Scammers Most Likely to Impersonate DHL, Warns New Brand

0
252


SAN CARLOS, Calif., Oct. 24, 2022 (GLOBE NEWSWIRE) — Check Point Research (CPR), the Threat Intelligence arm of Check Point® Software Technologies Ltd. (NASDAQ: CHKP), a number one supplier of cybersecurity options globally, has printed its Brand Phishing Report for Q3 2022. The report highlights the manufacturers which have been most regularly imitated by criminals of their makes an attempt to steal people’ private info or cost credentials throughout July, August and September.

While LinkedIn was probably the most imitated model in each Q1 and Q2 2022, it’s delivery firm DHL that took the highest spot in Q3, accounting for twenty-two % of all phishing makes an attempt worldwide. Microsoft is in second place (16%) and LinkedIn has fallen into third, making up simply 11% of scams, in contrast to 52% in Q1 and 45% in Q2. DHL’s enhance could possibly be due partly to a serious international rip-off and phishing assault that the logistics big warned about itself simply days earlier than the quarter began. Instagram has additionally appeared within the high ten listing for the primary time this quarter, following a ‘blue-badge’ associated phishing marketing campaign that was reported in September.

Shipping is likely one of the high business sectors for model phishing, second solely to expertise. As we head into the busiest retail interval of the yr, CPR will proceed to monitor delivery associated scams as risk actors will probably enhance their efforts to make the most of web shoppers.

“Phishing is the most common type of social engineering, which is a general term describing attempts to manipulate or trick users. It is an increasingly common threat vector used in most security incidents,” commented Omer Dembinsky, Data Research Group Manager at Check Point. “In Q3, we saw a dramatic reduction in the number of phishing attempts related to LinkedIn, which reminds us that cybercriminals will often switch their tactics to increase their chances of success. It is still the third most commonly impersonated brand though, so we’d urge all users to stay mindful of any emails or communications purporting to be from LinkedIn. Now that DHL is the brand most likely to be imitated, it’s crucial that anyone expecting a delivery goes straight to the official website to check progress and/or notifications. Do not trust any emails, particularly those asking for information to be shared.”

In a model phishing assault, criminals attempt to imitate the official web site of a well known model through the use of an analogous area title or URL and web-page design to the real website. The hyperlink to the pretend web site might be despatched to focused people by e-mail or textual content message, a consumer might be redirected throughout net looking, or it could be triggered from a fraudulent cell software. The pretend web site typically accommodates a type meant to steal customers’ credentials, cost particulars or different private info.

Top phishing manufacturers in Q3 2022

Below are the highest manufacturers ranked by their general look in model phishing makes an attempt:

  1. DHL (associated to 22% of all phishing assaults globally)
  2. Microsoft (16%)
  3. LinkedIn (11%)
  4. Google (6%)
  5. Netflix (5%)
  6. WeTransfer (5%)
  7. Walmart (5%)
  8. WhatsApp (4%)
  9. HSBC (4%)
  10. Instagram (3%)

DHL Phishing Email – Account Theft Example

As a part of campaigns utilizing DHL’s branding that appeared throughout Q3 2022, we noticed a malicious phishing e-mail that was despatched from a webmail tackle “info@lincssourcing[.]com” and spoofed to seem as if it was despatched from “DHL Express”. The e-mail contained the subject- “Undelivered DHL(Parcel/Shipment)”, and the content material tries to persuade the sufferer to click on on a malicious hyperlink claiming that there’s a supply meant for them that may be despatched simply after updating the supply tackle. This hyperlink leads to a malicious website- “https://bafybeig4warxkemgy6mdzooxeeuglstk6idtz5dinm7yayeazximd3azai[.]ipfs[.]w3s[.]link/dshby[.]html/” that requires the sufferer’s username and password to be entered.

OneDrive Phishing Email – Account Theft Example

In this phishing e-mail, we see an try to steal a consumer’s Microsoft account info. The e-mail which was despatched from the webmail tackle [email protected]beneath the pretend sender title – “OneDrive”, contained the topic A document titled ‘Proposal’ has been shared with you on Onedrive”. The attacker tries to lure the sufferer to click on on the malicious hyperlink claiming that an essential doc titled “Proposal” shared with them on their OneDrive. This malicious hyperlink – https://mail-supp-365[.]herokuapp[.]com/” redirects the consumer to a fraudulent Microsoft net app login web page, there the consumer wants to enter their account password.

As all the time, we encourage customers to be cautious when divulging private knowledge and credentials to business functions or web sites, and to suppose twice earlier than opening e-mail attachments or hyperlinks, particularly emails that declare to be from corporations akin to DHL, Microsoft or LinkedIn, as they’re the more than likely to be impersonated.

Follow Check Point Research through:
Blog: https://research.checkpoint.com/ 
Twitter: https://twitter.com/_cpresearch_ 

About Check Point Research 
Check Point Research supplies main cyber risk intelligence to Check Point Software prospects and the larger intelligence group. The analysis workforce collects and analyzes international cyber-attack knowledge saved on ThreatCloud to hold hackers at bay, whereas guaranteeing all Check Point merchandise are up to date with the most recent protections. The analysis workforce consists of over 100 analysts and researchers cooperating with different safety distributors, legislation enforcement and numerous CERTs. 

About Check Point Software Technologies Ltd. 
Check Point Software Technologies Ltd. (https://www.checkpoint.com/) is a number one supplier of cybersecurity options to company enterprises and governments globally.  Check Point Infinity’s portfolio of options protects enterprises and public organisations from 5th era cyberattacks with an business main catch price of malware, ransomware and different threats. Infinity contains 4 core pillars delivering uncompromised safety and era V risk prevention throughout enterprise environments: Check Point Harmony, for distant customers; Check Point CloudGuard, to robotically safe clouds; and Check Point Quantum, to defend community perimeters and datacenters, all managed by the business’s most complete, intuitive unified safety administration; Check Point Horizon, a prevention-first safety operations suite. Check Point protects over 100,000 organizations of all sizes.





Source link

LEAVE A REPLY

Please enter your comment!
Please enter your name here