Microsoft, Amazon Top BECs Favorite Brands

  /     /     /  
Publicated : 23/11/2024   Category : security


Microsoft, Amazon Top BECs Favorite Brands


When attackers want to impersonate a brand via email, the majority turn to Microsoft and Amazon because of their ubiquity in enterprise environments.



Nearly two-thirds of email attacks spoofing brand names impersonate Microsoft or Amazon, according to one of two studies released today on advanced emailed threats.
More than half (54%) of attacks impersonate brands in their display names (the from field), according to Agaris Q4 2018 Email Fraud & Identity Deception Report. Hackers used Microsoft in 35.8% of attacks, varying their emails to mimic various units of Microsoft, such as OneDrive. Amazon came in second at 26.8%; attackers impersonated divisions including Amazon Web Services (AWS) and Amazon Prime.
Display name deception was the most common attack vector, Agari researchers found, but common trends were different for high-value targets, such as C-suite execs. For these targets, Microsoft was used in 71% of attacks; Dropbox was a distant second at 7%.
Impersonation attacks often arrive disguised as service updates, password resets, and security alerts. Its what employees expect to see, given businesses reliance on Microsoft. Dropbox is common for malware distribution because people frequently use it to receive files.
The brands that are being used are ones youd expect to get emails from on a regular basis and that people trust, says Seth Knox, vice president of marketing at Agari, adding that Office 365 is a common target. There are a lot of people migrating to Office 365, and that gives you access to a lot of material if you get into someones corporate account.  
Cloud infrastructure is similarly vulnerable if an attacker successfully deceives someone who handles the companys AWS account. That could be very damaging to a business, he notes.
Overall, 62% of advanced email attacks use display name deception,
researchers
learned. While 54% impersonate trusted brands, 8% mimic individuals. Indeed, business email compromise (BEC) is an increasingly common, dangerous, and expensive threat to the enterprise. Earlier this summer, the FBI
reported
BEC and email account compromise losses hit a global $12 billion.
Supporting the rise of email fraud is Proofpoints Q3 2018
Quarterly Threat Report
, which found targeted organizations received an average of more than 36 attacks in the third quarter – marking a 77% increase year over year. Attackers are shifting their tactics as the learn what works and what doesnt in terms of who to target and how to best deceive them.
In a targeted attack, they can see what works and what doesnt and adjust accordingly, says Chris Dawson, threat intelligence lead at Proofpoint, pointing to a prime example from the companys most recent research: Attackers are using fewer spoofed identities.
Fewer Impersonations, More Victims
Unlike malware campaigns, which are typically designed to send thousands of messages at once, email fraud gives attackers a chance to craft specific messages to be successful. Trial and error has taught them if they want to be effective, they need to limit their impersonations.
From Q2 to Q3, Proofpoint saw a 68% reduction in the number of identities that were spoofed. In Q3, BEC attackers impersonated an average of five users, a number previously seen in 2017. However, BEC attacks increased overall in the same quarter, a sign of threat actors trying to use a smaller number of fake identities to deceive a larger pool of victims.
Previously, Dawson says, attackers would try to spoof a range of people: CEOs, CFOs, CISOs, higher-ranking HR employees, and people in the supply chain. Now theyre limiting attacks to more recognizable people, including CEOs and CFOs, and theyre sending fraudulent messages to the people who have a close working relationship with those executives and will expect emails.
They know the people who are going to be, on a regular basis, getting those emails from a CEO or CISO, asking for something to happen, he explains. What they found is with the broader spread of spoofed identities, its hard to do that effectively and not get caught.
Dawson points out that researchers found an increase in the number of attacks originating from addresses spoofed within the company. Nearly 50% will pretend to be from a colleague.
When they write malicious emails, researchers found attackers are conveying a greater sense of urgency. Their requests now come with timelines and warn recipients of consequences for delays. Further, they saw payroll-related scams increase 549% - a small percentage of the total but a reminder that
subject lines
dont necessarily need to be related to specific events.
The Step You Should Take
Both Knox and Dawson advise businesses to protect all variations of their domains that could potentially be used to trick employees. If theyre registered, attackers cant use them.
Id recommend companies proactively register all of those potential look-alike domains, Dawson says. Companies are less likely to do that than the bad guys are.
Knox recommends implementing Domain-based Message Authentication, Reporting and Conformance (DMARC), an open email authentication standard that prevents domain names from being spoofed in phishing or spam emails. In an analysis of more than 280 million domains in Q3 2018, Agari saw DMARC adoption increase from 3.5 million domains in July to 5.3 million in October.
Related Content:
8 Threats That Could Sink Your Company
2018 State of Cyber Workforce
9 Traits of A Strong Infosec Resume
Destructive Cyberattacks Spiked in Q3
 
Black Hat Europe returns to London Dec 3-6 2018  with hands-on technical Trainings, cutting-edge Briefings, Arsenal open-source tool demonstrations, top-tier security solutions and service providers in the Business Hall. Click for information on the
conference
 and
to register.

Last News

▸ DHS-funded SWAMP scans code for bugs. ◂
Discovered: 23/12/2024
Category: security

▸ Debunking Machine Learning in Security. ◂
Discovered: 23/12/2024
Category: security

▸ Researchers create BlackForest to gather, link threat data. ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Microsoft, Amazon Top BECs Favorite Brands