When the career criminal Willie Sutton was asked by a reporter why he robbed so many banks, he reportedly answered: “Because that’s where the money is.” The same logic applies to the question, “Why are there so many phishing attacks?” Simply because they work, again and again.
It’s estimated that phishing is the starting
point of over 90% of all attempted cyber-attacks, and Verizon’s 2019 Data Breach
Investigations Report showed
that nearly one-third (32%) of actual data breaches involved phishing
activity. What’s more, phishing was present in 78% of cyber-espionage
incidents and the installation and use of backdoors to networks.
They work because we’re human, and we make
mistakes – either because we’re in a rush and our defences are lowered, or
because we think we’re too smart to fall for a phishing attempt (a recent study showed how we often fail to
recognize risk in assessing our own actions, while spotting risk easier when
assessing other people’s behavior). But none of us is immune – especially when
the criminals behind attacks impersonate familiar, trusted brands that we often
interact with.
‘Brand phishing’ involves the attacker
imitating an official website of a known brand by using a similar domain or
URL, and usually a web page similar to the original website. The link to the
deceptive website can be sent via email or text message, a user can be
redirected during web browsing, or it may be triggered from a fraudulent mobile
application. In many cases the website contains a form intended to steal
credentials, personal information or payments.
Google and Amazon lead, Apple falls
Check Point Research’s latest Brand Phishing
Report for Q2 2020 shows that Google and Amazon were the most imitated brands
in phishing attempts, while Apple (the leading phishing brand in Q1) fell to 7th place
from the top spot in Q1. The total number of Brand Phishing detections
remains stable compared to Q1 2020.
Email phishing exploits were the second most common type after web-based exploits, compared to Q1 where email was third. The reason for this change may be the easing of global Covid-19 related restrictions, which have seen businesses re-opening and employees returning to work.
Here are the detailed brand phishing statistics
for Q2 2020, together with examples of phishing campaigns which aimed to
generate direct profit by impersonating Apple iCloud and PayPal.
Q2’s top
phishing brands
Below are the top 10 brands ranked by their overall appearance in brand phishing events during Q2 2020:
Top brand industry sectors
Technology
Banking
Social Network
Top phishing brands per vector
When examining the different vectors used we can see some noticeable differences in the brands being used in each vector: for example the focus in mobile is on major technology brands and media.
Email (24% of
attacks)
Microsoft
Outloo
Unicredit
Web (61% of
attacks)
Google
Amazon
WhatsApp
Mobile
(15% of attacks)
Facebook
WhatsApp
PayPal
iCloud login page – credentials theft
example
During late June, we witnessed a fraudulent website which was trying to imitate the login page of Apple’s cloud services, iCloud. The purpose of this website (example below), is to try and steal iCloud login credentials and is listed under the domain “account-icloud[.]com”. The domain was first active in late June 2020 and registered under the IP – 37.140.192.154, located in Russia.
PayPal login page – Credentials theft
example
During May we noticed a fraudulent website which was trying to imitate a PayPal login page. The website is listed under the address paypol-login[.]com. The domain is registered first registered on 2018 and was reused once again in late May. The domain is registered under IP in U.S. 52.22.86.101
To avoid
falling victim to phishing scams, we recommend the following actions:
Verify you are using or ordering from an authentic website. One way to
do this is NOT to click on promotional links in emails, and instead Google your
desired retailer and click the link from the Google results page.
Beware of “special” offers. An 80% discount on a new iPhone is usually
not a reliable or trustworthy purchase opportunity.
Beware of lookalike domains, spelling errors in emails or websites, and
unfamiliar email senders.