining vigilant and taking proactive steps to protect yourself, you can help ensure that your personal information remains safe and secure. So stay alert and don't let the phishers fool you!

Hoxhunt empowers your employees to shield your organization from threats. Our phishing training is trusted by the world’s leading cybersecurity professionals - maximizing training outcomes by serving every user a personalized learning path that measurably changes behavior.

Want to learn more?
Be sure to check out these articles recommended by the author:
Get more cybersecurity insights like this