Phishing emails are still the primary initial attack vector for cybersecurity incidents, according to a report from Cloudflare. Credit: Shutterstock Email phishing remains one of the most dangerous vectors for organizational cyberattacks, as well as one of the most difficult to defend against, with deceptive links, brand impersonation and other phishing threats sharply on the rise. A study published Tuesday by web services and security vendor Cloudflare, which analyzed 250 million malicious email messages sent between May 2022 and May 2023, found that deceptive links accounted for over a third of all detected threats -- 35.6%. Scammers have become increasingly skilled at making their messages appear legitimate, appropriating graphics and formatting used by legitimate senders. The consequences of clicking a malicious link can range from credential harvesting, if a user enters them on an attacker-controlled landing page, remote code execution, and network compromise. Moreover, the standard techniques used in phishing attacks are becoming more sophisticated, Cloudflare said. Attackers will set up malicious domains well in advance of sending phishing emails, to evade systems that alert when messages come from newly created domains, for instance. It's also become relatively straightforward for attackers to bypass common email server security techniques, like sender policy frameworks, DomainKeys-identified mail, and domain-based message authentication reporting and conformance. These techniques don't work against spoofed domain names or look-alike emails that fool networks into thinking that an email is secure. And none of them inspect the content of the messages themselves, according to Cloudflare, meaning that they only check to see whether the sending domain is configured correctly. Impersonating someone else's identity was one of the fastest growing techniques, jumping from 3.9% of detected threats to 14.2% in the past year. The most-faked identity was Microsoft, which turned up in 9.9% of all such attacks. Rounding out the top 10 most-impersonated brands were the World Health Organization, Google, SpaceX, Salesforce, Apple, Amazon and T-Mobile, and MasterCard. Brand impersonation tended to concentrate around very well-recognized organizations, according to Cloudflare's study, with about 60% of all such incidents involving the very largest brands in the world. Finally, compromised emails at vendors and other large organizations can be particularly dangerous, because they don't require malicious attachments or deceptive links -- a bad actor can simply send something like a fake invoice from a legitimate source. Business email compromise attacks represented a fairly small percentage of all threats (0.5%), and Cloudflare said that this is partially due to their being identified early in the attack cycle. (Editor’s note: This story has been corrected, to take Boeing out of the list of most-faked companies for phishing emails, and adding MasterCard to the top 10 list.) Related content brandpost How an integrated platform approach improves OT security By Richard Springer Sep 26, 2023 5 mins Security news Teachers urged to enter schoolgirls into UK’s flagship cybersecurity contest CyberFirst Girls aims to introduce girls to cybersecurity, increase diversity, and address the much-maligned skills shortage in the sector. By Michael Hill Sep 26, 2023 4 mins Back to School Education Industry IT Training news CREST, IASME to deliver UK NCSC’s Cyber Incident Exercising scheme CIE scheme aims to help organisations find quality service providers that can advise and support them in practising cyber incident response plans. By Michael Hill Sep 26, 2023 3 mins IT Governance Frameworks Incident Response Data and Information Security news Baffle releases encryption solution to secure data for generative AI Solution uses the advanced encryption standard algorithm to encrypt sensitive data throughout the generative AI pipeline. By Michael Hill Sep 26, 2023 3 mins Encryption Generative AI Data and Information Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe