Phishing Attacks Imitating Famous Brands Are Fooling Staffers Into Making Costly Mistakes.
Everyone is hustling a little more these days as we all try to overcome recent challenges — even cybercriminals. An essential part of any cybercrime gang’s hustle is innovation. Bad actors are always looking for fresh ways to get employees to click on and interact with their messages, and one clever ruse that they’ve been able to slip under the radar of many people is phishing attacks imitating famous brands.
Cybercriminals are taking advantage of the fact that we’re all handling more email and more remote tasks these days to launch a barrage of phishing attacks. Many of these attacks are disguised as routine communications from third-party service providers and retailers. They’ve had great success with some ploys by crafting phishing emails that imitate government agencies, legitimate charities, charitable programs and more, including the World Health Organization, a popular trick for circulating ransomware-laden COVID-19 maps.
But what brands did they choose to imitate the most? Brands that businesses trust and brands that employees interact with regularly. The list of the most imitated brands of 2020 clearly illustrates the social engineering effort that goes into cybercrime.
- Microsoft (45 percent)
- DHL (18 percent)
- LinkedIn (6 percent)
- Amazon (5 percent)
- Rakuten (4 percent)
- Ikea (3 percent)
- Google (2 percent)
- PayPal (2 percent)
- Chase (2 percent)
- Yahoo (1 percent)
A 660 percent increase in the volume of phishing email means that your staffers are seeing more suspicious messages. Choosing to add a phishing defense solution to your security stack is a smart move in the fight against phishing.
Optistar offers ideal security awareness and phishing resistance training solutions for businesses in addition to other cybersecurity defense services. If you are interested in speaking to one of our Senior IT Consultants about an assessment of your network security or if you have any questions at all, contact us!
Article by ID Agent