Google and Amazon Overtake Apple as Most Imitated Brands for Phishing in Q2 2020

By : Krishna Anindyo | Tuesday, August 04 2020 - 09:15 IWST

Ilustration Brand phishing (Photo by Technonlogy For You)
Ilustration Brand phishing (Photo by Technonlogy For You)

INDUSTRY.co.id - When the career criminal Willie Sutton was asked by a reporter why he robbed so many banks, he reportedly answered: "Because that's where the money is." The same logic applies to the question, “Why are there so many phishing attacks?” Simply because they work, again and again.

It’s estimated that phishing is the starting point of over 90% of all attempted cyber-attacks, and Verizon’s 2019 Data Breach Investigations Report showed that nearly one-third (32%) of actual data breaches involved phishing activity. What’s more, phishing was present in 78% of cyber-espionage incidents and the installation and use of backdoors to networks.

They work because we’re human, and we make mistakes – either because we’re in a rush and our defences are lowered, or because we think we’re too smart to fall for a phishing attempt (a recent study showed how we often fail to recognise risk in assessing our own actions, while spotting risk easier when assessing other people’s behaviour).

But none of us is immune – especially when the criminals behind attacks impersonate familiar, trusted brands that we often interact with.

‘Brand phishing’ involves the attacker imitating an official website of a known brand by using a similar domain or URL, and usually a web page similar to the original website. The link to the deceptive website can be sent via email or text message, a user can be redirected during web browsing, or it may be triggered from a fraudulent mobile application. In many cases the website contains a form intended to steal credentials, personal information or payments.

Google and Amazon lead, Apple falls

Check Point Research’s latest Brand Phishing Report for Q2 2020 shows that Google and Amazon were the most imitated brands in phishing attempts, while Apple (the leading phishing brand in Q1) fell to 7th place from the top spot in Q1. The total number of Brand Phishing detections remains stable compared to Q1 2020.

Email phishing exploits were the second most common type after web-based exploits, compared to Q1 where email was third. The reason for this change may be the easing of global Covid-19 related restrictions, which have seen businesses re-opening and employees returning to work.

Here are the detailed brand phishing statistics for Q2 2020, together with examples of phishing campaigns which aimed to generate direct profit by impersonating Apple iCloud and PayPal.

Q2’s top phishing brands

Below are the top 10 brands ranked by their overall appearance in brand phishing events during Q2 2020:

Top brand industry sectors

Technology

Banking

Social Network

Top phishing brands per vector

When examining the different vectors used we can see some noticeable differences in the brands being used in each vector. For example the focus in mobile is on major technology brands and media.

Email (24% of attacks)

Microsoft

Outlook

Unicredit

Web (61% of attacks)

Google

Amazon

WhatsApp

Mobile (15% of attacks)

Facebook

WhatsApp

PayPal

iCloud login page – credentials theft example

During late June we witnessed a fraudulent website which was trying to imitate the login page of Apple’s cloud services, iCloud. The purpose of this website (example below), is to try and steal iCloud login credentials and is listed under the domain “account-icloud”. The domain was first active in late June 2020 and registered under the IP - 37.140.192.154, located in Russia.

PayPal login page – Credentials theft example

During May we noticed a fraudulent website which was trying to imitate a PayPal login page. The website is listed under the address paypol-login[.]com. The domain is registered first registered on 2018 and was reused once again in late May. The domain is registered under IP in U.S. 52.22.86.101.

To avoid falling victim to phishing scams, we recommend the following actions:

Verify you are using or ordering from an authentic website. One way to do this is NOT to click on promotional links in emails, and instead Google your desired retailer and click the link from the Google results page.

Beware of “special” offers. An 80% discount on a new iPhone is usually not a reliable or trustworthy purchase opportunity.

Beware of lookalike domains, spelling errors in emails or websites, and unfamiliar email senders.

News Comment

Today's Industry

Mechatronic Calotte Loader mWL.cs

Sabtu, 23 Januari 2021 - 17:50 WIB

Mechatronic Systemtechnik Unveils Proprietary Calotte Loader mWL.cs

A fully automated stand-alone system for transferring wafers between cassettes and calottes, the mWL.cs provides integrated device manufacturers (IDMs) an opportunity to increase yield and improve…

Electro-Balancer (E-Balancer)

Rabu, 13 Januari 2021 - 16:00 WIB

ZASCHE Handling Rolls Out New Range of Electric Balancers

the E-Balancer is a versatile tool suited for a broad range of heavy-duty industrial applications.

Taylor Armerding, Software Security Expert at Synopsys Software Integrity Group (Photo by Linkedin)

Rabu, 13 Januari 2021 - 15:40 WIB

What is the Cost of Poor Software Quality in the U.S.?

And if you doubt its credibility, or that it applies to software, check out the latest report from the Consortium for Information & Software Quality (CISQ), in partnership with Synopsys, “The…

Nivedita Murthy - Senior Security Consultant, at Synopsys Software Integrity Group

Jumat, 08 Januari 2021 - 17:35 WIB

DevSecOps: The good, the bad, and the ugly

DevSecOps is the practice of integrating security into every stage of the DevOps pipeline.

MP200 ExtremeBevel

Rabu, 23 Desember 2020 - 14:05 WIB

Hypertherm Introduces Extreme Bevel Plasma Consumables for its MAXPRO200 Air and Oxygen Plasma System

The MAXPRO200 is a true workhorse for companies demanding great cut quality along with high productivity and low operating costs.