Report Q3 2022: Phishing emails with DHL, Microsoft, LinkedIn

Share post

Check Point security researchers release their alert list to remind all users that cyber criminals like to impersonate big brands for fraudulent purposes. Fake emails from DHL, Microsoft and LinkedIn also end up in companies a lot.

Check Point Research, the research division of Check Point Software, has published the Brand Phishing Report for Q3 2022. The report highlights the brands most commonly impersonated by criminals to steal personal data or payment information during the months of July, August and September.

Phishing emails: also target LinkedIn

While LinkedIn was the most impersonated brand in both the first and second quarters of 2022, in the third quarter it is the shipping company DHL that tops the list with 22 percent of all phishing attempts worldwide. Microsoft is in second place (16 percent) and LinkedIn has fallen to third place with 11 percent.

🔎 Attackers are also very interested in access to OneDrive: they try to confuse users with fake shares (Image: Check Point).

The rise in swindling on behalf of DHL could be due in part to a major global fraud and phishing attack that the logistics giant itself warned about just days before the quarter began. Instagram also made its debut this quarter after a blue badge-related phishing campaign was reported in September. These are usually used for verification and identify users as trustworthy.

DHL phishing emails end up in the office

Transportation is one of the most lucrative industries for brand phishing after technology. With most countries heading towards the busiest retail time of the year due to the upcoming festivals, CPR will continue to monitor mail order related scams as hackers are likely to step up their efforts in this area to target (online) shoppers deceive.

The top phishing brands in Q3 2022

  • DHL (abused for 22 percent of all global brand phishing attempts)
  • Microsoft (16 percent)
  • LinkedIn (11 percent)
  • Google (6 percent)
  • Netflix (5 percent)
  • WeTransfer (5 percent)
  • Walmart (5 percent)
  • WhatsApp (4 percent)
  • Bank HSBC (4 percent)
  • Instagram (3 percent)
More at CheckPoint.com

 


About check point

Check Point Software Technologies GmbH (www.checkpoint.com/de) is a leading provider of cybersecurity solutions for public administrations and companies worldwide. The solutions protect customers from cyberattacks with an industry leading detection rate for malware, ransomware and other types of attacks. Check Point offers a multi-level security architecture that protects company information in cloud environments, networks and on mobile devices, as well as the most comprehensive and intuitive “one point of control” security management system. Check Point protects over 100.000 businesses of all sizes.


 

Matching articles on the topic

Cybersecurity platform with protection for 5G environments

Cybersecurity specialist Trend Micro unveils its platform-based approach to protecting organizations' ever-expanding attack surface, including securing ➡ Read more

Data manipulation, the underestimated danger

Every year, World Backup Day on March 31st serves as a reminder of the importance of up-to-date and easily accessible backups ➡ Read more

Printers as a security risk

Corporate printer fleets are increasingly becoming a blind spot and pose enormous problems for their efficiency and security. ➡ Read more

The AI ​​Act and its consequences for data protection

With the AI ​​Act, the first law for AI has been approved and gives manufacturers of AI applications between six months and ➡ Read more

Windows operating systems: Almost two million computers at risk

There are no longer any updates for the Windows 7 and 8 operating systems. This means open security gaps and therefore worthwhile and ➡ Read more

AI on Enterprise Storage fights ransomware in real time

NetApp is one of the first to integrate artificial intelligence (AI) and machine learning (ML) directly into primary storage to combat ransomware ➡ Read more

DSPM product suite for Zero Trust Data Security

Data Security Posture Management – ​​DSPM for short – is crucial for companies to ensure cyber resilience against the multitude ➡ Read more

Data encryption: More security on cloud platforms

Online platforms are often the target of cyberattacks, such as Trello recently. 5 tips ensure more effective data encryption in the cloud ➡ Read more