See How Hackers Gain Access to Transactions

February 13, 2020

Hackers are using methods such as email phishing and hijacking, malware, unsecured webpages, fraudulent email attachments, and wire fraud to gain access to your correspondence with clients and steal their personal information. Proofpoint, a cybersecurity firm, recently examined more than 600 instances in which hackers attempted to attack real estate transactions to find out how cybercriminals are infiltrating the industry.

For example, Proofpoint’s report contained the following example of “spearphishing” with a spoofed Office 365 login page that had been sent to the CEO of a major real estate brokerage. The hackers’ goal was to get the CEO’s username and password.

screenshot of password log field

“Targeting of credentials for later use like this is an increasingly common tactic against players at all points in the real estate transaction chain,” Proofpoint’s report notes. “In addition to online services like Office 365, our researchers found that document sharing and digital signature platforms like DocuSign were popular targets for spoofing this type of attack.”

The Proofpoint report also contained the following example of what appears to be a secured document sent through email. However, if the user clicks on the attachment, malware will be deployed into his or her system.

"secured" document screenshot