Check Point Research Q4 Brand Phishing Report

The Check Point (CPR) presents the 2021 Q4 Brand Phishing Report Report, in which he points out the top brands imitated by hackers in their attempts to fraudulently obtain personal data of third parties.

Με την αύξηση των περιπτώσεων COVID και την άφιξη της εορταστικής περιόδου, η DHL έβαλε τέλος στη μακρόχρονη κυριαρχία της Microsoft ως η μάρκα που μιμούνται συχνότερα οι εγκληματίες του κυβερνοχώρου. Τα μέσα κοινωνικής δικτύωσης παγιώνουν τη θέση τους μεταξύ των τριών κορυφαίων τομέων προς μίμηση σε απόπειρες phishing, καθώς το WhatsApp και το κατατάσσονται υψηλότερα στη λίστα με τα 10 πιο συχνά μιμούμενα εμπορικά σήματα.

  • 23% of all phishing attempts in Q2021 9 were related to DHL, up from just XNUMX% in QXNUMX.
  • Microsoft, which once again held the top spot in Q29, accounting for 20% of all phishing attempts, dropped to XNUMX% of phishing attacks in QXNUMX.
  • FedEx made its appearance on the top ten list in Q2021 XNUMX

The Top 10 of the top brands to imitate in the 4th quarter of 2021

Trademarks are classified based on their overall appearance in phishing attempts:

1. DHL (related to 23% of all phishing attacks worldwide)

2. Microsoft (20%)

3. WhatsApp (11%)

4. (10%)

5. LinkedIn (8%)

6. Amazon (4%)

7. Fedex (3%)

8. Roblox (3%)

9. PayPal (2%)

10. Apple Lossless Audio CODEC (ALAC), (2%) 

For the first time, DHL ranked first in the fourth quarter, replacing Microsoft as the brand most likely to be targeted by cybercriminals in phishing scams as perpetrators try to take advantage of vulnerable online consumers during of the busiest season of the year.

The fourth quarter report also reinforces a emerging third quarter trend in social media, which seems to be consolidating its position among the top three sectors to emulate in phishing attempts. While Facebook dropped from the top ten, WhatsApp moved from 6th to 3rd place, now accounting for 11% of all phishing efforts. Also, LinkedIn has moved from 8th to 5th place, now accounting for 8% of all phishing-related attacks. 

What is an attack? brand phishing?

In an electronic attack "brand phishing” , criminals try to imitate the official website of a well-known brand, using a similar domain name or URL and design ς με τον γνήσιο ιστότοπο. Ο σύνδεσμος προς τον ψεύτικο ιστότοπο μπορεί να αποσταλεί σε στοχευμένα άτομα μέσω ηλεκτρονικού ταχυδρομείου ή μηνύματος κειμένου. Ο χρήστης μπορεί να ανακατευθυνθεί κατά τη διάρκεια της περιήγησης στον ιστό ή μπορεί να ενεργοποιηθεί από μια δόλια εφαρμογή για κινητά . Ο ψεύτικος ιστότοπος περιέχει συχνά μια φόρμα που αποσκοπεί στην user credentials, payment information or other personal information.

Ο Omer Dembinsky, Data Research Group Manager at Check Point Software, said:

“It is important to remember that cybercriminals are primarily opportunists. In their quest to steal our personal data or deploy malware on a user's machine, criminal groups often take advantage of consumer trends by mimicking popular brands. This quarter, for the first time, we saw global logistics company DHL top the rankings as the most likely brand to emulate, apparently to take advantage of the surge in the number of young and potentially vulnerable online shoppers during busy retail season of the year. Especially the older ones , οι οποίοι είναι λιγότερο πιθανό να είναι τεχνολογικά εξοικειωμένοι από τις νεότερες γενιές, αν ψωνίζουν online για πρώτη φορά, μπορεί να μην ξέρουν τι να αναζητήσουν όταν πρόκειται για θέματα όπως τα μηνύματα επιβεβαίωσης παράδοσης ή τις ενημερώσεις παρακολούθησης. Επιπλέον, η αύξηση των περιπτώσεων COVID έχει ως αποτέλεσμα οι άνθρωποι να βασίζονται περισσότερο στην υπηρεσία αποστολής και οι εγκληματίες του κυβερνοχώρου είναι πιθανό να προσπαθούν να επωφεληθούν από τους που επιλέγουν να μην κυκλοφορούν στα φυσικά καταστήματα.”

The 4th quarter also confirmed what many of us expected. That social media would continue to be largely the target of malicious agents seeking to exploit those who rely more on channels such as WhatsApp, Facebook and LinkedIn as a result of remote work and other effects of the pandemic.

Unfortunately, there is a limit to what brands like DHL, Microsoft and WhatsApp – the top 3 most imitated brands in QXNUMX – can do to combat phishing attempts. It's too easy for the human factor to overlook things like wrong domains, type , incorrect dates or other suspicious details, and this is what opens the door to further damage. 

We would urge all users to pay close attention to these details when dealing with companies like DHL in the coming months.

Example A: Paypal

During the November sales, we noticed a malicious one phishing email purporting to be sent by PayPal and attempting to steal users' credit information. 

Figure 1. Malicious e-mail sent with the subject "[Alert] Confirm your PayPal account (Case ID #XX XXXXXXXXXXXXX)"

paypal

paypal

 

Figure 2. Left side - fake login page? Right side - real login page

 

Example B: FedEx

During December, we noticed a malicious email Phishing using its trademark Fedex and was trying to persuade the user to download the malware SnakeKeylogger on his computer. The e-mail (see Figure 1) sent from the fake address support@fedex[.]com, contained the topic “Bill of charging-PL/CI/BL-Documents arrival“. The content asks you to download an archive file RAR "shipment docu..rare", Which contains a malicious executable file that would infect the system with SnakeKeylogger and could intercept user credentials. 

Figure 3. Malicious e-mail with the subject “Bill of Lading-PL / CI / BL-Documents arrival”

fx

 

 

Example C: DHL

In this below Phishing Email, we see an attempt to steal it Email and the password of the users through an imitation of the brand DHL. Sent from fake DHL Customer Support email (info @ emmc [.] ir), contained the topic DHL Shipment Notification: xxxxxxxxxxxx “Out for delivery” for 15 Dec 21 ″. The attacker was trying to entice the victim to click on a malicious link (http: //reg[.]chaindaohang[.]com/wp-content/Uploads/ 2021 / 07 /dhl/index[.]php?i=i& 0 =vegenat@vegenat[.]es), which redirects the user to a deceptive homepage DHL, which looks like the actual website (see Figure 2).

In the malicious link, the user was prompted to enter Email and its password. 

Figure 4. The malicious e-mail sent with the subject “Sending notification DHL : xxxxxxxxxxxx "Oct for deliveredfor 15 Dec 21"

dh

 

Figure 5. Left side - fraudulent credentials login page? Right side - real login page

dhldex

 

 

 

 

iGuRu.gr The Best Technology Site in Greecefgns

Subscribe to Blog by Email

Subscribe to this blog and receive notifications of new posts by email.

Check Point Research, iguru

Written by newsbot

Although the press releases will be from very select to rarely, I said to go ... because sometimes the authors are hiding.

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).