Experts from the Israeli company Check Point published a report on the brands that are most often used by cybercriminals during phishing campaigns. According to experts, most often criminals imitated well-known brands in order to steal personal information or user credentials.

During the fourth quarter of 2019, researchers carefully observed differences in the distribution of phishing pages. For example, phishing pages of social networks and banks were distributed mainly through mobile devices, and phishing emails were usually distributed via e-mail, timed to coincide with the sales season.

The most popular brands among attackers were:

  • Facebook (18% of the total number of phishing attacks)
  • Yahoo  (10% of the total number of phishing attacks)
  • Netflix (5% of the total number of phishing attacks)
  • PayPal (5% of the total number of phishing attacks)
  • Microsoft (3% of the total number of phishing attacks)
  • Spotify (3% of the total number of phishing attacks)
  • Apple (2% of total phishing attacks)
  • Google (2% of the total number of phishing attacks)
  • Chase (2% of the total number of phishing attacks)
  • Ray-Ban  (2% of the total number of phishing attacks)

As mentioned above, the use of brands by criminals directly depends on how the distribution of phishing messages occurs.

So, phishing emails accounted for 27% of all attacks, and most often the attackers imitated Yahoo !, Rbs (Ray-Ban Sunglasses), Microsoft, DropBox in them.

The most popular method of phishing is sites (48% of all attacks). Such malicious resources are most often faked for Spotify, Microsoft, PayPal, and Facebook.

25% of phishing attacks occur through mobile devices, and in such cases, hackers usually pretend to be Chase Mobile Banking, Facebook, Apple, and PayPal.

“Cybercriminals use different attack methods to trick their victims into entering personal information, credentials, or transferring money. Often, links to phishing sites come through spam, but sometimes attackers, after receiving user credentials, carefully study the victim for several weeks and work on a targeted attack on partners, clients of the company on behalf of their victims to steal money, ”says Vasily Diaghilev, head of the representative office Check Point Software Technologies in Russia and the CIS. – This method allows hackers to disguise themselves as a proxy. Over the past two years, the number of attacks of this type has increased, and in 2020 phishing will continue to pose a serious threat. ”

Join our WhatsApp group

Twitter:  Rapidsafeguard
Instagram: Rapidsafeguard
Facebook: Theeasyhack
YouTube: Rapidsafeguard
LinkedIn: Rapidsafeguard

LEAVE A REPLY

Please enter your comment!
Please enter your name here