Check Point Research issues its Q2 Brand Phishing Report, highlighting the brands that cyber criminals most often imitate to trick people into giving up their personal data

Our Q2 2022 Brand Phishing Report highlights the brands that were most frequently imitated by cybercriminals in their attempts to steal individuals’ personal information or payment credentials over the quarter.

In April, May, and June we observed that the social media platform LinkedIn continued its reign as the most imitated brand after entering the rankings for the first-time in Q1. While its share has dropped slightly; down from 52% in Q1 to 45% of all phishing attempts in Q2, this is still a worrying trend that highlights the ongoing risks facing users of the trusted social media platform. Our research showed that social networks generally continue to be the most imitated category, followed by technology which, this quarter, took over second place from shipping.

The most striking rise in technology household names being exploited was Microsoft, making up 13% of all brand phishing attempts, more than double the amount in the previous quarter and edging DHL into third place with 12%. Some new brands entering the top 10 were: Adidas, Adobe and HSBC although all on low single digits, these brands will be followed closely by researchers in Q3 for any developments.

The increase in the use of Microsoft related scams is a danger to both individuals and organizations. Once someone has hold of your account login details, they have access to all the applications behind it, such as Teams and SharePoint, as well as the obvious risk of compromise to your Outlook email account. The report highlights a specific example of an Outlook phishing email luring users to a fraudulent Outlook web page with the subject line: “[Action Required] Final Reminder – Verify your OWA Account now”, asking the victim to enter their login credentials.

LinkedIn based phishing campaigns imitated the style of communication of the professional social media platform with malicious emails using subjects like: “You appeared in 8 searches this week” or “You have one new message” or “I’d like to do business with you via LinkedIn.” Although appearing to come from LinkedIn they used an email address that was completely different to that of the brand.

Meanwhile, with the relentless trend to online shopping, it is not surprising that our research also saw shipping company DHL being faked in 12% of all phishing attacks. The report specifically references a tracking related phishing scam, with the subject line “Incoming Shipment Notification”, enticing the consumer to click on a malicious link.

A brand phishing attack not only takes advantage of our implicit trust in a familiar brand, adopting its brand imagery often using a similar URL, it also plays on human emotions, like the fear of missing out on a discount. The sense of urgency this creates leads consumers to click in haste without first checking if the email is from the brand in question. This could lead to them inadvertently

downloading malware or handing over precious personally identifiable information which can give criminals access to their entire online world and potential financial loss.

Top phishing brands in Q2 2022

Below are the top brands ranked by their overall appearance in brand phishing attempts:

  1. LinkedIn (45%)
  2. Microsoft (13%)
  3. DHL (12%)
  4. Amazon (9%)
  5. Apple (3%)
  6. Adidas (2%)
  7. Google (1%)
  8. Netflix (1%)
  9. Adobe (1%)
  10. HSBC (1%)

LinkedIn Phishing Email- Account Theft Example

During the Q2 of 2022, we observed a malicious phishing email that used LinkedIn’s branding. The phishing email was sent from a webmail address and spoofed to appear as if it was sent from “LinkedIn Security (mlayanac@armada.mil[.]ec)”. The email contained the subject “LinkedIn Notice!!!”, and the content (see Figure 1) tries to entice the victim to click on a malicious link under the guise of updating their LinkedIn account version. This click will lead to the link “https://lin882[.]webnode[.]page/”, where the victim is then required to enter their LinkedIn account information (see Figure 2).

 

Figure 1: The malicious email which was sent with the subject “LinkedIn Notice!!!”

Figure 2: fraudulent page to verification LinkedIn account information.

DHL Phishing Email – Account Theft Example

During the second quarter of 2022, we observed a malicious phishing email that used DHL’s branding. The phishing email was sent from a webmail address and spoofed to appear as if it was sent from “DHL EXPRESS (track@harbormfreight[.]com)”. The email contained the subject line “Incoming Shipment Notification”, and the content (see Figure 1) tries to persuade the victim to click on a malicious link that leads them to “https:// delicate-sea-3417.on.fleek.co”. The victim is then required to enter their username and password.

Figure 1: The malicious email which was with the subject “Incoming Shipment Notification”

Figure 2: fraudulent login page “https:// delicate-sea-3417.on.fleek.co”

Outlook Phishing Email – Account Theft Example

In this phishing email, we see an attempt to steal a user’s Outlook account information. The email (see Figure 1) which was sent from the email address “Outlook OWA (mike@vokertech.com)”, contained the subject line “[Action Required] Final Reminder – Verify your OWA Account now”. The attacker was trying to lure the victim to click on a malicious link, which redirects the user to a fraudulent Outlook web app login page (see Figure 2). In the malicious link (jfbfstxegfghaccl-dot-githu-dir-aceui-xoweu[.]ue[.]r[.]appspot[.]com), the user needed to enter their username and password.

Figure 1: The malicious email which was sent with the subject “[Action Required] Final Reminder – Verify your OWA Account now”

Figure 2: fraudulent login page jfbfstxegfghaccl-dot-githu-dir-aceui-xoweu[.]ue[.]r[.]appspot[.]com

Amazon Phishing Email – Billing Information Theft Example

In this phishing email, we see an attempt to steal a user’s billing information. The email (see Figure 1) which was sent from the email address “Amazon (fcarvache@puertoesmeraldas[.]gob[.]ec)”, contained the subject line “Your amazon account verification”. The title of the email and its contents are an attempt by the attacker to entice the victim to click on a malicious link “https://main.d1eoejahlrcxb.amplifyapp[.]com”, which redirects the user to a fraudulent page asking to enter billing information  (see Figure 2).

Figure 1: The malicious email which was sent with the subject “Your amazon account verification”

Figure 2: fraudulent page to verification billing information “https://main.d1eoejahlrcxb.amplifyapp[.]com”

You may also like