Africa Business Communities
Google, Amazon overtake Apple as most imitated brands for phishing in Q2 2020, report

Google, Amazon overtake Apple as most imitated brands for phishing in Q2 2020, report

It’s estimated that phishing is the starting point of over 90% of all attempted cyber-attacks, and Verizon’s 2019 Data Breach Investigations Report showed that nearly one-third (32%) of actual data breaches involved phishing activity.  What’s more, phishing was present in 78% of cyber-espionage incidents and the installation and use of backdoors to networks.

They work because we’re human, and we make mistakes – either because we’re in a rush and our defences are lowered, or because we think we’re too smart to fall for a phishing attempt (a recent study showed how we often fail to recognize risk in assessing our own actions, while spotting risk easier when assessing other people’s behavior). But none of us is immune – especially when the criminals behind attacks impersonate familiar, trusted brands that we often interact with.

‘Brand phishing’ involves the attacker imitating an official website of a known brand by using a similar domain or URL, and usually a web page similar to the original website. The link to the deceptive website can be sent via email or text message, a user can be redirected during web browsing, or it may be triggered from a fraudulent mobile application. In many cases the website contains a form intended to steal credentials, personal information or payments.

Google and Amazon lead, Apple falls

Check Point's Research latest Brand Phishing Report for Q2 2020 shows that Google and Amazon were the most imitated brands in phishing attempts, while Apple (the leading phishing brand in Q1) fell to 7th place from the top spot in Q1.  The total number of Brand Phishing detections remains stable compared to Q1 2020.

Email phishing exploits were the second most common type after web-based exploits, compared to Q1 where email was third. The reason for this change may be the easing of global Covid-19 related restrictions, which have seen businesses re-opening and employees returning to work. 

Here is the analysis of brand phishing statistics for Q2 2020, together with examples of phishing campaigns which aimed to generate direct profit by impersonating Apple iCloud and PayPal. 

Top 10 brands ranked by their overall appearance in brand phishing events during Q2 2020: 

Top brand industry sectors

1. Technology
2. Banking
3. Social Network

Top phishing brands per vector

When examining the different vectors used we can see some noticeable differences in the brands being used in each vector: for example the focus in mobile is on major technology brands and media.

Email (24% of attacks)

1. Microsoft
2. Outlook
3. Unicredit

Web (61% of attacks)

1. Google
2. Amazon
3. WhatsApp

Mobile (15% of attacks)

1. Facebook
2. WhatsApp
3. PayPal

iCloud login page – credentials theft example

During late June Check Point witnessed a fraudulent website which was trying to imitate the login page of Apple’s cloud services, iCloud.  The purpose of this website is to try and steal iCloud login credentials and is listed under the domain “account-iCloud[.]com”. The domain was first active in late June 2020 and registered under the IP - 37.140.192.154, located in Russia.

PayPal login page – Credentials theft example

In May Check Point  noticed a fraudulent website which was trying to imitate a PayPal login page. The website is listed under the address paypal-login[.]com. The domain is registered first registered on 2018 and was reused once again in late May. The domain is registered under IP in U.S. 52.22.86.101

 To avoid falling victim to phishing scams:

1. Verify you are using or ordering from an authentic website. One way to do this is NOT to click on promotional links in emails, and instead Google your desired retailer and click the link from the Google results page.
2. Beware of “special” offers. An 80% discount on a new iPhone is usually not a reliable or trustworthy purchase opportunity.
3. Beware of lookalike domains, spelling errors in emails or websites, and unfamiliar email senders.

www.checkpoint.com

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Share this article