Reimagining Public Sector Analytics
Home News Cyber Security Microsoft at the forefront of all phishing attacks globally, says Check Point...

Microsoft at the forefront of all phishing attacks globally, says Check Point report

According to the report, for the first time this year, social media was among the top three sectors to be imitated in phishing attempts

Microsoft (Photo: Agency)

US tech major has emerged as one of the top imitated brands with 29% of all globally according to Research (CPR) report. The report claims that these attacks have gone down from 45% in the second quarter of 2021.

According to the report, for the first time this year, social media was among the top three sectors to be imitated in phishing attempts, with WhatsApp, LinkedIn, and Facebook all appearing in the top 10 list of most imitated brands.

“For the first time this year, social channels have become one of the top three categories exploited by cybercriminals, no doubt in an attempt to take advantage of the increasing number of people working and communicating remotely in the wake of the pandemic,” Omer Dembinsky, Data Research Group Manager at Check Point Software, said in a statement.

“Following the data from Q3, we'd also urge users to be vigilant when it comes to any emails or other communications that appear to be from social media channels such as Facebook or WhatsApp,” Dembinsky added.

Amazon has replaced DHL in the second position, accounting for 13% of all phishing attempts versus 11% in the previous quarter, as criminals look to take advantage of online shopping in the run-up to the holiday season.

The report also highlights the brands which were most frequently imitated by criminals in their attempts to steal individuals' personal information or payment credentials during July, August, and September.

In a brand phishing attack, criminals try to imitate the official website of a well-known brand by using a similar domain name or URL and web-page design to the genuine site.

The link to the fake website can be sent to targeted individuals by email or text message, a user can be redirected during web browsing, or it may be triggered from a fraudulent mobile application. The fake website often contains a form intended to steal users' credentials, payment details, or other personal information.

Exit mobile version