Email Security Alert—Now Avatars Can Steal Your Passwords

Forbes - Jan 25th, 2025
Open on Forbes

A recent report highlights a new dimension in cybersecurity threats, focusing on credential harvesting through the use of avatars in phishing attacks. Cybercriminals are exploiting platforms like Gravatar to create convincing fake profiles that mimic legitimate services, tricking users into surrendering their passwords. This development, as explained by Stephen Kowski from SlashNext, represents an evolution in phishing tactics, employing unique and customized impersonations that are harder to detect. Gravatar, a service managing web avatars, has become a prime target due to its Profiles-as-a-Service functionality, which attackers manipulate to deceive unsuspecting users.

In response to these threats, Gravatar emphasizes its commitment to security, employing measures such as requiring users to verify account ownership and actively monitoring for fraudulent profiles. The SlashNext report advises users to verify URLs, be cautious with unsolicited emails, utilize strong and unique passwords, and enable two-factor authentication to mitigate the risks of these sophisticated phishing attacks. The findings underscore the importance of adopting robust security practices to protect against evolving cyber threats, with avatars now being a significant tool in the arsenal of hackers.

Story submitted by Fairstory

RATING

6.8
Fair Story
Consider it well-founded

The article provides a timely and relevant discussion of cybersecurity threats involving avatars and AI-driven phishing attacks. It effectively raises public awareness and offers practical advice for users to enhance their security practices. The article is well-structured and clear, making complex topics accessible to a general audience. However, it could benefit from greater balance by incorporating diverse perspectives and more detailed verification of specific claims. The reliance on a limited number of sources slightly affects the overall source quality, and increased transparency regarding the research methodology would enhance reliability. Overall, the article serves as a valuable resource for understanding and mitigating evolving cybersecurity threats.

RATING DETAILS

7
Accuracy

The article presents several factual claims that align with known cybersecurity trends, such as the use of avatars in phishing attacks and the role of AI in enhancing these attacks. The mention of over a billion passwords being stolen by malware is consistent with recent cybersecurity reports. However, the article could benefit from more specific examples or case studies to substantiate claims, such as the specific use of ProtonMail in phishing attacks. The article's accuracy is generally supported by existing knowledge, but it lacks detailed verification for some specific claims.

6
Balance

The article primarily focuses on the perspective of cybersecurity experts, particularly Stephen Kowski from SlashNext, and a spokesperson from Gravatar. While it provides valuable insights into the threat landscape, it does not incorporate perspectives from independent cybersecurity analysts or affected users. This creates a potential imbalance, as the article might not fully represent the range of opinions and experiences related to the topic. Including diverse viewpoints would enhance the article's balance.

8
Clarity

The article is generally clear and well-structured, with a logical flow from the introduction of the threat to potential mitigation measures. The language is straightforward and accessible, making the complex topic of cybersecurity understandable to a general audience. However, some technical terms, such as 'Profiles-as-a-Service' and 'OAuth,' might require further explanation for readers unfamiliar with cybersecurity jargon. Overall, the article maintains clarity and coherence.

7
Source quality

The article relies on credible sources, such as Stephen Kowski, a field chief technology officer at SlashNext, and a spokesperson from Gravatar. These sources are authoritative in the field of cybersecurity, lending credibility to the claims made. However, the article could improve by referencing additional independent sources or studies to provide a broader context and verify claims. The reliance on a limited number of sources slightly affects the overall source quality.

6
Transparency

The article provides some transparency by quoting experts and a Gravatar spokesperson, which helps readers understand the basis of the claims. However, it lacks detailed explanations of the research methodology or data supporting the claims. For example, it mentions a 'newly published report' without specifying the source or providing a link to the full report. Greater transparency regarding the sources and data would enhance the article's reliability.

Sources

  1. https://mobileidworld.com/__trashed-363/
  2. https://emailsecurity.fortra.com/resources/datasheets/stop-identity-based-email-attacks
  3. https://thehackernews.com/2025/01/the-10-cyber-threat-responsible-for.html
  4. https://www.inky.com/en/blog/clever-image-based-phishing-and-phone-scam-is-outwitting-threat-detectors
  5. https://pushsecurity.com/blog/2024-identity-breaches/