Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity NewswireCybersecurity News

Phishing campaigns and malicious websites impersonating the Trump campaign

phishing
September 28, 2020

According to a Mimecast report, businesses now face growing risk from phishing email attacks that prey on people’s political opinions, mirroring the COVID-19 cybercrime surge that preyed on fear.

Cybercriminals are now working to leverage those political brands to attack U.S. organizations and their employees. Mimecast Threat Intelligence researchers have begun discovering new website registrations, for example, for Donald Trump but with the “n” in Donald replaced with an “ñ”—a Spanish character more associated with aged tequila (i.e., añejo) than with politics. That one-letter difference is almost undetectable unless you’re paying extremely close attention, says the report.

"Researchers have also discovered phishing email scams that lead to pages like the example shown below, asking Trump supporters to donate to Black Lives Matter. While that may be confusing — Trump and BLM are in opposition —t he fact is that any donated money would go to the cybercriminals behind the phishing scam, not the Trump campaign or BLM. And those cybercriminals would also obtain the victim’s credit card number and other personally identifiable information (PII). Moreover, the political brand — in this example, Trump — also becomes a victim because the money being siphoned off by cybercriminals was intended to support their political cause," says the report. 

“It’s no surprise at all to see cybercriminals using the U.S. election as an opportunity to scam the public,” said Dr. Kiri Addison, Head of Data Science for Threat Intelligence & Overwatch, Mimecast. “We often see traditional, and already-known, attack methodologies modified to exploit current events that are taking place in an attempt to lure the vulnerable to provide personal details.”

Other examples include an abundance of brand impersonation sites offering free political items, from Trump flags to “Keep America Great Again” hats. “By offering something free, cybercriminals know that it’s likely unsuspecting victims will provide their personal details. If a criminal gets hold of your personal information, they can use it to impersonate you or even sell it on the dark web,” said Dr. Addison. “With many Americans, and people from other countries, invested in the American election and the Trump campaign, these scams have the potential to cause real damage. It’s important to understand that if something looks too good to be true, then it probably is.” 

"The COVID-19 pandemic has made it even more important than ever to be vigilant, as according to our recent report, coronavirus has led to a 33% rise in opportunistic cybercrime. Despite continued warnings, our recent research found that 50% of people still open email attachments from unknown sources, which shows why cybercriminals continue using these methods. It is better to be safe than sorry and it is always possible to check the validity of an email from an official organization,” Dr. Addison added.

It’s important for every business’ cybersecurity professionals to help make employees aware of the risk posed by politically branded phishing emails from now through the November 2020 election—and beyond, depending on what happens immediately post-election, concludes the report. 

KEYWORDS: cyber security election security phishing risk management threat intelligence

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Cybersecurity
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Cables plugged in

Chinese Supercomputer Allegedly Hacked, 10 Petabytes of Data Stolen

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Abstract shape

What Are Security Experts Saying About Claude Mythos and Project Glasswing?

Padlock with computer keys

Breach of FBI Surveillance System Considered a “Major Incident,” Security Experts Weigh In

AI

AI Startup Mercor, Which Works With Open AI and Anthropic, Confirms Data Breach

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

May 7, 2026

Beyond Cameras: Revolutionizing Perimeter Security with LiDAR, AI and Digital Twins

In this webinar, we will explore how LiDAR‑based detection, AI‑powered analytics and digital twins are transforming the future of perimeter protection with 3D detection, real-time situational awareness and unified operational views.

May 12, 2026

Managing Large Scale Events in 2026: Security, Travel and Threat Intelligence

As the Americas prepare to host the world’s biggest football tournament in 2026, security, resilience, and travel risk leaders face a fast-moving threat environment that extends well beyond the stadiums. Learn the risks and readiness considerations that matter most.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Related Articles

  • Been Hacked? Let That Be a Lesson to You

    Global phishing campaign targeting the COVID-19 vaccine cold chain

    See More
  • gmail loading screen on yellow background

    Phishing emails impersonating HR are on the rise

    See More
  • Dark figure coding on computer

    Security leaders weigh in on the Trump campaign hack

    See More

Related Products

See More Products
  • The Database Hacker's Handboo

  • 150 things.jpg

    The Handbook for School Safety and Security

  • 9780367030407.jpg

    National Security, Personal Privacy and the Law

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing