Tag Archives: Phishing

APWG Q2 Cybercrime Report: Phishing Sustains Elevated ‘New Normal’ Attack Volume Into the Middle of 2021

[news release] The APWG’s new Phishing Activity Trends Report reveals that phishing sustained near-record levels through the first half of 2021, after doubling over the course of 2020. APWG saw 222,127 attacks in June 2021, which was the third-worst month in APWG’s reporting history.

Continue reading APWG Q2 Cybercrime Report: Phishing Sustains Elevated ‘New Normal’ Attack Volume Into the Middle of 2021

Average Digital Shadows Client Has 1,100 Impersonating Domains and Subdomains Detected Each Year

The average Digital Shadows client isn’t a small company, but the company reports in their latest Impersonating Domains Report an average client has 1,100 impersonating domains and subdomains detected on average per year.

Continue reading Average Digital Shadows Client Has 1,100 Impersonating Domains and Subdomains Detected Each Year

APWG REPORT: Phishing Attacks Double in 2020 and October Shatters All-Time Monthly Records

[news release] The APWG’s new Phishing Activity Trends Report reveals that the number of phishing attacks observed by APWG members grew through 2020, fully doubling over the course of the year. Attacks peaked in October 2020, with a high of 225,304 new phishing sites appearing in that month alone, breaking all previous monthly records.

Continue reading APWG REPORT: Phishing Attacks Double in 2020 and October Shatters All-Time Monthly Records

Latest APWG Report On Phishing Attacks Finds Most BEC Attacks Mounted With Deceptive Domain Names Registered By Five Registrars

[news release] The Anti-Phishing Working Group’s (APWG) new Phishing Activity Trends Report reveals a rise in reported phishing since March of 2020. In August and September of 2020, the APWG logged 200,000 phishing sites per month — with more than 500 separate brands attacked by phishers each month in the quarter.

Continue reading Latest APWG Report On Phishing Attacks Finds Most BEC Attacks Mounted With Deceptive Domain Names Registered By Five Registrars

Kaspersky finds social networks, messengers and external cloud services are most often exploited by cyber-fraudsters

[news release] Kaspersky is revealing the web services that employees of small and medium businesses most frequently access while working are some of the most exploited by malefactors as they are used as a springboard for phishing. These services include YouTube, Facebook, Google services and WhatsApp. Further insights show that this list is not consistent with the services that employers tend to limit for use on corporate devices.

Continue reading Kaspersky finds social networks, messengers and external cloud services are most often exploited by cyber-fraudsters

US Court Authorises Microsoft To Seize Control of Key Domains in COVID-19 Cyberattacks

A US court authorised Microsoft to take control of key domain names that were being used by cybercriminals preventing them for being used to execute cyberattacks Tuesday. These cybercriminals were taking advantage of the COVID-19 pandemic in an attempt to defraud customers in 62 countries around the world.

Continue reading US Court Authorises Microsoft To Seize Control of Key Domains in COVID-19 Cyberattacks

SIDN Finds Suspected Phishing In Big Brand .NL Domains On The Increase, But Visible Abuse Declining

According to an analysis of the Netherlands’ 50 biggest brand names, the number of .nl domain names suspected of being used or intended for use in phishing has been increasing, but monitoring and intervention appears to be suppressing visible abuse such as phishing.

Continue reading SIDN Finds Suspected Phishing In Big Brand .NL Domains On The Increase, But Visible Abuse Declining

17,000 Coronavirus-Related Domains Registered In First 2 Weeks Of April; 23% Malicious Or Suspicious: Check Point

There have been 68,000 coronavirus-related domains registered since the beginning of the Coronavirus outbreak in January 2020 with an escalation in the number of coronavirus-related domains being registered since mid-February according to Check Point Research. In the past two weeks (since 2 April), there have been almost 17,000 new coronavirus-related domains had been registered (16,989 to be exact) with 2% found to be malicious and another 21% suspicious.

And with the pandemic now reaching almost every corner of the globe, many governments have announced economic stimulus packages, and as Check Point Research note on their recent glob post, “where there’s money, there will also be criminal activity. Hackers and threat actors want to cash in on the rush to get these vital payments and fill their own pockets at the expense of others. To do this, they are evolving the scam and phishing techniques that they have been using successfully since the start of the pandemic in January. Google recently reported that in just one week from 6 to 13 April, it saw more than 18 million daily malware and phishing emails related to Covid-19 scams – and that’s in addition to the 240 million daily spam messages it sees related to coronavirus.”

To take advantage of these stimulus packages, Check Point Research found 4,305 domains relating to new stimulus/relief packages have been registered since January with a total of 2081 new domains registered (38 malicious; 583 suspicious) in March and 473 (18 malicious, 73 suspicious) in the first week of April.

Check Point Research also observed a major increase in the week starting 16 March “during which the American government proposed the stimulus package to taxpayers. The number of new domains registered that week was 3.5 times higher compared to the average of previous weeks.”

“These scam websites use the news of the coronavirus (Covid-19) financial incentives, and fears about Coronavirus to try and trick people into using the websites or clicking on links. Users that visit these malicious domains instead of the official Government websites risk having their personal information stolen and exposed, or payment theft and fraud.”

Check Point Research has also observed a rise in “scam websites that use the news of the coronavirus (Covid-19) financial incentives, and fears about Coronavirus to try and trick people into using the websites or clicking on links. Users that visit these malicious domains instead of the official Government websites risk having their personal information stolen and exposed, or payment theft and fraud.”

For more information, or to see the Check Point Research blog post in full, go to: https://blog.checkpoint.com/2020/04/20/coronavirus-update-as-economic-stimulus-payments-start-to-flow-cyber-attackers-want-to-get-their-share-too/