Skip to main content
Phishing

Phishing Reached All-Time High: Social Engineering News

By June 29, 2022No Comments

Phishing reached an all-time high in the first quarter of 2022. To clarify what this means, in the first quarter of 2022 there were more than one million attacks. Without a doubt this is the worst quarter for phishing the Anti-Phishing Working Group (APWG) have ever observed. Here are a few significant trends they report on:

  • 7% Increase in credential theft phishing against enterprise users.
  • The Financial Services industry saw a 35% increase in attacks.
  • 6.6% Increase in phishing attacks against cryptocurrency targets.

Check Point Technologies reported on another equally important statistic that the business social network LinkedIn was related to over 52% of all phishing schemes globally in the first quarter of 2022.

Phishing Defined

At Social-Engineer, we define phishing as the “practice of sending emails appearing to be from reputable sources with the goal of influencing or gaining personal information.”

Credential Theft Phishing Example

Malicious Voicemail-Notification-Themed Emails Attempt to Steal Office365 and Outlook Credentials.
In this recent campaign, threat actors are targeting users in US-based organizations such as software security, US military, security solution providers, healthcare/pharmaceutical, and the manufacturing supply chain. Researchers at Zscaler’s ThreatLabz, say that the attack begins with an email telling the targeted user they have a voicemail waiting for them contained in an attachment. If the user falls for the lure and opens the attachment it will direct them to a credential phishing site posing as a legitimate Microsoft sign-in page. Once the target is on the phony sign-in page they receive instructions to login, and complete the download of the voicemail recording. If the target does so, they will in fact be handing over their username and password to criminals.
hishing Reaches All Time High
Image: Zscaler’s ThreatLabz

To make the phishing email even more convincing, the bad actor crafts the “from” field to include the name of the target company. For instance, when an employee at Zscaler ThreatLabz was targeted the page URL used the format: zscaler.zscaler.briccorp[.]com/. Zscaler’s ThreatLabz reports on a few key findings of this phishing campaign:

  • Voicemail phishing campaigns continue to be a successful social engineering technique used by threat actors to lure targets into opening attachments.
  • The goal of the threat actor is to steal Office365 and Outlook credentials. Both of which are widely used by enterprises.
  • Each URL is crafted specifically for the targeted individual and organization.

How would your employees respond if they became a target in a credential theft campaign? Would they recognize the phishing email? Would they report it? Equally important, can your company afford the potential damage resulting from user credentials in the hands of criminals?

Test, Educate, and Protect

As shown above, phishing is an attack vector that criminals are exploiting with devastating results. In view of this, we invite you to explore  Social-Engineer’s Managed Phishing Service.  This is a fully managed program that measures and tracks how employees respond to email phishing attacks. Our Managed Phishing Service provides the following features:

  • Levelized emails.
  • Custom templates.
  • Tailored training based on failures.
  • Comprehensive reporting.
  • Phish notification feature.

Our patented process to construct messaging on varying levels of sophistication identifies at-risk user groups.  Employees also demonstrate their ability to recognize and report fraudulent emails.  Act now to protect your company from the  accelerating risk of phishing emails. Please contact us without delay to schedule a consultation.

Security Assessment Case Study
Learn more about the importance of a Social Engineering Risk Assessment.
Security Assessment Case Study
Learn more about the importance of a Social Engineering Risk Assessment.
What Makes Us Different
At Social-Engineer, we pride ourselves on what we do and how we do it. We are a security services provider, focusing on four primary attack vectors. This case study will go through how we can protect your company and what makes us different.
What Makes Us Different
At Social-Engineer, we pride ourselves on what we do and how we do it. We are a security services provider, focusing on four primary attack vectors. This case study will go through how we can protect your company and what makes us different.
Woman vs Machine
Technology is providing new, more innovative ways to enhance our world. Scientists are constantly developing smarter, faster and more intelligent machines, systems and robots. There is no doubt that each of these has evolved beyond their clockwork origins.
Woman vs Machine
Technology is providing new, more innovative ways to enhance our world. Scientists are constantly developing smarter, faster and more intelligent machines, systems and robots. There is no doubt that each of these has evolved beyond their clockwork origins.
Vishing and Phishing Must Be Ongoing to Be Effective
Most companies have a security awareness program in one form or another. If they don’t, it should be on the short list of programs to start as soon as possible. In our experience, many of these programs take the form of computer-based training.
Vishing and Phishing Must Be Ongoing to Be Effective
Most companies have a security awareness program in one form or another. If they don’t, it should be on the short list of programs to start as soon as possible. In our experience, many of these programs take the form of computer-based training.
A Case Study in Vishing
Vishing (voice-based phishing) has been a problem for quite a long time. There are many vendors in the marketplace that offer vishing services. However they tend to use robo-callers or call centers for large volume engagements. If they are using trained humans to make calls, it is likely in very low numbers.
A Case Study in Vishing
Vishing (voice-based phishing) has been a problem for quite a long time. There are many vendors in the marketplace that offer vishing services. However they tend to use robo-callers or call centers for large volume engagements. If they are using trained humans to make calls, it is likely in very low numbers.
Benefits of a Social-Engineering Risk Assessment Engagement
Your company is important. Indeed, the data you hold for your clients or employees is very valuable and attackers seek to capitalize on that data any way they can. This is where a Social Engineering Risk Assessment (SERA) engagement can help uncover possible vulnerability to attackers.
Benefits of a Social-Engineering Risk Assessment Engagement
Your company is important. Indeed, the data you hold for your clients or employees is very valuable and attackers seek to capitalize on that data any way they can. This is where a Social Engineering Risk Assessment (SERA) engagement can help uncover possible vulnerability to attackers.
The Business Value of the Social-Engineer Phishing Service
Cybercriminals are targeting the human element of organizations. Additionally, they are developing techniques to use an organization’s employees as the first point of entry. According to the 2021 Verizon DBIR report, of the 3,841 security breaches reported using social engineering, phishing was the key vector for over 80% of them.
The Business Value of the Social-Engineer Phishing Service
Cybercriminals are targeting the human element of organizations. Additionally, they are developing techniques to use an organization’s employees as the first point of entry. According to the 2021 Verizon DBIR report, of the 3,841 security breaches reported using social engineering, phishing was the key vector for over 80% of them.