LinkedIn Still Number One Brand to be Faked in Phishing Attempts while Microsoft Surges up the Rankings to Number Two Spot in Q2 Report
Check Point Research has released its Q2 2022 Brand Phishing Report, identifying brands most often targeted by cybercriminals. Notably, LinkedIn topped the list with 45% of phishing attempts, despite a slight decline from 52% in Q1. Microsoft surged to 13%, doubling its phishing attempts, while DHL followed closely with 12%. New entrants to the top brands included Adidas, Adobe, and HSBC. The report emphasizes the need for users to be vigilant against phishing scams that exploit trusted brands.
- None.
- LinkedIn phishing attempts decreased from 52% in Q1 to 45% in Q2, indicating potential weakness.
- Microsoft phishing attempts doubled to 13%, raising significant concerns about account security.
- Emergence of Adidas, Adobe, and HSBC in the phishing landscape suggests increasing risks for consumers.
Check Point Research issues its Q2 Brand Phishing Report, highlighting the brands that cyber criminals most often imitate to trick people into giving up their personal data
SAN CARLOS, Calif., July 19, 2022 (GLOBE NEWSWIRE) -- Check Point Research (CPR), the Threat Intelligence arm of Check Point® Software Technologies Ltd. (NASDAQ: CHKP) and a leading provider of cyber security solutions globally, has published its Brand Phishing Report for Q2 2022. The report highlights the brands that were most frequently imitated by cybercriminals in their attempts to steal individuals’ personal information or payment credentials over the quarter.
The social media platform LinkedIn continued its reign as the most imitated brand after entering the rankings for the first-time in Q1. While its share has dropped slightly; down from
The most striking rise in technology household names being exploited was Microsoft, making up
The increase in the use of Microsoft related scams is a danger to both individuals and organizations. Once someone has hold of your account login details, they have access to all the applications behind it, such as Teams and SharePoint, as well as the obvious risk of compromise to your Outlook email account. The report highlights a specific example of an Outlook phishing email luring users to a fraudulent Outlook web page with the subject line: “[Action Required] Final Reminder - Verify your OWA Account now”, asking the victim to enter their login credentials.
LinkedIn based phishing campaigns imitated the style of communication of the professional social media platform with malicious emails using subjects like: “You appeared in 8 searches this week” or “You have one new message” or “I’d like to do business with you via LinkedIn.” Although appearing to come from LinkedIn they used an email address that was completely different to that of the brand.
Meanwhile, with the relentless trend to online shopping, it is not surprising that Q2 also saw shipping company DHL being faked in
“Phishing emails are a prominent tool in every hacker’s arsenal as they are fast to deploy and can target millions of users at relatively low cost,” said Omer Dembinsky, Data Research Group Manager at Check Point Software. “They give cybercriminals the opportunity to leverage the reputation of trusted brands to give users a false sense of security that can be exploited to steal personal or commercial information for financial gain.
“The criminals will use any brand with sufficient reach and consumer trust. Hence, we see hackers expanding their activities with the first appearance of Adidas, Adobe, and HSBC in the top 10, The hackers trade on our trust in these brands and that very human instinct for ‘the deal.’ There’s a reason the hackers continue to use brand-based phishing. It works. So, consumers need to act with caution and look out for tell-tale signs of the fake email, like poor grammar, spelling mistakes or strange domain names. If in doubt head for the brand’s own website rather than clicking any links.”
A brand phishing attack not only takes advantage of our implicit trust in a familiar brand, adopting its brand imagery often using a similar URL, it also plays on human emotions, like the fear of missing out on a discount. The sense of urgency this creates leads consumers to click in haste without first checking if the email is from the brand in question. This could lead to them inadvertently downloading malware or handing over precious personally identifiable information which can give criminals access to their entire online world and potential financial loss.
Top phishing brands in Q2 2022
Below are the top brands ranked by their overall appearance in brand phishing attempts:
- LinkedIn (
45% ) - Microsoft (
13% ) - DHL (
12% ) - Amazon (
9% ) - Apple (
3% ) - Adidas (
2% ) - Google (
1% ) - Netflix (
1% ) - Adobe (
1% ) - HSBC (
1% )
LinkedIn Phishing Email- Account Theft Example
During the Q2 of 2022, we observed a malicious phishing email that used LinkedIn’s branding. The phishing email was sent from a webmail address and spoofed to appear as if it was sent from “LinkedIn Security (mlayanac@armada.mil[.]ec)”. The email contained the subject “LinkedIn Notice!!!”, and the content tries to entice the victim to click on a malicious link under the guise of updating their LinkedIn account version. This click will lead to the link “https://lin882[.]webnode[.]page/”, where the victim is then required to enter their LinkedIn account information.
DHL Phishing Email – Account Theft Example
During the second quarter of 2022, we observed a malicious phishing email that used DHL’s branding. The phishing email was sent from a webmail address and spoofed to appear as if it was sent from “DHL EXPRESS (track@harbormfreight[.]com)”. The email contained the subject line “Incoming Shipment Notification”, and the content tries to persuade the victim to click on a malicious link that leads them to “https:// delicate-sea-3417.on.fleek.co”. The victim is then required to enter their username and password.
Outlook Phishing Email - Account Theft Example
In this phishing email, we see an attempt to steal a user’s Outlook account information. The email which was sent from the email address “Outlook OWA (mike@vokertech.com)”, contained the subject line “[Action Required] Final Reminder - Verify your OWA Account now”. The attacker was trying to lure the victim to click on a malicious link, which redirects the user to a fraudulent Outlook web app login page. In the malicious link (jfbfstxegfghaccl-dot-githu-dir-aceui-xoweu[.]ue[.]r[.]appspot[.]com), the user needed to enter their username and password.
Amazon Phishing Email - Billing Information Theft Example
In this phishing email, we see an attempt to steal a user’s billing information. The email which was sent from the email address “Amazon (fcarvache@puertoesmeraldas[.]gob[.]ec)”, contained the subject line “Your amazon account verification”. The title of the email and its contents are an attempt by the attacker to entice the victim to click on a malicious link “https://main.d1eoejahlrcxb.amplifyapp[.]com”, which redirects the user to a fraudulent page asking to enter billing information.
Follow Check Point Research via:
Blog: https://research.checkpoint.com/
Twitter: https://twitter.com/_cpresearch_
About Check Point Research
Check Point Research provides leading cyber threat intelligence to Check Point Software customers and the greater intelligence community. The research team collects and analyzes global cyber-attack data stored on ThreatCloud to keep hackers at bay, while ensuring all Check Point products are updated with the latest protections. The research team consists of over 100 analysts and researchers cooperating with other security vendors, law enforcement and various CERTs.
About Check Point Software Technologies Ltd.
Check Point Software Technologies Ltd. (www.checkpoint.com) is a leading provider of cyber security solutions to corporate enterprises and governments globally. Check Point Infinity´s portfolio of solutions protects enterprises and public organizations from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware and other threats. Infinity comprises three core pillars delivering uncompromised security and generation V threat prevention across enterprise environments: Check Point Harmony, for remote users; Check Point CloudGuard, to automatically secure clouds; and Check Point Quantum, to protect network perimeters and datacenters, all controlled by the industry’s most comprehensive, intuitive unified security management. Check Point protects over 100,000 organizations of all sizes.
MEDIA CONTACT: Emilie Beneitez Lefebvre Check Point Software Technologies Technologies press@checkpoint.com | INVESTOR CONTACT: Kip E. Meintzer Check Point Software Technologies ir@us.checkpoint.com |
FAQ
What did Check Point Research report about phishing brands in Q2 2022?
How much did Microsoft phishing attempts increase in Q2 2022?
What are the implications of the phishing trends reported by Check Point Research?