2020’s Top 10 Phishing Brands |

With the year 2020 behind us, we can now look back and analyze the various cybercrime trends that occurred to be more prepared in 2021. One of the most popular forms of cyberattacks is phishing, and as it usually comes in well-known branded emails, they are often May be misleading.

Let’s take a look at the top 10 fishing brands of 2020, by The Check Point study, So we can be careful when we receive emails from them:

  1. Microsoft (Related to 43% of all branded phishing attempts worldwide)
  2. DHL (18%)
  3. LinkedIn (6%)
  4. Amazon (5%)
  5. Rakoten (4%)
  6. IKEA (3%)
  7. Google (2%)
  8. Paypal (2%)
  9. chase (2%)
  10. Yahoo (1%)

Other notable brands in phishing attempts in 2020 included WhatsApp, Facebook and Netflix.

The leading industry sectors to impersonate the brand

  1. technology
  2. Shipping
  3. Retail

Test Case 1: DHL

In November 2020, researchers from Check Point Spotted a malicious phishing email that used DHL branding, and tried to steal users’ passwords. The email was sent from the emailed email address [email protected] And we had the issue “RE: Your DHL package (available for collection) – [<recipient email>]“With the user’s email address in the list. His purpose was to entice the recipient to click on a malicious link that redirects the recipient to a fake login page that encourages him to enter his password and then be sent to the fake website: (https: // ipostagepay[.]ru /[.]mm0 /).

Test Case 2: Microsoft Phishing Email

“Around the middle of the year, Check Point noticed a malicious phishing email aimed at stealing the credentials of Microsoft Office 365 account users. The email below contains the subject”Document No. Daily No. <מספר מזהה>“And the content impersonated the eFax service.

Once users click on the link, they are taken to another document (see below)

He then redirects them to the Microsoft Scam Login page (see below).

Branded Email Safety Tag List:

  1. Do you know the sender’s email address when you click on it?
  2. Does the sender urge you to take immediate action?
  3. Do you notice any spelling or grammar problems?
  4. Do the logo, font and other features in the email look weird?
  5. Does the email state that you won the competition or the lottery that you did not participate in?
  6. Is the email asking for a donation?

Steps to take to protect yourself from phishing messages:

  1. Contact the real company directly
  2. Do not open email attachments – they can contain malware!
  3. Get ZoneAlarm Extreme Security – It includes everything you need to protect your PC and mobile device from cyber attacks (Android and iOS) using enterprise-level Check Point technology. Its anti-phishing feature prevents you from entering your credentials while it checks to see if the site or email that may have been compromised is safe or not. Only after it is considered secure, you can proceed to enter your credentials.

Source

With the year 2020 behind us, we can now look back and analyze the various cybercrime trends that occurred to be more prepared in 2021. One of the most popular forms of cyberattacks is phishing, and as it usually comes in well-known branded emails, they are often May be misleading.

Let’s take a look at the top 10 fishing brands of 2020, by The Check Point study, So we can be careful when we receive emails from them:

  1. Microsoft (Related to 43% of all branded phishing attempts worldwide)
  2. DHL (18%)
  3. LinkedIn (6%)
  4. Amazon (5%)
  5. Rakoten (4%)
  6. IKEA (3%)
  7. Google (2%)
  8. Paypal (2%)
  9. chase (2%)
  10. Yahoo (1%)

Other notable brands in phishing attempts in 2020 included WhatsApp, Facebook and Netflix.

The leading industry sectors to impersonate the brand

  1. technology
  2. Shipping
  3. Retail

Test Case 1: DHL

In November 2020, researchers from Check Point Spotted a malicious phishing email that used DHL branding, and tried to steal users’ passwords. The email was sent from the emailed email address [email protected] And we had the issue “RE: Your DHL package (available for collection) – [<recipient email>]“With the user’s email address in the list. His purpose was to entice the recipient to click on a malicious link that redirects the recipient to a fake login page that encourages him to enter his password and then be sent to the fake website: (https: // ipostagepay[.]ru /[.]mm0 /).

Test Case 2: Microsoft Phishing Email

“Around the middle of the year, Check Point noticed a malicious phishing email aimed at stealing the credentials of Microsoft Office 365 account users. The email below contains the subject”Document No. Daily No. <מספר מזהה>“And the content impersonated the eFax service.

Once users click on the link, they are taken to another document (see below)

He then redirects them to the Microsoft Scam Login page (see below).

Branded Email Safety Tag List:

  1. Do you know the sender’s email address when you click on it?
  2. Does the sender urge you to take immediate action?
  3. Do you notice any spelling or grammar problems?
  4. Do the logo, font and other features in the email look weird?
  5. Does the email state that you won the competition or the lottery that you did not participate in?
  6. Is the email asking for a donation?

Steps to take to protect yourself from phishing messages:

  1. Contact the real company directly
  2. Do not open email attachments – they can contain malware!
  3. Get ZoneAlarm Extreme Security – It includes everything you need to protect your PC and mobile device from cyber attacks (Android and iOS) using enterprise-level Check Point technology. Its anti-phishing feature prevents you from entering your credentials while it checks to see if the site or email that may have been compromised is safe or not. Only after it is considered secure, you can proceed to enter your credentials.

Source

More from author

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Related posts

Advertismentspot_img

Latest posts

Apple patches double zero-day in browser and kernel – update now! – Naked Security

Apple just pushed out an emergency update for two zero-day bugs that are apparently actively being exploited. There's a remote code execution hole (RCE) dubbed...

Securing the ever-evolving hybrid work environment

Even as many business leaders debate the boundaries of remote work styles and schedules, there is little doubt that hybrid work will persist for...

Hackers Deploy Bumblebee Loader to Breach Target Networks

Threat actors associated with BazarLoader, TrickBot and IcedID malware are now increasingly deploying the loader known as Bumblebee to breach target networks and subsequently...

Want to stay up to date with the latest news?

We would love to hear from you! Please fill in your details and we will stay in touch. It's that simple!