Thursday, August 18, 2022
-Advertisement-
-Advertisement-
Tech ObserverNewsCyber SecurityMicrosoft at the forefront of all phishing attacks globally, says Check Point report

Microsoft at the forefront of all phishing attacks globally, says Check Point report

According to the report, for the first time this year, social media was among the top three sectors to be imitated in phishing attempts

According to the report, for the first time this year, social media was among the top three sectors to be imitated in phishing attempts

US tech major has emerged as one of the top imitated brands with 29% of all globally according to Research (CPR) report. The report claims that these attacks have gone down from 45% in the second quarter of 2021.

According to the report, for the first time this year, social media was among the top three sectors to be imitated in phishing attempts, with WhatsApp, LinkedIn, and Facebook all appearing in the top 10 list of most imitated brands.

“For the first time this year, social channels have become one of the top three categories exploited by cybercriminals, no doubt in an attempt to take advantage of the increasing number of people working and communicating remotely in the wake of the pandemic,” Omer Dembinsky, Data Research Group Manager at Check Point Software, said in a statement.

“Following the data from Q3, we’d also urge users to be vigilant when it comes to any emails or other communications that appear to be from social media channels such as Facebook or WhatsApp,” Dembinsky added.

has replaced DHL in the second position, accounting for 13% of all phishing attempts versus 11% in the previous quarter, as criminals look to take advantage of online shopping in the run-up to the holiday season.

The report also highlights the brands which were most frequently imitated by criminals in their attempts to steal individuals’ personal information or payment credentials during July, August, and September.

In a brand phishing attack, criminals try to imitate the official website of a well-known brand by using a similar domain name or URL and web-page design to the genuine site.

The link to the fake website can be sent to targeted individuals by email or text message, a user can be redirected during web browsing, or it may be triggered from a fraudulent mobile application. The fake website often contains a form intended to steal users’ credentials, payment details, or other personal information.

Subscribe to receive the day's headlines from Tech Observer straight in your inbox

- Advertisement -

Your Comment on this Story

Comments

Share on activity feed

Powered by WP LinkPress

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Subscribe to our Newsletter

83000+ Industry Leaders read it everyday

By subscribing you agree to our Privacy Policy, T&C and consent to receive newsletters and other important communications.
- Advertisement -ESDS SAP HANA Community Cloud
- Advertisement -Digital Senate 2022

RELATED ARTICLES

- Advertisement -