LinkedIn still number one Bran

0

SAN CARLOS, Calif., July 19. 2022 (GLOBE NEWSWIRE) — Check Point Research (CPR), the threat intelligence arm of Check Point® Software Technologies Ltd. (CHKP) and a leading provider of cybersecurity solutions globally, released its Brand Phishing Report for the second quarter of 2022. The report highlights the brands that were most often imitated by cybercriminals in their attempts to steal personal information or payment credentials during the quarter. .

Social media platform LinkedIn continued its reign as the most-imitated brand after entering the rankings for the first time in the first quarter. While its share has fallen slightly; rising from 52% in the first quarter to 45% of all phishing attempts in the second quarter, this is still a worrying trend that highlights the continuing risks faced by users of the social media platform of confidence. Social media generally remains the most imitated category, followed by technology, which this quarter took second place ahead of shipping.

The most striking increase in the number of tech household names exploited was Microsoft, accounting for 13% of all brand phishing attempts, more than double the amount from the previous quarter and edging out DHL in third place at 12%. Some new brands entering the top 10 were: Adidas, Adobe and HSBC, although all in the single digits, these brands will be closely watched by researchers in Q3 for any developments.

The increase in the use of Microsoft-related scams is a danger to individuals and organizations. Once someone gets their hands on your account login credentials, they have access to all the underlying applications, such as Teams and SharePoint, and the obvious risk of compromising your Outlook email account. . The report highlights a specific example of an Outlook phishing email luring users to a fraudulent Outlook webpage with the subject line: “[Action Required] Final reminder – Verify your OWA account now”, asking the victim to enter their login credentials.

LinkedIn-based phishing campaigns mimicked the professional social media platform’s communication style with malicious emails using subject lines such as: “You appeared in 8 searches this week” or “You have a new post or “I’d like to do business with you through LinkedIn. Although appearing to be from LinkedIn, they used a completely different email address than the brand.

Meanwhile, with the relentless trend of online shopping, it’s no surprise that the second quarter also saw shipping company DHL tampered with in 12% of all phishing attacks. The report specifically refers to a tracking phishing scam, with the subject line “Incoming Shipment Notification”, tricking the consumer into clicking on a malicious link.

“Phishing emails are a top tool in any hacker’s arsenal because they are quick to deploy and can target millions of users at relatively low cost,” said Omer Dembinsky, head of the data research group at Check Point Software. “They give cybercriminals the ability to leverage the reputation of trustmarks to give users a false sense of security that can be exploited to steal personal or business information for profit.

“Criminals will use any brand with sufficient reach and consumer trust. As a result, we see hackers expanding their businesses with the first appearance of Adidas, Adobe and HSBC in the top 10. Hackers are trading on our trust in these brands and this very human instinct for “the deal”. There’s a reason hackers continue to use brand-based phishing. It works. So consumers need to take action with caution and look for the telltale signs of the fake email, such as poor grammar, misspellings, or strange domain names.If in doubt, head to the brand’s website rather than clicking links. “

A brand phishing attack not only takes advantage of our implicit trust in a familiar brand, adopting its brand image often using a similar URL, but it also plays on human emotions, such as the fear of missing out on a discount. The sense of urgency this creates leads consumers to click away in a hurry without first checking whether the email is from the brand in question. This could lead them to inadvertently download malware or hand over valuable personally identifiable information that can give criminals access to their entire online world and potential financial loss.

Top phishing brands in Q2 2022

Below are the top brands ranked by their general appearance in phishing attempts:

  1. LinkedIn (45%)
  2. Microsoft (13%)
  3. DHL (12%)
  4. Amazon (9%)
  5. Apple (3%)
  6. Adidas (2%)
  7. Google (1%)
  8. Netflix (1%)
  9. Adobe (1%)
  10. HSBC (1%)

LinkedIn Phishing Email – Account Theft Example

During the second quarter of 2022, we observed a malicious phishing email that used LinkedIn’s branding. The phishing email was sent from a webmail address and tampered with to appear as if it was sent from “LinkedIn Security ([email protected][.]this) “. The email contained the subject “LinkedIn Review!!!”, and the content attempts to trick the victim into clicking on a malicious link under the guise of updating the version of their LinkedIn account. This click will lead to the link “https://lin882[.]web node[.]page/”, where the victim must then enter their LinkedIn account information.

DHL Phishing Email – Account Theft Example

During the second quarter of 2022, we observed a malicious phishing email that used the DHL brand. The phishing email was sent from a webmail address and tampered with to appear as if sent by “DHL EXPRESS ([email protected][.]com)”. The email contained the subject line “Incoming Shipment Notification”, and the content attempts to persuade the victim to click on a malicious link that takes them to “https://delicate-sea-3417.on.fleek. co”. The victim must then enter their username and password.

Outlook Phishing Email – Account Theft Example

In this phishing email, we see an attempt to steal a user’s Outlook account information. The email that was sent from the email address “Outlook OWA ([email protected])”, contained the subject line “[Action Required] Final reminder – Verify your OWA account now”. The attacker was trying to trick the victim into clicking on a malicious link, which redirects the user to a fraudulent Outlook web application login page. In the malicious link (jfbfstxegfghaccl-dot-githu-dir-aceui-xoweu[.]eu[.]r[.]appspot[.]com), the user had to enter their username and password.

Amazon Phishing Email – Billing Information Theft Example

In this phishing email, we see an attempt to steal a user’s billing information. The email that was sent from the email address “Amazon ([email protected][.]mouth[.]ec)”, contained the subject line “Verifying your Amazon account”. The title of the email and its contents are an attempt by the attacker to trick the victim into clicking on a malicious link “https://main.d1eoejahlrcxb.amplifyapp[.]com”, which redirects the user to a fraudulent page asking to enter billing information.

Follow Check Point Research via:
Blog: https://research.checkpoint.com/
Twitter: https://twitter.com/_cpresearch_

About Check Point Research

Check Point Research provides cutting-edge cyber threat intelligence to Check Point Software customers and the wider intelligence community. The research team collects and analyzes global cyberattack data stored on ThreatCloud to keep hackers at bay, while ensuring that all Check Point products are updated with the latest protections. The research team consists of over 100 analysts and researchers cooperating with other security vendors, law enforcement and various CERTs.

About Check Point Software Technologies Ltd.

Check Point Software Technologies Ltd. (checkpoint.com) is a leading provider of cybersecurity solutions for businesses and governments worldwide. Check Point Infinity’s portfolio of solutions protects businesses and public organizations against 5th generation cyberattacks with an industry-leading capture rate of malware, ransomware and other threats. Infinity comprises three main pillars delivering uncompromising security and Generation V threat prevention in enterprise environments: Check Point Harmony, for remote users; Check Point CloudGuard, to automatically secure clouds; and Check Point Quantum, to protect network perimeters and data centers, all controlled by the industry’s most comprehensive and intuitive unified security management. Check Point protects more than 100,000 organizations of all sizes.

MEDIA CONTACT:
Emilie Beneitez Lefebvre
Check Point Software Technologies Technologies
[email protected]
INVESTOR CONTACT:
Kip E. Meintzer
Check Point Software Technologies
[email protected]

Check-Point-Software-Technolog.png

Share.

Comments are closed.