wonderfully unique software solutions

Phishing attacks still plague common file types, Hornetsecurity warns

Phishing via archive, HTML, Excel or PDF files remain the leading email-based cyber attack on organisations, according to cybersecurity specialists at Hornetsecurity.

For the month of June 2022, archive file types comprised some 35.6% of attacks picked up by the email security vendor’s threat research, followed by HTML (18.5%), Excel spreadsheets (14.4%) and PDFs (12.6%).

“Some of the most commonly impersonated brands in email phishing attacks are banks, credit card companies, shipping companies, and online retailers,” the vendor explained.

“These types of attacks usually involve the attacker sending an email that appears to be from a legitimate company, and asking the recipient to provide personal or financial information.”

Of threats found, 30.7% were phishing attacks, with URL-based threats (11.7%) next, the report said.

Phishing emails often contain a link to a fake website that resembles or even looks identical to the real website. Information collected can then be used for fraud or theft attempts, including identity theft.

Hornetsecurity’s threat report for June 2022 listed Sparkasse, DHL, Amazon, 1&1, Postbank, Microsoft, UPS, Volks-und Raiffeisenbank, LinkedIn and DocuSign as some commonly impersonated brand names.

“It’s a constant stream of phishing and other attacks impersonating big brands and organizations to entice recipients to open the emails,” the vendor said.

“Phishing dominates email attacks because it is an effective way to trick people into giving away their personal information or clicking on malicious links. They often contain urgent or alarming language that can trick people into taking action without thinking.”

Hornetsecurity warned that modern tools can allow phishers to retrieve 2FA codes or session cookies as well — circumventing popular security features of many financial organisations and e-commerce sites.

In June 2022, attacks on the research industry were prevalent, comprising 7.2% of attacks, followed by manufacturing (4.2%) and transport (4%). Automotive industry, utilities, IT, the media, mining, retail and agriculture were also frequent targets.

HTML, PDF, ZIP, and Excel files were popular vectors of attack because they can be used to hide malicious code that executes on opening, without additional software, Hornetsecurity noted.

( Image by Gerd Altmann from Pixabay )

Recent Articles

Responsibility shifts towards vendors with US National Cybersecurity Strategy

The US government has called for aggressive regulation as part of its National Cybersecurity Strategy for 2023, ITops company Automox has warned.

Four critical challenges for cybersecurity provision in 2023

Skill sets, AI, co-operation, and climate have become the critical challenges for cybersecurity provision this year, according to Europe-based IT/OT security software...

Snow adds certifications to partner programme to drive Atlas sales

Technology intelligence software platform Snow Atlas has achieved ISO 27001 certification and completed the Service Organisation Control (SOC) 2 Type 1 examination...

Arista says edge threat defences could have safeguarded Tallahassee health

Tallahassee Memorial Health might not have been disrupted in February, requiring systems downtime and patient inconvenience, had it deployed strong edge threat...

OpenText Cloud Editions aim for accelerated AI and digital transformations

Information software company OpenText has whipped the covers off its Cloud Editions (CE) 23.1, which it says will support AI adoption and...

Related Stories

Leave A Reply

Please enter your comment!
Please enter your name here

Weirdware monthly - Get the latest news in your inbox