{"id":4730,"date":"2023-12-26T07:38:49","date_gmt":"2023-12-26T07:38:49","guid":{"rendered":"https:\/\/shreshtait.com\/blog\/?p=4730"},"modified":"2023-12-26T07:38:50","modified_gmt":"2023-12-26T07:38:50","slug":"the-rise-of-phishing-attacks-targeting-adobe-users-in-india","status":"publish","type":"post","link":"https:\/\/shreshtait.com\/blog\/2023\/12\/the-rise-of-phishing-attacks-targeting-adobe-users-in-india\/","title":{"rendered":"The rise of phishing attacks targeting Adobe users in India"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\" id=\"h-executive-summary\"><strong>Executive Summary<\/strong><\/h2>\n\n\n\n<p><a href=\"https:\/\/shreshtait.com\/blog\/\">Shreshta Threat Intelligence<\/a> has uncovered a rise in phishing attacks targeting Adobe users in India. The attack begins by sending emails to employees working at Micro Small and Medium Enterprises(MSME), large enterprises, and luring them to click on a link which impersonates a Purchase Order or a Work Order document.\u00a0<\/p>\n\n\n\n<p>The attack uses social engineering to deceive the user into believing that the PDF document contains a Purchase Order or a Work Order document and that they need to click on the link and login in order to access or download it.<\/p>\n\n\n\n<p>After reviewing the phishing campaign, we have concluded that this campaign operates by sending phishing URLs to enterprise users via email.<\/p>\n\n\n\n<p>The emails lure the user to log in, in order to view or download the documents, thereby deceiving them into providing their login credentials.<\/p>\n\n\n\n<p>The phishing attacks targeting Adobe users in India has seen a massive uptick in the past few months. <\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-about-adobe\"><strong>About Adobe<\/strong>\u00a0<\/h2>\n\n\n\n<p>Adobe Inc., formerly Adobe Systems Incorporated, is an American multinational computer software company incorporated in Delaware and headquartered in San Jose, California. It has historically specialized in software for creating and publishing a wide range of content, including graphics, photography, illustration, animation, multimedia\/video, motion pictures, and print. Its flagship products include Adobe Photoshop image editing software; Adobe Illustrator vector-based illustration software; Adobe Acrobat Reader and the Portable Document Format (PDF); and a host of tools primarily for audio-visual content creation, editing and publishing.<a href=\"https:\/\/en.wikipedia.org\/wiki\/Adobe_Inc.\"><sup>1<\/sup><\/a><\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-motive\"><strong>Motive<\/strong><\/h2>\n\n\n\n<p>We can share with moderate confidence that the motive of the threat actors is to harvest the user&#8217;s enterprise login credentials such as Microsoft Outlook, Office 365 etc that are used to access the services of Adobe.\u00a0<\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-technical-analysis-of-phishing-attacks-targeting-adobe-users-in-india\"><strong>Technical analysis of phishing attacks targeting Adobe users in India<\/strong><\/h2>\n\n\n\n<p>In this section, we will unpack how Adobe users in India are being specifically targeted and also share the techniques the threat actors are using to lure enterprise users in clicking the phishing websites.<\/p>\n\n\n\n<p><strong>Phishing website #1<\/strong><\/p>\n\n\n\n<p><strong><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/lh7-us.googleusercontent.com\/--wEr7M-x8hiq7mVIYr-4MVvolKQktNL1ec8wQks2hL8GDykXZg-9xkikJbuQcoqniUd86vxHWzJItGOXJ8O8EWSTER2cDlrE-iqE1I-Urwek5G9QPx_agh6KadSqtHlB48basY-e0dKUzUtYc_e2sA\" width=\"624\" height=\"192\"><\/strong><\/p>\n\n\n\n<p><em>Figure 1-<strong>\u00a0 <\/strong>The phishing page prompts the user to enter their Adobe Acrobat login credentials<\/em><\/p>\n\n\n\n<p>The phishing website\u00a0 contains links to the official Adobe Acrobat to make it appear legitimate. <\/p>\n\n\n\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/lh7-us.googleusercontent.com\/4MNtCgaEOUH7nxdC7vMMfvunG0iRQwaaX2o1oI0UY3gzJ889shZmIbNWQRl4qNmVJZQXSrlL7jWnhGfsDut3D3w4QOSaTQdMmXza2T6oktu1vGcTwT6voOxOmXmAwYJFSpDCM_dVJytoPCR8u4B6C3k\" width=\"624\" height=\"237\"><\/p>\n\n\n\n<p><em>Figure 2 &#8211; After entering the password, the website throws an error , stating,\u00a0 &#8220;Your email and password do not match. Please try again.&#8221;<\/em><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><strong>Phishing website #2<\/strong><\/p>\n\n\n\n<p><img loading=\"lazy\" decoding=\"async\" width=\"624\" height=\"308\" src=\"https:\/\/lh7-us.googleusercontent.com\/n4Bdmjo1Lrqt2GiACZtDx_m1ReIJHqskWgS_xzKaiC9rBHOJiHH3DKwB0bjuZsCTuvQvBUkKjQkUsP1BfVrzdMIkwG87VfC5OrAAmEgvo9dcEtehgHzwaQzbAvyzuChH18NMfPhmgsF1M-U3-pGdKMU\"><em>Figure 3 &#8211; The phishing website\u00a0 prompts the user to enter their login credentials to access the PDF document<\/em><br><\/p>\n\n\n\n<p><img loading=\"lazy\" decoding=\"async\" width=\"624\" height=\"313\" src=\"https:\/\/lh7-us.googleusercontent.com\/Ekj3pKtPSq1aVdwMLsXTYR8um4VOHFs8lARsDFqgqZ2LM6wRukJ6DnKrrI5sBvBDauB3t_9O5e_rMzcs-8QAiaOV9G5QOuuPBQbwXVsrvVvktaV9hU8u1QGQHGSrDm4u05NLOBrHsrnLQreJp0k923Q\"><em>Figure 4 &#8211; After entering the login credentials and clicking the \u201cVIEW DOCUMENT\u201d button, the user is redirected to a genuine Microsoft support page<\/em>\u00a0<\/p>\n\n\n\n<p><\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"409\" height=\"514\" src=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2023\/12\/image.png\" alt=\"\" class=\"wp-image-4761\" srcset=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2023\/12\/image.png 409w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2023\/12\/image-239x300.png 239w\" sizes=\"auto, (max-width: 409px) 100vw, 409px\" \/><\/figure>\n\n\n\n<p><em>Figure 5 &#8211; The phishing page prompts the user to enter their credentials. <br>The &#8220;Forgot Password\u201d is plain text without any associated links\u00a0<\/em><\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"409\" height=\"586\" src=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2023\/12\/image-1.png\" alt=\"\" class=\"wp-image-4762\" srcset=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2023\/12\/image-1.png 409w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2023\/12\/image-1-209x300.png 209w\" sizes=\"auto, (max-width: 409px) 100vw, 409px\" \/><\/figure>\n\n\n\n<p><em>Figure 6 &#8211; The phishing page throws a network connection error<\/em><\/p>\n\n\n\n<p>The phishing website is poorly constructed, users can only input data into the password field as the username field is grayed out.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><strong>Phishing website #3 <\/strong><img loading=\"lazy\" decoding=\"async\" width=\"624\" height=\"315\" src=\"https:\/\/lh7-us.googleusercontent.com\/Y8Oy6-l3QDjz8J28zjlQ5qzMq4Zv5V3sSuXMC-ruAAJkeRxtLG6ub7QHzdM7j6DRoF5pEOMhQLf6VJ5ND0nA5e0hzPF33Zyz2l5bi8zW0C5BrSR3bPejubkxR5fLL-Pq4UpkQwNph8nMLb8RJqYStO8\"><\/p>\n\n\n\n<p><em>Figure 7 &#8211; The phishing page prompts the user to enter their Adobe credentials to access, download or send files.<\/em><\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"1598\" height=\"806\" src=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2023\/12\/image-2.png\" alt=\"\" class=\"wp-image-4763\" srcset=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2023\/12\/image-2.png 1598w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2023\/12\/image-2-300x151.png 300w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2023\/12\/image-2-1024x516.png 1024w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2023\/12\/image-2-768x387.png 768w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2023\/12\/image-2-1536x775.png 1536w\" sizes=\"auto, (max-width: 1598px) 100vw, 1598px\" \/><\/figure>\n\n\n\n<p><em>Figure 8 &#8211; The phishing page prompts the error \u201cPlease fill in all the fields.\u201d after clicking \u201cLogin To View File\u201d<\/em><\/p>\n\n\n\n<p><strong>Phishing website #4<\/strong><\/p>\n\n\n\n<p><img loading=\"lazy\" decoding=\"async\" width=\"624\" height=\"315\" src=\"https:\/\/lh7-us.googleusercontent.com\/mLmcGMOTvpxyqo_LgYNRmmdCHxDoyyooncDxG_63IgtNo83_Z2MLKEZeDmV6c94gxZ4Fw1dQWWBglZkGXVJXHUkG515eni7c0EVDfRpwpNXiZhWX-LErttKkrV0VJ3quloUNkH74JZ3BzmQMt-BhMxU\"><em>Figure 9 &#8211; The phishing website prompts the user to download the document by clicking the \u201cDownload\u201d button<\/em><\/p>\n\n\n\n<p>After clicking the \u201cDownload\u201d button, a login pop-up prompts the user to enter their credentials in order to login and access the document.<\/p>\n\n\n\n<p><img loading=\"lazy\" decoding=\"async\" width=\"624\" height=\"315\" src=\"https:\/\/lh7-us.googleusercontent.com\/KG6mPXsVbXYEvksuS0tmNPRCZ0nXTsh0wvObhLNuYaWdClEKjAtBXjc2iQBK6nB4v4y0f4OvR649-PWJ8dvkDuCD0qnE7PndqQRaPjAet00So58YOe7_jKiNQrhwTcrjijP-QfIDLxN1rJNOI3JvqnI\"><em>Figure 10 &#8211; The phishing page prompts\u00a0 the user to enter his Adobe login credentials\u00a0<\/em><\/p>\n\n\n\n<p><strong>Phishing page #5 <\/strong><img loading=\"lazy\" decoding=\"async\" width=\"624\" height=\"267\" src=\"https:\/\/lh7-us.googleusercontent.com\/38munQKOYeonJiocuRRJPUt9alzwWMnXbvGFlPmyUKN9NAaOCXzGTa7K2Ul0gZ9BYDpO4A2DbPm_1-7VgeG9MO_YLq7jS2ML92w2mc4SSiiKIXFmJSpGF72d33tZgkRGtzoqZOAUCxIysN9cClQ-KVw\"><\/p>\n\n\n\n<p><em>Figure 11 &#8211; The phishing website prompts the user to login via their Outlook, Office365, or other mail credentials to view the protected document<\/em><\/p>\n\n\n\n<p><img loading=\"lazy\" decoding=\"async\" width=\"508\" height=\"487\" src=\"https:\/\/lh7-us.googleusercontent.com\/vcfoh-wQMWpMyjJEd_3h4aeOfFh7uM4nyrXKxw7Q09y73dAEgUfnN1JyNm11T8lQCBuJnJz1Ghf7Db2M2NeAu2CIIZPvdjeu3zRx94oYtmEzeVhhLLOd9X9GT_HjOukY_P2FrQxRwVdYofXbPJpzY1k\">\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0<br><em>Figure 12 &#8211; The phishing page prompts the user to enter their Outlook <br>login credentials<\/em><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><img loading=\"lazy\" decoding=\"async\" width=\"508\" height=\"551\" src=\"https:\/\/lh7-us.googleusercontent.com\/v4XFRFg1wWj_BaLsVaDGQvShj9lvwZD5fypP4tzI6KMT2nvON1KCNQLMMK1x_t866eL3xKHUIxWoAE8-jB2aGqan-UselSu_x7PPf9OafxvNEr9CssHKImiFUZXBegQOpUtjgotz6CjbNIUlDg80leI\">\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 <br><em>Figure 13 &#8211; After entering credentials the phishing page shows an <br>error message to the user\u00a0<\/em><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><img loading=\"lazy\" decoding=\"async\" width=\"508\" height=\"485\" src=\"https:\/\/lh7-us.googleusercontent.com\/UUsMY8A1FbGoadC7VkPqhEPw2A4ryzROMBrHUQIllwcw3DKEQ-RUh9EZ1Kx5JoQtCGmcXwcNDNFtNaWpS8lnog320LU-iR7tzZE_W21XCOn3yJ9Ye_PULCMNbsUi33_IwTEVr-6xCepwnvGtDGabOFQ\">\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 <br><em>Figure 14 &#8211; The phishing page prompts the user to enter their <br>Office 365 login credentials<\/em><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><img loading=\"lazy\" decoding=\"async\" width=\"508\" height=\"551\" src=\"https:\/\/lh7-us.googleusercontent.com\/fKQi76xCFh097Lhj785slDIYPGsJ1jnV_RPDb2MfzqU1RGJgTSO95hiP8Zp2Dq2RlvQQQjCtIO167Q5OD6j6B6xr1FmiHKvdJBCowrFkX1O_IyVHE2NkRCQkLqXJ-Sh9uwLv_yz8CrIZcUxQjqxGkcY\">\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 <br><em>Figure &#8211; 15 After entering credentials the phishing page shows <br>an error message to the user\u00a0<\/em><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><img loading=\"lazy\" decoding=\"async\" width=\"508\" height=\"484\" src=\"https:\/\/lh7-us.googleusercontent.com\/rkf_Gm-xKgWJ9NzaIP0Awd-Cy5vEN084bgblM4Tm8qD8oUUWwUZg_eX5b9MU7Cs03Agi713u_ebR1dvbqw3ZDQyl-KQTk0-VOs9PSq8lpSFrO9v1EGy2Rk8lieQVjHzYHyZPLmLKm9HGnCk58F4gYlc\">\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 <em>Figure 16 &#8211; The phishing website also prompts the user to enter <br>via other mail credential of the user<\/em><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><img loading=\"lazy\" decoding=\"async\" width=\"508\" height=\"551\" src=\"https:\/\/lh7-us.googleusercontent.com\/qXAU9zyNPT5ROnywuIe_oKZGU03Gk8l9iY3cQlg8VEK-1qIqtHZ-ceLRKm5t-G9zlONx0Np91IjxhwqX7ypX0CGUTnEgnbtJU6vpTDUrvMrBh4gHvvpiChRwVlRyrU4cHeYMgKFsnieNSxooF8RSucw\">\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 <br><em>Figure 17 &#8211; Upon entering the credentials the phishing page shows <br>and error<\/em>\u00a0<\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-safety-recommendations\"><strong>Safety Recommendations<\/strong><\/h2>\n\n\n\n<ol class=\"wp-block-list\">\n<li>&nbsp;An SMS\/email\/Whatsapp message with a tone of urgency should be dealt with with extreme caution. This is true, especially in the case of any message from any organization.<\/li>\n\n\n\n<li>Always reach out with the organization and verify suspicious messages\/emails before taking any action at your end.&nbsp;<\/li>\n\n\n\n<li>If you become a victim of cybercrime, particularly financial crime, call the national (India) cybercrime helpline 1930 or file a complaint at <a href=\"https:\/\/cybercrime.gov.in\/\">https:\/\/cybercrime.gov.in\/<\/a>&nbsp;<\/li>\n\n\n\n<li><a href=\"https:\/\/shreshtait.com\/\">Shreshta Protective DNS<\/a> blocks phishing, malware, newly registered domain names and other malicious communication in real-time. For enterprises, please email info@shreshtait.com for a free 30-day trial.\u00a0<br><\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-conclusion\"><strong>Conclusion<\/strong><\/h2>\n\n\n\n<p>With the growing cyber threat landscape, threat actors continue to operate phishing campaigns at scale and it\u2019s important to stay vigilant and not fall prey to phishing scams.&nbsp;<\/p>\n\n\n\n<p>By staying informed and vigilant, users can significantly mitigate the risk of falling victim to these sophisticated attacks.<br><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-free-30-day-trial-of-our-threat-intelligence\"><strong>Free 30-day trial of our threat intelligence<\/strong><\/h2>\n\n\n\n<p>Threat actors constantly optimise and evolve their attacks to steal credentials and data and infiltrate networks. Our threat intelligence feeds are highly actionable and curated to protect against phishing, malware, C2 and newly registered domain names.&nbsp;<\/p>\n\n\n\n<p>Interested? Please send us an email to info@shreshtait.com for a free 30-day trial.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-references\"><strong>References<\/strong><\/h2>\n\n\n\n<p>A few other blog posts that you might be interested in,<\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-wp-embed is-provider-shreshta-blog wp-block-embed-shreshta-blog\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"wp-embedded-content\" data-secret=\"wLMC7Q0MA9\"><a href=\"https:\/\/shreshtait.com\/blog\/2023\/12\/phishing-campaign-targeting-state-bank-of-india-users\/\">Phishing Campaign targeting State Bank of India users<\/a><\/blockquote><iframe loading=\"lazy\" class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; visibility: hidden;\" title=\"&#8220;Phishing Campaign targeting State Bank of India users&#8221; &#8212; DNS Security &amp; Threat Intelligence Blog | Shreshta\" src=\"https:\/\/shreshtait.com\/blog\/2023\/12\/phishing-campaign-targeting-state-bank-of-india-users\/embed\/#?secret=gONfgbGpZT#?secret=wLMC7Q0MA9\" data-secret=\"wLMC7Q0MA9\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe>\n<\/div><\/figure>\n\n\n\n<figure class=\"wp-block-embed is-type-wp-embed is-provider-shreshta-blog wp-block-embed-shreshta-blog\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"wp-embedded-content\" data-secret=\"611yuuo1YK\"><a href=\"https:\/\/shreshtait.com\/blog\/2023\/12\/hdfc-bank-customers-targeted-by-a-sophisticated-phishing-scam\/\">HDFC Bank customers targeted by a sophisticated Phishing Scam<\/a><\/blockquote><iframe loading=\"lazy\" class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; visibility: hidden;\" title=\"&#8220;HDFC Bank customers targeted by a sophisticated Phishing Scam&#8221; &#8212; DNS Security &amp; Threat Intelligence Blog | Shreshta\" src=\"https:\/\/shreshtait.com\/blog\/2023\/12\/hdfc-bank-customers-targeted-by-a-sophisticated-phishing-scam\/embed\/#?secret=kMOl0278kF#?secret=611yuuo1YK\" data-secret=\"611yuuo1YK\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe>\n<\/div><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Executive Summary Shreshta Threat Intelligence has uncovered a rise in phishing attacks targeting Adobe users in India. The attack begins by sending emails to employees working at Micro Small and Medium Enterprises(MSME), large enterprises, and luring them to click on a link which impersonates a Purchase Order or a Work Order document.\u00a0 The attack uses [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":4759,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[44,42],"tags":[100,45,76,101,48,46,47],"class_list":["post-4730","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-protective-dns","category-threat-intelligence","tag-adobe","tag-dns","tag-india","tag-microsoft","tag-phishing","tag-protective-dns","tag-threat-intelligence"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.0 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>DNS Security &amp; Threat Intelligence Blog | Shreshta<\/title>\n<meta name=\"description\" content=\"The rise of phishing attacks targeting Adobe users in India. Learn about the phishing techniques used by attackers in this in-depth analysis.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/shreshtait.com\/blog\/2023\/12\/the-rise-of-phishing-attacks-targeting-adobe-users-in-india\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The rise of phishing attacks targeting Adobe users in India\" \/>\n<meta property=\"og:description\" content=\"The rise of phishing attacks targeting Adobe users in India. Learn about the phishing techniques used by attackers in this in-depth analysis.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/shreshtait.com\/blog\/2023\/12\/the-rise-of-phishing-attacks-targeting-adobe-users-in-india\/\" \/>\n<meta property=\"og:site_name\" content=\"DNS Security &amp; Threat Intelligence Blog | Shreshta\" \/>\n<meta property=\"article:published_time\" content=\"2023-12-26T07:38:49+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-12-26T07:38:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2023\/12\/DALL\u00b7E-2023-12-26-13.01.00-A-creative-image-showing-a-PDF-document-attached-to-a-fishing-hook-or-pole-symbolizing-a-phishing-attack.-The-PDF-document-should-have-an-icon-or-lab.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"1024\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Swapneel Patnekar\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@shreshtait\" \/>\n<meta name=\"twitter:site\" content=\"@shreshtait\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Swapneel Patnekar\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/2023\\\/12\\\/the-rise-of-phishing-attacks-targeting-adobe-users-in-india\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/2023\\\/12\\\/the-rise-of-phishing-attacks-targeting-adobe-users-in-india\\\/\"},\"author\":{\"name\":\"Swapneel Patnekar\",\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/#\\\/schema\\\/person\\\/9193d733c00e1d16e59261d57c852484\"},\"headline\":\"The rise of phishing attacks targeting Adobe users in India\",\"datePublished\":\"2023-12-26T07:38:49+00:00\",\"dateModified\":\"2023-12-26T07:38:50+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/2023\\\/12\\\/the-rise-of-phishing-attacks-targeting-adobe-users-in-india\\\/\"},\"wordCount\":934,\"publisher\":{\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/2023\\\/12\\\/the-rise-of-phishing-attacks-targeting-adobe-users-in-india\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/DALL\u00b7E-2023-12-26-13.01.00-A-creative-image-showing-a-PDF-document-attached-to-a-fishing-hook-or-pole-symbolizing-a-phishing-attack.-The-PDF-document-should-have-an-icon-or-lab.png\",\"keywords\":[\"adobe\",\"dns\",\"india\",\"microsoft\",\"phishing\",\"protective dns\",\"threat intelligence\"],\"articleSection\":[\"Protective DNS\",\"Threat Intelligence\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/2023\\\/12\\\/the-rise-of-phishing-attacks-targeting-adobe-users-in-india\\\/\",\"url\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/2023\\\/12\\\/the-rise-of-phishing-attacks-targeting-adobe-users-in-india\\\/\",\"name\":\"\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/2023\\\/12\\\/the-rise-of-phishing-attacks-targeting-adobe-users-in-india\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/2023\\\/12\\\/the-rise-of-phishing-attacks-targeting-adobe-users-in-india\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/DALL\u00b7E-2023-12-26-13.01.00-A-creative-image-showing-a-PDF-document-attached-to-a-fishing-hook-or-pole-symbolizing-a-phishing-attack.-The-PDF-document-should-have-an-icon-or-lab.png\",\"datePublished\":\"2023-12-26T07:38:49+00:00\",\"dateModified\":\"2023-12-26T07:38:50+00:00\",\"description\":\"The rise of phishing attacks targeting Adobe users in India. Learn about the phishing techniques used by attackers in this in-depth analysis.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/2023\\\/12\\\/the-rise-of-phishing-attacks-targeting-adobe-users-in-india\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/shreshtait.com\\\/blog\\\/2023\\\/12\\\/the-rise-of-phishing-attacks-targeting-adobe-users-in-india\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/2023\\\/12\\\/the-rise-of-phishing-attacks-targeting-adobe-users-in-india\\\/#primaryimage\",\"url\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/DALL\u00b7E-2023-12-26-13.01.00-A-creative-image-showing-a-PDF-document-attached-to-a-fishing-hook-or-pole-symbolizing-a-phishing-attack.-The-PDF-document-should-have-an-icon-or-lab.png\",\"contentUrl\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/DALL\u00b7E-2023-12-26-13.01.00-A-creative-image-showing-a-PDF-document-attached-to-a-fishing-hook-or-pole-symbolizing-a-phishing-attack.-The-PDF-document-should-have-an-icon-or-lab.png\",\"width\":1024,\"height\":1024,\"caption\":\"adobe phishing attack\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/2023\\\/12\\\/the-rise-of-phishing-attacks-targeting-adobe-users-in-india\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The rise of phishing attacks targeting Adobe users in India\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/\",\"name\":\"DNS Security &amp; Threat Intelligence Blog | Shreshta\",\"description\":\"DNS Security &amp; Threat Intelligence\",\"publisher\":{\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/#organization\",\"name\":\"Shreshta IT Technologies Pvt. Ltd.\",\"alternateName\":\"Shreshta\",\"url\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/Shreshta.svg\",\"contentUrl\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/Shreshta.svg\",\"width\":330,\"height\":76,\"caption\":\"Shreshta IT Technologies Pvt. Ltd.\"},\"image\":{\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/shreshtait\",\"https:\\\/\\\/infosec.exchange\\\/@shreshta\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/shreshta\\\/\"],\"description\":\"DNS security and threat intelligence company providing real-time threat protection for organizations worldwide. Our solutions include DNS Shield (Protective DNS), DNS Watchtower (Passive DNS), and comprehensive threat intelligence feeds. Trusted by enterprises to detect, prevent, and investigate cyber threats at the DNS layer.\",\"email\":\"sales@shreshtait.com\",\"legalName\":\"Shreshta IT Technologies Pvt. Ltd.\",\"foundingDate\":\"2014-01-22\",\"numberOfEmployees\":{\"@type\":\"QuantitativeValue\",\"minValue\":\"11\",\"maxValue\":\"50\"},\"publishingPrinciples\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/blog\\\/\"},[{\"@type\":[\"Person\"],\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/#\\\/schema\\\/person\\\/9193d733c00e1d16e59261d57c852484\",\"name\":\"Swapneel Patnekar\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b8a02ca124e85d2be9710cbbca4d5e3abdaeac895af98732bc4b2bd953879e78?s=96&d=mm&r=g\",\"inLanguage\":\"en_US\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b8a02ca124e85d2be9710cbbca4d5e3abdaeac895af98732bc4b2bd953879e78?s=96&d=mm&r=g\",\"caption\":\"Swapneel Patnekar\"}},{\"@type\":[\"Person\"],\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/#\\\/schema\\\/person\\\/9193d733c00e1d16e59261d57c852484\",\"name\":\"Pranay Patil\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b8a02ca124e85d2be9710cbbca4d5e3abdaeac895af98732bc4b2bd953879e78?s=96&d=mm&r=g\",\"inLanguage\":\"en_US\",\"url\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/Screenshot-2023-01-27-at-11.09.13-PM.png\",\"caption\":\"Pranay Patil\"}}]]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"DNS Security &amp; Threat Intelligence Blog | Shreshta","description":"The rise of phishing attacks targeting Adobe users in India. Learn about the phishing techniques used by attackers in this in-depth analysis.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/shreshtait.com\/blog\/2023\/12\/the-rise-of-phishing-attacks-targeting-adobe-users-in-india\/","og_locale":"en_US","og_type":"article","og_title":"The rise of phishing attacks targeting Adobe users in India","og_description":"The rise of phishing attacks targeting Adobe users in India. Learn about the phishing techniques used by attackers in this in-depth analysis.","og_url":"https:\/\/shreshtait.com\/blog\/2023\/12\/the-rise-of-phishing-attacks-targeting-adobe-users-in-india\/","og_site_name":"DNS Security &amp; Threat Intelligence Blog | Shreshta","article_published_time":"2023-12-26T07:38:49+00:00","article_modified_time":"2023-12-26T07:38:50+00:00","og_image":[{"width":1024,"height":1024,"url":"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2023\/12\/DALL\u00b7E-2023-12-26-13.01.00-A-creative-image-showing-a-PDF-document-attached-to-a-fishing-hook-or-pole-symbolizing-a-phishing-attack.-The-PDF-document-should-have-an-icon-or-lab.png","type":"image\/png"}],"author":"Swapneel Patnekar","twitter_card":"summary_large_image","twitter_creator":"@shreshtait","twitter_site":"@shreshtait","twitter_misc":{"Written by":"Swapneel Patnekar","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/shreshtait.com\/blog\/2023\/12\/the-rise-of-phishing-attacks-targeting-adobe-users-in-india\/#article","isPartOf":{"@id":"https:\/\/shreshtait.com\/blog\/2023\/12\/the-rise-of-phishing-attacks-targeting-adobe-users-in-india\/"},"author":{"name":"Swapneel Patnekar","@id":"https:\/\/shreshtait.com\/blog\/#\/schema\/person\/9193d733c00e1d16e59261d57c852484"},"headline":"The rise of phishing attacks targeting Adobe users in India","datePublished":"2023-12-26T07:38:49+00:00","dateModified":"2023-12-26T07:38:50+00:00","mainEntityOfPage":{"@id":"https:\/\/shreshtait.com\/blog\/2023\/12\/the-rise-of-phishing-attacks-targeting-adobe-users-in-india\/"},"wordCount":934,"publisher":{"@id":"https:\/\/shreshtait.com\/blog\/#organization"},"image":{"@id":"https:\/\/shreshtait.com\/blog\/2023\/12\/the-rise-of-phishing-attacks-targeting-adobe-users-in-india\/#primaryimage"},"thumbnailUrl":"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2023\/12\/DALL\u00b7E-2023-12-26-13.01.00-A-creative-image-showing-a-PDF-document-attached-to-a-fishing-hook-or-pole-symbolizing-a-phishing-attack.-The-PDF-document-should-have-an-icon-or-lab.png","keywords":["adobe","dns","india","microsoft","phishing","protective dns","threat intelligence"],"articleSection":["Protective DNS","Threat Intelligence"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/shreshtait.com\/blog\/2023\/12\/the-rise-of-phishing-attacks-targeting-adobe-users-in-india\/","url":"https:\/\/shreshtait.com\/blog\/2023\/12\/the-rise-of-phishing-attacks-targeting-adobe-users-in-india\/","name":"","isPartOf":{"@id":"https:\/\/shreshtait.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/shreshtait.com\/blog\/2023\/12\/the-rise-of-phishing-attacks-targeting-adobe-users-in-india\/#primaryimage"},"image":{"@id":"https:\/\/shreshtait.com\/blog\/2023\/12\/the-rise-of-phishing-attacks-targeting-adobe-users-in-india\/#primaryimage"},"thumbnailUrl":"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2023\/12\/DALL\u00b7E-2023-12-26-13.01.00-A-creative-image-showing-a-PDF-document-attached-to-a-fishing-hook-or-pole-symbolizing-a-phishing-attack.-The-PDF-document-should-have-an-icon-or-lab.png","datePublished":"2023-12-26T07:38:49+00:00","dateModified":"2023-12-26T07:38:50+00:00","description":"The rise of phishing attacks targeting Adobe users in India. Learn about the phishing techniques used by attackers in this in-depth analysis.","breadcrumb":{"@id":"https:\/\/shreshtait.com\/blog\/2023\/12\/the-rise-of-phishing-attacks-targeting-adobe-users-in-india\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/shreshtait.com\/blog\/2023\/12\/the-rise-of-phishing-attacks-targeting-adobe-users-in-india\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/shreshtait.com\/blog\/2023\/12\/the-rise-of-phishing-attacks-targeting-adobe-users-in-india\/#primaryimage","url":"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2023\/12\/DALL\u00b7E-2023-12-26-13.01.00-A-creative-image-showing-a-PDF-document-attached-to-a-fishing-hook-or-pole-symbolizing-a-phishing-attack.-The-PDF-document-should-have-an-icon-or-lab.png","contentUrl":"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2023\/12\/DALL\u00b7E-2023-12-26-13.01.00-A-creative-image-showing-a-PDF-document-attached-to-a-fishing-hook-or-pole-symbolizing-a-phishing-attack.-The-PDF-document-should-have-an-icon-or-lab.png","width":1024,"height":1024,"caption":"adobe phishing attack"},{"@type":"BreadcrumbList","@id":"https:\/\/shreshtait.com\/blog\/2023\/12\/the-rise-of-phishing-attacks-targeting-adobe-users-in-india\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/shreshtait.com\/blog\/"},{"@type":"ListItem","position":2,"name":"The rise of phishing attacks targeting Adobe users in India"}]},{"@type":"WebSite","@id":"https:\/\/shreshtait.com\/blog\/#website","url":"https:\/\/shreshtait.com\/blog\/","name":"DNS Security &amp; Threat Intelligence Blog | Shreshta","description":"DNS Security &amp; Threat Intelligence","publisher":{"@id":"https:\/\/shreshtait.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/shreshtait.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/shreshtait.com\/blog\/#organization","name":"Shreshta IT Technologies Pvt. Ltd.","alternateName":"Shreshta","url":"https:\/\/shreshtait.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/shreshtait.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2023\/03\/Shreshta.svg","contentUrl":"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2023\/03\/Shreshta.svg","width":330,"height":76,"caption":"Shreshta IT Technologies Pvt. Ltd."},"image":{"@id":"https:\/\/shreshtait.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/shreshtait","https:\/\/infosec.exchange\/@shreshta","https:\/\/www.linkedin.com\/company\/shreshta\/"],"description":"DNS security and threat intelligence company providing real-time threat protection for organizations worldwide. Our solutions include DNS Shield (Protective DNS), DNS Watchtower (Passive DNS), and comprehensive threat intelligence feeds. Trusted by enterprises to detect, prevent, and investigate cyber threats at the DNS layer.","email":"sales@shreshtait.com","legalName":"Shreshta IT Technologies Pvt. Ltd.","foundingDate":"2014-01-22","numberOfEmployees":{"@type":"QuantitativeValue","minValue":"11","maxValue":"50"},"publishingPrinciples":"https:\/\/shreshtait.com\/blog\/blog\/"},[{"@type":["Person"],"@id":"https:\/\/shreshtait.com\/blog\/#\/schema\/person\/9193d733c00e1d16e59261d57c852484","name":"Swapneel Patnekar","image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/b8a02ca124e85d2be9710cbbca4d5e3abdaeac895af98732bc4b2bd953879e78?s=96&d=mm&r=g","inLanguage":"en_US","url":"https:\/\/secure.gravatar.com\/avatar\/b8a02ca124e85d2be9710cbbca4d5e3abdaeac895af98732bc4b2bd953879e78?s=96&d=mm&r=g","caption":"Swapneel Patnekar"}},{"@type":["Person"],"@id":"https:\/\/shreshtait.com\/blog\/#\/schema\/person\/9193d733c00e1d16e59261d57c852484","name":"Pranay Patil","image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/b8a02ca124e85d2be9710cbbca4d5e3abdaeac895af98732bc4b2bd953879e78?s=96&d=mm&r=g","inLanguage":"en_US","url":"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2023\/01\/Screenshot-2023-01-27-at-11.09.13-PM.png","caption":"Pranay Patil"}}]]}},"_links":{"self":[{"href":"https:\/\/shreshtait.com\/blog\/wp-json\/wp\/v2\/posts\/4730","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/shreshtait.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/shreshtait.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/shreshtait.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/shreshtait.com\/blog\/wp-json\/wp\/v2\/comments?post=4730"}],"version-history":[{"count":31,"href":"https:\/\/shreshtait.com\/blog\/wp-json\/wp\/v2\/posts\/4730\/revisions"}],"predecessor-version":[{"id":7877,"href":"https:\/\/shreshtait.com\/blog\/wp-json\/wp\/v2\/posts\/4730\/revisions\/7877"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/shreshtait.com\/blog\/wp-json\/wp\/v2\/media\/4759"}],"wp:attachment":[{"href":"https:\/\/shreshtait.com\/blog\/wp-json\/wp\/v2\/media?parent=4730"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/shreshtait.com\/blog\/wp-json\/wp\/v2\/categories?post=4730"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/shreshtait.com\/blog\/wp-json\/wp\/v2\/tags?post=4730"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}