Is can be tricky for staff members to spot phishing scams as the attacks typically give a plausible reason for performing an action like downloading an update, so much so that the web portals provdied are practically indistinguishable from the real websites that the scammers spoof and credentials are commonly stolen.

The pandemic has seen growing numbers of employees working from home and logging onto their company’s cloud applications remotely. Companies are now much more dependent on email for communication than when staff members were all office based. Hackers have been taking advantage and have been targeting remote workers with phishing scams and many of these attacks have been profitable.

Staff members are often given more training on cybersecurity and are warned to be wary of emails that have been sent from unrecognized people, but many still open the emails and take the desired action. The emails often pretend to bean individual that is known to the recipient, which increases the chances of that email being opened. It is also common for well known companies to be impersonated in phishing attacks, with the hackers leveraging trust in that brand.

A recent review of phishing emails by Check Point showed that the most commonly impersonated brand in phishing attacks over the past quarter is Microsoft, which is not surprising given the number of businesses using Office 365. The study revealed 43% of phishing attempts that mimic brands pretend to be Microsoft.

Microsoft details are then recorded in these attacks and are used to remotely log onto accounts. The data stored in a just one email account can be massive. There have been many healthcare phishing campaigns that have seen a single account compromised that included the sensitive data of tens of thousands or even hundreds of thousands of clients. These phishing emails are often only the first step in a multi-stage attack that gives the threat actors the base they need for a much more in depth attack on the organization, often resulting in the theft of large amounts of data and ending with the sharing of ransomware.

Microsoft is far from the only brand impersonated. The review showed that DHL is the second most impersonated brand. DHL-based phishing attacks use failed delivery alerts and shipping notices as the lure to get individuals to either share sensitive information such as login details or open malicious email attachments that install malware. 18% of all brand impersonation phishing attacks involve the impersonation of DHL. This makes sense as the phishers target companies and especially during a pandemic when there is increased reliance on courier businesses.

Other well-known companies that are commonly impersonated include PayPal and Chase to obtain account details. LinkedIn to permit professional networking accounts to be infiltrated, and Google and Yahoo are commonly impersonated to obtain account details. Attacks spoofing Amazon, Rakuten, and IKEA also feature in the top 10 most spoofed brand list.

Phishers mostly aim for company users as their credentials are far more profitable. Businesses therefore need to ensure that their phishing security measures up to date. Security awareness training for employees is important but given the realistic danger of phishing emails and the plausibility of the lures deployed, it is crucial for more reliable measures to be implemented to prevent phishing attacks.

To better secure your company from phishing campaigns, a third-party spam filter should be layered on top of Office 365. SpamTitan has been designed to supply enhanced protection for businesses that use Office 365. The solution implements easily with Office 365 and the solution is easy to configure and manage. The result will be far better security from phishing campaigns and other malicious emails that employees struggle to recognize.

For more details on SpamTitan, to sign up for a free trial, and for details of pricing, give the TitanHQ team a call now.