Phishing pages impersonating Facebook and Microsoft contributed a little more than 25% of all phishing pages analyzed in a new report by Vade, while financial organizations comprised the hardest-hit sector overall. Credit: Andreus / Getty Images Facebook jumped to the top spot in the 20 most impersonated brands by phishers in 2021, representing 14% of phishing pages, according to Vade’s annual Phishers’ Favorites report. Microsoft, with 13%, placed second, according to the report, which analyzed full-year phishing data captured by Vade, a company that offers an email filtering service for phishing, malware, spear phishing, and spam.“Phishing remains one of the top threats to businesses around the world,” says Adrien Gendre, Vade’s chief product officer. “Phishers should no longer be viewed as lone hackers, but rather taken seriously as individuals who are part of organized hacking groups.” Security alerts, password resets lure victimsAmid the ongoing pandemic and its recent rebranding as Meta, Facebook has gained enormous traction, reaching over 2.9 billion active users. This has pushed the social media giant to the front line, making it a prime target for phishing attacks. Facebook phishing typically involves fake security alerts and password reset requests that redirect the user to a phishing page — a website page impersonating a legitimate website and designed to steal user credentials. In 2020, Facebook was in the second spot on the list. Second on the list this year, Microsoft was the most impersonated cloud technology vendor. Microsoft-related phishing ran a gamut of sophisticated attacks, unlike the old email-only phishing techniques. The newer strategies included automated and highly targeted attacks that used little more than a Microsoft logo and a phishing link. The report highlights attacks that involved automatically rendering corporate logos and background images onto highly targeted Microsoft 365 phishing pages. “Attacks like the one highlighted in the report are designed [to activate] only when select victims clicked on the phishing link,” explains Gendre. “For example, if a user who is not useful to a hacker clicks on a phishing link, the phishing page will not trigger and they will be carried on to [a] safe page.” This is achieved by the hacker validating the victim’s identity by sending an API call to Microsoft with the victim’s email address. If the victim ID checks out, the phishers make an HTTP post request for the Microsoft logo and background image and display it on the phishing page. Other top cloud tech and streaming services brands impersonated were Netflix and Adobe. Phishing hits financial sectorAccording to the report, “financial services” was the most impersonated industry of 2021, and represented 35% of all phishing pages. For the report, Vade analyzed 184,977 phishing pages linked from unique phishing emails. In 2020, the sector represented 28% of all phishing pages. The most impersonated financial services brands for 2021 included Chase, PayPal, and Wells Fargo. The report also highlighted Mondays and Tuesdays as days of the week when most phishing attacks were launched. Additionally, weekends (22%) were found to be lesser targeted for phishing compared to weekdays (78%). Within this, Microsoft phishing was found highly active during the weekdays, representing a corporate phishing trend, as opposed to social media phishing (e.g., Facebook) which remained equally active throughout the week. Another strong trend witnessed during the period included tech support scams turning into phishing attacks. Unlike conventional attacks, these attacks don’t include a phishing link but instead feature phone numbers. These numbers, when called, would then lure callers to establish remote access to personal systems for further exploitation. Using a phone number aids credibility, allows deeper extraction (for example, bank account numbers), and throws off filters that specifically look for phishing URLs, according to Gendre. Key recommendations outlined in the report included user training, adopting AI-based, antiphishing technology, automated incident response, and multiphase attack protection using unsupervised and NLP (natural language processing) algorithms to detect rare events and anomalies. Related content news analysis Cisco unveils AI-powered assistants to level up security defenses New AI-driven tools aim to simplify and bolster policies, alerts and prevention to reduce complexity when setting security policies and assess traffic without decryption. By Rosalyn Page Dec 05, 2023 5 mins Encryption Cloud Security brandpost Sponsored by Microsoft Security How Microsoft and Amazon are expanding the fight against international tech support fraud By partnering with other companies to share vital information and resources, Microsoft is taking the fight to ever-evolving support fraud in 2024…and beyond. By Microsoft Security Dec 05, 2023 1 min Security news analysis Russia's Fancy Bear launches mass credential collection campaigns The campaigns exploit Outlook and WinRAR flaws to target government, defense, and other entities, and they represent a change of tactic for the APT28 group. By Lucian Constantin Dec 05, 2023 5 mins Advanced Persistent Threats Critical Infrastructure Vulnerabilities brandpost Sponsored by Palo Alto Networks Addressing vulnerabilities in OT environments requires a Zero Trust approach Here’s a rundown of why manufacturers are so exposed and how Zero Trust can help solve many security issues. By Navneet Singh, vice president of marketing, network security, Palo Alto Networks Dec 05, 2023 6 mins Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe