HomeCyber BalkansMicrosoft and American Express: Most commonly impersonated brands in phishing emails targeting...

Microsoft and American Express: Most commonly impersonated brands in phishing emails targeting financial services

Published on

spot_img

A recent report by Trustwave SpiderLabs has revealed that technology giant Microsoft and multinational banking firm American Express are the most frequently spoofed companies in phishing emails targeting the financial services industry. The report, titled the 2023 Financial Services Sector Threat Landscape, explores the various threats faced by the financial services industry and highlights the prevalence of phishing and email-borne malware as the primary methods used by cybercriminals to gain unauthorized access to organizations.

Trustwave SpiderLabs has observed “interesting developments” in the delivery methods, techniques, themes, and targeted brands of attacks on financial services over the past year. These developments have contributed to the ongoing relevance and effectiveness of phishing attacks in particular.

The financial services industry has become an increasingly attractive target for cybercriminals. A separate study conducted by Akamai discovered a significant surge in web application and API attacks targeting the global financial services industry. These attacks increased by 65% in the second quarter of 2023 compared to the same period in 2022, resulting in a total of 9 billion attacks over an 18-month time frame. The research revealed that banks bore the majority of these attacks, highlighting the vulnerability of the sector.

In addition to phishing attacks, the financial services sector has also experienced a rise in Distributed Denial of Service (DDoS) attacks. Trustwave SpiderLabs’ report states that the financial services sector now ranks as the top vertical for DDoS attacks, with the EMEA region accounting for 63.5% of global DDoS events.

According to Trustwave SpiderLabs’ data from its financial services client base, HTML files are the most commonly used malicious attachments in phishing emails, comprising 78% of all assessed malicious attachments. These HTML files are primarily employed for credential phishing, redirectors, and HTML smuggling. Furthermore, 33% of HTML files utilize obfuscation as a defense evasion technique.

The report also notes that executables are the second most prevalent type of malicious attachment, accounting for 14% of all assessed attachments. Among the most frequently observed attachments are information stealing malware such as Gootloader, XLoader, Lokibot, Formbook, and Snake Keylogger. Additionally, the dataset revealed the presence of the Agent Tesla Remote Access Trojan (RAT).

In comparison, attackers make limited use of PDFs (3%), Excel files (2%), and Word documents (1%) as malicious attachments, as reported by Trustwave SpiderLabs.

Some of the common themes found in phishing emails with malicious attachments include voicemail notifications, payment receipts, purchase orders, remittances, bank deposits, and quotation requests. The most frequently spoofed brands in these types of attacks are American Express (24%), DHL (21%), and Microsoft (15%).

The report also identifies non-malicious attachment phishing themes, such as “Urgent Action” messages, mailbox-related alerts, document sharing, e-signing, account-related alerts, missed communications, meeting-related notifications, and payment/invoice-related alerts. In these types of attacks, Microsoft (52%), DocuSign (10%), and American Express (8%) are the brands most commonly spoofed.

Finally, the report highlights that in the context of Business Email Compromise (BEC), the most frequently used theme is “Payroll Diversion” at 48%, followed by “Request for Contact” at 23%, and “Task” at 13%.

The findings of the Trustwave SpiderLabs report shed light on the growing threats faced by the financial services industry. As cybercriminals continue to evolve their tactics and target high-profile organizations, it is crucial for financial institutions to remain vigilant and prioritize cybersecurity measures to protect sensitive information and mitigate potential risks.

Source link

Latest articles

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...

Fortinet Warns of Active Exploitation of FortiOS SSL VPN 2FA Bypass Vulnerability

 Fortinet on Wednesday said it observed "recent abuse" of a five-year-old security flaw in FortiOS...

More like this

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...