{"id":44547,"date":"2020-11-25T17:06:23","date_gmt":"2020-11-25T11:36:23","guid":{"rendered":"https:\/\/www.technologyforyou.org\/?p=44547"},"modified":"2020-11-25T17:06:23","modified_gmt":"2020-11-25T11:36:23","slug":"microsoft-google-impersonation-attacks-are-on-the-rise-how-to-stay-safe","status":"publish","type":"post","link":"https:\/\/www.technologyforyou.org\/microsoft-google-impersonation-attacks-are-on-the-rise-how-to-stay-safe\/","title":{"rendered":"Microsoft &#038; Google Impersonation Attacks Are on the Rise \u2013 How to Stay Safe"},"content":{"rendered":"<p><strong><span style=\"font-family: 'trebuchet ms', geneva, sans-serif; font-size: 12pt;\">By Danielle Guetta, Product Marketing Manager, CheckPoint | <a href=\"https:\/\/blog.checkpoint.com\/2020\/11\/23\/microsoft-google-impersonation-attacks-are-on-the-rise-how-to-stay-safe\/\" target=\"_blank\" rel=\"noopener noreferrer\">Source<\/a><\/span><\/strong><\/p>\n<p><strong><span style=\"font-family: 'trebuchet ms', geneva, sans-serif; font-size: 14pt; color: #003366;\">Do you feel that your inbox is burdened with an increasing number of phisy-looking emails, now more than ever before? Well, that\u2019s because it actually is.<\/span><\/strong><\/p>\n<p><span style=\"font-family: 'trebuchet ms', geneva, sans-serif; font-size: 12pt;\">According to\u00a0<a href=\"https:\/\/www.checkpoint.com\/press\/2020\/microsoft-is-most-imitated-brand-for-phishing-attempts-in-q3-2020\/\">Check Point Research Q3 Phishing Report<\/a>, email-based phishing attacks saw the highest increase in number, compared to any other platform in Q2. The most common of these emails are impersonation emails asking users to reset or submit their Microsoft account credentials, in order to gain control over their accounts.<\/span><\/p>\n<p><span style=\"font-family: 'trebuchet ms', geneva, sans-serif; font-size: 12pt;\">In Q3 of 2020, email was the most used platform for impersonation attacks,\u00a0accounting for a staggering 44% of the attacks total, with Microsoft being the most imitated brand for impersonation phishing attempts (19% of total), followed by Google (9% of total).<\/span><\/p>\n<p><span style=\"font-family: 'trebuchet ms', geneva, sans-serif; font-size: 12pt;\">So what does it mean for email security, especially in the new normal?<\/span><\/p>\n<div id=\"attachment_26062\" class=\"wp-caption aligncenter\"><span style=\"font-family: 'trebuchet ms', geneva, sans-serif; font-size: 12pt;\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-26062 size-full\" src=\"https:\/\/blog.checkpoint.com\/wp-content\/uploads\/2020\/10\/BR-1.png\" alt=\"\" width=\"396\" height=\"267\" aria-describedby=\"caption-attachment-26062\" \/>Figure 1: Account verification phishing email from \u201cMicrosoft Accounts Team\u201d<\/span><\/div>\n<h2><strong><span style=\"font-family: 'trebuchet ms', geneva, sans-serif; font-size: 14pt;\">Working from home is distracting, and cyber criminals know it<\/span><\/strong><\/h2>\n<p><span style=\"font-family: 'trebuchet ms', geneva, sans-serif; font-size: 12pt;\">I believe most can relate to the next scenario: you are in the middle of a business call with your teammates on Zoom or Teams. Your kids are at home, and while you try to maintain your focus on your work call, your toddler is throwing his lunch on the carpet, while your dog has appointed itself the house\u2019s vacuum cleaner.<\/span><\/p>\n<p><span style=\"font-family: 'trebuchet ms', geneva, sans-serif; font-size: 12pt;\">In the middle of it all, you get an email from Microsoft saying that your account was blocked, and you have to verify your details ASAP. Sure, you might have been more cautious if you were at the office, undistracted by your kids, dogs, or spouse. However, in the midst of the chaos that is working from home, you clicked on that link and verified your account with your username and password, just so you can keep working. And just like that, you unknowingly fell victim to a phishing attack that harvested your account\u2019s credentials.<\/span><\/p>\n<p><span style=\"font-family: 'trebuchet ms', geneva, sans-serif; font-size: 12pt;\">The increase in phishing emails in Q3 of 2020 is one of the most prominent trends of the Work-From-Home era. Cybercriminals are well aware of the distractions people are dealing with while trying to work and be productive from home. Combined with the enormous amount of emails employees receive every day, the recipe for a successful email phishing campaign is complete.<\/span><\/p>\n<p><span style=\"font-family: 'trebuchet ms', geneva, sans-serif; font-size: 12pt;\">What\u2019s worse is that an email phishing attack is often the first step in a multi-staged attack that puts your entire organization at risk. When cybercriminals obtain one employee\u2019s account credentials, they have access to corporate data, and can use the hijacked account to send further phishing emails to other employees in the organization, pretending to be the hijacked account\u2019s owner. These attacks can results in huge costs, loss of sensitive data and even compliance fines, in case of a customer data breach.<\/span><\/p>\n<p><span style=\"font-family: 'trebuchet ms', geneva, sans-serif; font-size: 12pt;\">To learn more about these types of attacks, we invite you to watch the following video where Maya Horwitz, Director of threat research and intelligence, takes you through one of the most interesting stories we uncovered \u2013 the Florentine Banker Group<\/span><\/p>\n<h2><span style=\"color: #003366;\"><strong><span style=\"font-family: 'trebuchet ms', geneva, sans-serif; font-size: 14pt;\">Email security is crucial now more than ever<\/span><\/strong><\/span><\/h2>\n<p><span style=\"font-family: 'trebuchet ms', geneva, sans-serif; font-size: 12pt;\">Check Point Research\u2019s Report findings are yet another testament to the fact organizations can\u2019t afford to compromise on email security, now more than ever. The new normal presents a reality that is not going to change in the near future, which means remote work is here to stay. Employees working from home, distracted by their daily life, can\u2019t be relied on to stop the next email phishing attack, and that is why a pre-emptive\u00a0<a href=\"https:\/\/www.checkpoint.com\/solutions\/email-security\/\">email security<\/a>\u00a0solution must be deployed.<\/span><\/p>\n<p><span style=\"font-family: 'trebuchet ms', geneva, sans-serif; font-size: 12pt;\">To make matters worse, in the new normal, phishing and malware threats do not stop at mailboxes. The productivity applications employees use daily from Microsoft 365 or Google Workspace are a direct extension of their mailboxes, and used to send sensitive files and complete important tasks involving corporate data all the time. For that, organizations must consider a solution that provides complete protection from all attacks for both email and productivity suite applications such as Teams, OneDrive, Google Drive and others.<\/span><\/p>\n<p><span style=\"font-size: 14pt;\"><strong>Video |\u00a0 Part #7: What Can a Malicious Email Do?<\/strong><\/span><\/p>\n<p><iframe loading=\"lazy\" title=\"Part #7: What Can a Malicious Email Do?\" width=\"696\" height=\"392\" src=\"https:\/\/www.youtube.com\/embed\/f2PAs_I267Y?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe><\/p>\n","protected":false},"excerpt":{"rendered":"<p>By Danielle Guetta, Product Marketing Manager, CheckPoint | Source Do you feel that your inbox is burdened with an increasing number of phisy-looking emails, now more than ever before? Well, that\u2019s because it actually is. According to\u00a0Check Point Research Q3 Phishing Report, email-based phishing attacks saw the highest increase in number, compared to any other [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":19802,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[17,16],"tags":[19802],"class_list":{"0":"post-44547","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-pics-and-videos","8":"category-tech-knowledge","9":"tag-microsoft-google-impersonation-attacks-are-on-the-rise"},"_links":{"self":[{"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/posts\/44547","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/comments?post=44547"}],"version-history":[{"count":0,"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/posts\/44547\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/media\/19802"}],"wp:attachment":[{"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/media?parent=44547"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/categories?post=44547"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/tags?post=44547"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}