Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

Report: Four Out Of Five Phishing Attacks Use Security Scams

Phishers scare users into clicking by sending security 'alerts,' Websense says

Email scammers are increasingly using security as their chief weapon for fooling users into clicking on infected links and attachments, according to a report issued this week.

In a blog about spear-phishingposted Tuesday, researchers from Websense posted new data about phishing trends, including the most popular methods of attack.

"After an analysis looking at the most recent quarter of this year, Websense Security Labs has determined that four of the top five subject lines of phishing attempts by volume are security messages," the blog states.

The top five phishing email subject lines are:

1. Your account has been accessed by a third party

2. (Bank Name) Internet Banking Customer Service Message

3. Security Measures

4. Verify your activity

5. Account security Notification

Spear-phishing, in which attackers target a specific user or group of users, has become the phishers' attack of choice, Websense says. About 1.62 percent of all spam messages are phishing attacks.

"While this may not seem huge, it can be placed into perspective by the fact that spam campaigns can reach more than a quarter of a million emails per hour and that the percentage of virus-related email spam was only 0.4 percent," Websense says. "Phishing attempts outnumber malicious executables in email volume."

Most phishing emails emanate from the U.S. and are sent on Fridays or Mondays, the blog says. "The bad guys have learned that they can evade email security measures by sending an email with a clean link on Friday or over the weekend – bypassing email URL scanning," Websense says. "Then, over the weekend, they compromise the URL with malicious code."

"Phishing attacks on Friday and Monday are becoming more prevalent by a factor of three to one," says Websense researcher Chris Distacio. "They catch people when their guard is down, as they're looking forward to the weekend on Friday or taking their time getting back to work on Monday."

Attackers often use phishing as a first step in more sophisticated attacks, and enterprises can expect many more spear-phishing campaigns in the future, Websense says. Deploying an inbound email sandboxing solution can help.

"The most important control for stopping spear-phishing is to deploy a solution that checks the safety of an emailed link when a user clicks on it," the blog says. "You need to have URL sandboxing technology in place that analyzes website content and browser code in real time."

User education is another essential element in phishing defense, Websense says. "The human element is incredibly important," the blog states. "Consider pen-testing your users. Show them why they need to think before they click. Also, use a combination of audio and visual education methods like videos, webinars, newsletters and in-person trainings."

"It's been shown that educated employees are not only more resilient to attacks, but they also add value by reporting suspicious emails to incident responders and effectively become a new data source feeding into SIEMs and other information security management systems," says Scott Greaux, vice president of product management and services at PhishMe, which offers phishing education and awareness services.

Have a comment on this story? Please click "Add a Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message. Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
News
FluBot Malware's Rapid Spread May Soon Hit US Phones
Kelly Sheridan, Staff Editor, Dark Reading,  4/28/2021
Slideshows
7 Modern-Day Cybersecurity Realities
Steve Zurier, Contributing Writer,  4/30/2021
Commentary
How to Secure Employees' Home Wi-Fi Networks
Bert Kashyap, CEO and Co-Founder at SecureW2,  4/28/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-24259
PUBLISHED: 2021-05-05
The “Elementor Addon Elements� WordPress Plugin before 1.11.2 has several widgets that are vulnerable to stored Cross-Site Scripting (XSS) by lower-privileged users such as contributors, all via a similar method.
CVE-2021-24260
PUBLISHED: 2021-05-05
The “Livemesh Addons for Elementor� WordPress Plugin before 6.8 has several widgets that are vulnerable to stored Cross-Site Scripting (XSS) by lower-privileged users such as contributors, all via a similar method.
CVE-2021-24261
PUBLISHED: 2021-05-05
The “HT Mega – Absolute Addons for Elementor Page Builder� WordPress Plugin before 1.5.7 has several widgets that are vulnerable to stored Cross-Site Scripting (XSS) by ...
CVE-2021-24262
PUBLISHED: 2021-05-05
The “WooLentor – WooCommerce Elementor Addons + Builder� WordPress Plugin before 1.8.6 has a widget that is vulnerable to stored Cross-Site Scripting (XSS) by lower-priv...
CVE-2021-24263
PUBLISHED: 2021-05-05
The “Elementor Addons – PowerPack Addons for Elementor� WordPress Plugin before 2.3.2 for WordPress has several widgets that are vulnerable to stored Cross-Site Scriptin...