Check Point Research issues Q3 Brand Phishing Report, highlighting the leading brands that hackers imitated in attempts to lure people into giving up personal data
Check Point Research (CPR), the Threat Intelligence arm of Check Point Software has published its Brand Phishing Report for Q3 2022. The report highlights the brands which were most frequently imitated by criminals in their attempts to steal individuals’ personal information or payment credentials during July, August and September.
While LinkedIn was the most imitated brand in both Q1 and Q2 2022, it’s shipping company DHL that took the top spot in Q3, accounting for twenty-two percent of all phishing attempts worldwide. Microsoft is in second place (16%) and LinkedIn has fallen into third, making up just 11% of scams, compared to 52% in Q1 and 45% in Q2. DHL’s increase could be due in part to a major global scam and phishing attack that the logistics giant warned about itself just days before the quarter started. Instagram has also appeared in the top ten list for the first time this quarter, following a ‘blue-badge’ related phishing campaign that was reported in September.
Shipping is one of the top industry sectors for brand phishing, second only to technology. As we head into the busiest retail period of the year, CPR will continue to monitor shipping related scams as threat actors will likely increase their efforts to take advantage of online shoppers.
“Phishing is the most common type of social engineering, which is a general term describing attempts to manipulate or trick users. It is an increasingly common threat vector used in most security incidents,” commented Omer Dembinsky, Data Research Group Manager at Check Point. “In Q3, we saw a dramatic reduction in the number of phishing attempts related to LinkedIn, which reminds us that cybercriminals will often switch their tactics to increase their chances of success. It is still the third most commonly impersonated brand though, so we’d urge all users to stay mindful of any emails or communications purporting to be from LinkedIn. Now that DHL is the brand most likely to be imitated, it’s crucial that anyone expecting a delivery goes straight to the official website to check progress and/or notifications. Do not trust any emails, particularly those asking for information to be shared.”
In a brand phishing attack, criminals try to imitate the official website of a well-known brand by using a similar domain name or URL and web-page design to the genuine site. The link to the fake website can be sent to targeted individuals by email or text message, a user can be redirected during web browsing, or it may be triggered from a fraudulent mobile application. The fake website often contains a form intended to steal users’ credentials, payment details or other personal information.
Top phishing brands in Q3 2022
Below are the top brands ranked by their overall appearance in brand phishing attempts:
1. DHL (related to 22% of all phishing attacks globally)
2. Microsoft (16%)
3. LinkedIn (11%)
4. Google (6%)
5. Netflix (5%)
6. WeTransfer (5%)
7. Walmart (5%)
8. WhatsApp (4%)
9. HSBC (4%)
10. Instagram (3%)
DHL Phishing Email – Account Theft Example
As part of campaigns using DHL’s branding that appeared during Q3 2022, we observed a malicious phishing email that was sent from a webmail address “info@lincssourcing[.]com” and spoofed to appear as if it was sent from “DHL Express”. The email contained the subject- “Undelivered DHL(Parcel/Shipment)”, and the content (see Figure 1) tries to persuade the victim to click on a malicious link claiming that there is a delivery intended for them that can be sent just after updating the delivery address. This link leads to a malicious website- “https://bafybeig4warxkemgy6mdzooxeeuglstk6idtz5dinm7yayeazximd3azai[.]ipfs[.]w3s[.]link/dshby[.]html/” (see Figure 2) that requires the victim’s username and password to be entered.
OneDrive Phishing Email – Account Theft Example
In this phishing email, we see an attempt to steal a user’s Microsoft account information. The email (see Figure 1) which was sent from the webmail address “firstname.lastname@example.org” underthe fake sender name – “OneDrive”, contained the subject “ A document titled ‘Proposal’ has been shared with you on Onedrive”. The attacker tries to lure the victim to click on the malicious link claiming that an important document titled “Proposal” shared with them on their OneDrive. This malicious link – “ https://mail-supp-365[.]herokuapp[.]com/” redirects the user to a fraudulent Microsoft web app login page (see Figure 2), there the user needs to enter their account password.