Cybersecurity company Vade reports that attackers sent more than 203.9 million emails in the third quarter alone, up from 155.3 million in the prior quarter Credit: ChakisAtelier / Getty Images / Clker-Free-Vector-Images Email security and threat detection company Vade has found that phishing emails in the third quarter this year increased by more than 31% quarter on quarter, with the number of emails containing malware in the first three quarters surpassing the 2021 level by 55.8 million.Malware emails in the third quarter of 2022 alone increased by 217% compared to same period in 2021. Malware email volume peaked in July, reaching 19.2 million, before month-over-month declines in August and September, with numbers dropping to 16.8 million and 16.5 million respectively.According to the report, email is the preferred attack vector for phishing and malware, as it gives hackers a direct channel to users, the weakest link in an organization’s attack surface. The report analyzes phishing and malware data captured by Vade, which does business internationally.As attacks become more sophisticated, Vade said, they also become increasingly capable of evading the basic security offered by email providers, which almost eight in 10 businesses still rely on, according to Vade’s research. While the activity of threat actors fluctuates, Vade’s research found that impersonating trusted and established brands remains the most popular strategy for hackers. In the third quarter of 2022, Facebook was the most impersonated brand for the second consecutive quarter, followed by Google, MTB, PayPal, and Microsoft.The financial services sector remains the most impersonated industry, representing 32% of phishing emails detected by Vade, followed by cloud at 25%, social media at 22%, and internet/telco at 13%. Phishing attacks are becoming more targetedAs phishing attacks increase, the techniques used by threat actors continue to evolve. While phishing campaigns were traditionally large scale and random, more recent campaigns seen by Vade suggest that hackers have pivoted to using more targeted campaigns.For example, in the report, Vade highlights an attack it observed in July 2022 where a phishing email impersonated Instagram in order to exploit the social media platform’s verification program. The campaign targets victims with emails that display their actual usernames, showing that the hackers spent time researching their targets before each attack.Another concerning campaign style outlined in the report takes the form of hackers weaponizing legitimate services to transmit and conceal their phishing attacks. For example, Vade said that in September it detected a campaign that exploited Pôle Emploi, a French career website, using it to distribute phishing links to companies looking for job candidates.“In the attack, hackers apply to job postings and upload a PDF resume containing malicious links,” Vade said. “Once submitted, the platform generates an email containing the malicious PDF, which it auto-sends to the recruiting company for review.”According to Vade, this is a new attack strategy that is likely to become more common in the future as it saves hackers the time and effort to design an email that impersonates an organization. It also increases the likelihood of a successful attack by lowering victims’ suspicions of nefarious activity.Training employees to spot phishing attacksWhile providing training to employees about the dangers of phishing is undoubtedly beneficial, earlier this month the UK’s National Cyber Security Centre (NCSC) warned businesses not to become “seduced” by the attractiveness of issuing phishing tests to staff, claiming that most implementations rarely offer “an objective measure” of an organisation’s defenses and can “just end up wasting time and effort.” A blog post on the NCSC’s website explained that responding to emails and clicking on links is an integral part of work, therefore attempting to stop the habit of clicking is extremely difficult.“Asking users to stop and consider every email in depth isn’t going to leave enough hours in the day to do work,” the post read.Duane Nicol, senior product manager awareness training at Mimecast, agreed with this approach, stating that holistic awareness training is far more suitable for keeping users engaged, as it provides more context as to why employees are having to do this and how it contributes their organisation’s overall resilience to cyberattacks.“With a multi-layered training approach, users are more likely to be engaged in training which would breed a culture of it becoming a norm to report suspicious emails within the workplace and to be more vigilant outside of it too, for example on social media and in their daily lives,” he said. Related content news analysis P2Pinfect Redis worm targets IoT with version for MIPS devices New versions of the worm include some novel approaches to infecting routers and internet-of-things devices, according to a report by Cado Security. By Lucian Constantin Dec 04, 2023 5 mins Botnets Botnets Botnets news Hackers book profit by scamming Booking.com customers Malicious elements are using Vidar infostealer to gain access to Booking.com’s management portal and defraud customers. By Gagandeep Kaur Dec 04, 2023 4 mins Cyberattacks Cybercrime Security opinion Proactive, not reactive: the path to ensuring operational resilience in cybersecurity The experience of the financial sector in dealing with threats is instructive to anyone in the cybersecurity space — there’s no substitute for getting out ahead of potential risks and problems. By Cameron Dicker Dec 04, 2023 6 mins Financial Services Industry Financial Services Industry Financial Services Industry feature 4 budget-savvy strategies for building an effective purple team Building a purple team is not only for organizations with a generous budget. From the shoestring one-person operation harnessing open-source power to the well-oiled machine of a comprehensive team, organizations of all sizes have a pathway to heighte By Maril Vernon Dec 04, 2023 14 mins Threat and Vulnerability Management IT Training Risk Management Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe