wonderfully unique software solutions

Phishing attacks still plague common file types, Hornetsecurity warns

Phishing via archive, HTML, Excel or PDF files remain the leading email-based cyber attack on organisations, according to cybersecurity specialists at Hornetsecurity.

For the month of June 2022, archive file types comprised some 35.6% of attacks picked up by the email security vendor’s threat research, followed by HTML (18.5%), Excel spreadsheets (14.4%) and PDFs (12.6%).

“Some of the most commonly impersonated brands in email phishing attacks are banks, credit card companies, shipping companies, and online retailers,” the vendor explained.

“These types of attacks usually involve the attacker sending an email that appears to be from a legitimate company, and asking the recipient to provide personal or financial information.”

Of threats found, 30.7% were phishing attacks, with URL-based threats (11.7%) next, the report said.

Phishing emails often contain a link to a fake website that resembles or even looks identical to the real website. Information collected can then be used for fraud or theft attempts, including identity theft.

Hornetsecurity’s threat report for June 2022 listed Sparkasse, DHL, Amazon, 1&1, Postbank, Microsoft, UPS, Volks-und Raiffeisenbank, LinkedIn and DocuSign as some commonly impersonated brand names.

“It’s a constant stream of phishing and other attacks impersonating big brands and organizations to entice recipients to open the emails,” the vendor said.

“Phishing dominates email attacks because it is an effective way to trick people into giving away their personal information or clicking on malicious links. They often contain urgent or alarming language that can trick people into taking action without thinking.”

Hornetsecurity warned that modern tools can allow phishers to retrieve 2FA codes or session cookies as well — circumventing popular security features of many financial organisations and e-commerce sites.

In June 2022, attacks on the research industry were prevalent, comprising 7.2% of attacks, followed by manufacturing (4.2%) and transport (4%). Automotive industry, utilities, IT, the media, mining, retail and agriculture were also frequent targets.

HTML, PDF, ZIP, and Excel files were popular vectors of attack because they can be used to hide malicious code that executes on opening, without additional software, Hornetsecurity noted.

( Image by Gerd Altmann from Pixabay )

Recent Articles

Vyond bundles in further AI and branding capabilities for corporate creatives

Video creation platform vendor Vyond is expanding its offerings with new brand-management tools as well as further generative AI functionality responding to...

LastPass analyst warns of looming credentials crisis

Organisations should beware of an oncoming crisis in the secure management of user access, according to a cybersecurity specialist at password management...

Octopus Deploy follows Codefresh buy with 2024.1 Server

Continuous delivery (CD) pipeline platform vendor Octopus Deploy has acquired fellow development software specialist Codefresh and rolled out a new version of...

Top-25 cloud list runs gamut from Visma to Cloudflare, Wasabi to Azul

The Software Report market insights website has named 25 software companies as the top companies in cloud computing for 2024, offering specific...

TeamViewer partners Deloitte on digital visuals for warehouse logistics

Deloitte and TeamViewer have combined the latter's augmented reality (AR) based visual picking offering with SAP Extended Warehouse Management (EWM) for warehousing...

Related Stories

Leave A Reply

Please enter your comment!
Please enter your name here

Weirdware monthly - Get the latest news in your inbox