Skip to main content

Escalating global cyber threats require robust layered security measures

Web Hosting & Remote IT Support

Routinely, research exposes the rapidly changing landscape of email-based threats, and the innovative tactics as malicious actors relentlessly shift tactics, probing for vulnerabilities of humans and software with cunning, innovative attacks.

The latest analysis of over 1.8 billion emails in Q1 of this year reveals that the US is the top source of spam emails, followed by the U.K., Ireland, and Japan. This is a change from the corresponding period in 2023 when aside from the US, Germany and Turkey were the dominant sources of spam emails. Furthermore, it appears that the countries sourcing the spam are also the same as their targets. The US, UK, and Canada are the top three countries most subjected to email-based attacks. The reasons could be socioeconomic factors or merely that cybercriminals are changing tack as vigilant enterprises keep pace with their territory-centric tricks.

Quishing, scams, and email phishing

Whilst as yet, we are not seeing a large volume, there is a growing trend of QR code phishing or Quishing. The convenience that QR codes offer users is the very reason criminals are exploiting this technology, using QR codes as easy bait.

Scams are growing in popularity among cybercriminals, overtaking phishing emails. The criminals know which buttons to press. Phishing emails masquerading as communications from Human Resources, falsely claiming to relate to employee benefits, compensation, or insurance within a company are steadily increasing. Often, these emails contain malicious attachments in .html or .pdf formats, featuring phishing QR codes that redirect recipients to phishing sites upon scanning. Employees fall prey as generative AI technologies enable cybercriminals to craft error-free, convincing phishing emails in practically any language of their choosing.

Also, criminals are using common phrases that are perfectly legitimate services to trick – “2FA authentication is outdated”, “your email is quarantined”, “your password has expired”, “update your subscription details”, and “here’s your statement of account review” – are being widely used to deceive.

In email phishing campaigns, criminals are increasingly using malicious links in emails, followed by attachments, and QR codes to fraud end users. Attackers are employing links in phishing emails for URL redirection, a technique that opens a different web page when the desired web page is clicked. It’s effectively a bait-and-switch technique. They deploy this tactic because the legitimate URL avoids detection by most email security tools and users, while at the back end, the malicious link carries out unscrupulous activity.

Malicious attachments are an emerging tactic that are gaining favour with bad actors to perform phishing attacks. There is a marked shift towards the use of .ics calendar invite and .rtf attachment file formats to mislead recipients into opening malicious content. Users and enterprises will do well to stay vigilant to .eml attachments too. Savvy threat actors are sending malicious payloads via .eml files because they get overlooked when attached to phishing emails, as the emails come out clean.

Brand spoofing

It’s perhaps no surprise that Microsoft is the most spoofed brand. With four out of five Fortune 500 companies using Microsoft Office 365, it is a surefire win for scammers, which is why attacks are increasing daily.

Brands such as DocuSign, eFax, and PayPal are also proving successful for threat actors. e-signatures have more or less become the default mechanism for validating important documents, especially legal ones. By targeting digital faxes and PayPal, they possibly are catching the less cybersecurity-savvy crowd.

Proliferating malspam

Malicious spam links are proliferating at an alarming rate. Threat actors are increasingly using malspam, conceivably encouraged by the success of password-oriented phishing emails that use links. Many are opting for malicious links in malspam emails instead of attachments. Malware is increasingly being hidden in cloud storage platforms such as Google Drive too.

And following the international dismantling of the Qakbot malware – no rest for the wicked! – Pikabot has emerged as the top malware family, with most of its attacks focused on users in the UK and Norway.

Against this email threat landscape, what must enterprises do?

In the face of this intensifying barrage of email-based cyber threats, enterprises can no longer rely on outdated or isolated security measures. A multi-layered approach to security is needed – from secure email and endpoint protection through to threat intelligence and continuous user awareness and security training initiatives.

Today, Microsoft is the default technological environment for enterprises. Microsoft Office has entrenched itself as the industry standard across the corporate world. This ubiquity has made Microsoft an easy target for criminals. Bolstering email security is an imperative. Of course, Microsoft offers standard security, but the platform has some inherent limitations making layering on advanced email threat protection vital.

Link Isolation is one such technique that is critical to protect against unknown zero-day threats. It renders malicious URLs in emails and their associated web pages harmless. To check for malicious attachments, sandboxing capability is a necessity. This technique isolates the suspicious file in a ‘sandbox’ – i.e., a virtual machine in the cloud – allowing the security team to investigate the potential threat, understand the attack pattern, and gain deep insight into the incident, to pre-empt a security breach. This kind of live, real-time monitoring and intelligence is essential in today’s environment where criminals are relentlessly in pursuit of exploiting human and software flaws.

These techniques ensure a true zero-trust approach to email security by ensuring that every link is scanned dynamically and quickly to help keep the enterprise safe.

Finally, a layered approach to security requires the adoption of best-in-class third-party services. No single solution or platform can comprehensively provide all the security capabilities. Microsoft is a good example. The company offers everything from productivity suites and operating systems to cloud platforms and developer tools. Of course, there is security embedded in these solutions, but Microsoft is not a specialist security provider, and definitely not a specialist email security provider even though Outlook is today the default tool for managing email messages, calendars, contacts, and more.

We list the best email hosting services.

This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro



via Hosting & Support

Comments

Popular posts from this blog

Microsoft, Google, and Meta have borrowed EV tech for the next big thing in data centers: 1MW watercooled racks

Web Hosting & Remote IT Support Liquid cooling isn't optional anymore, it's the only way to survive AI's thermal onslaught The jump to 400VDC borrows heavily from electric vehicle supply chains and design logic Google’s TPU supercomputers now run at gigawatt scale with 99.999% uptime As demand for artificial intelligence workloads intensifies, the physical infrastructure of data centers is undergoing rapid and radical transformation. The likes of Google, Microsoft, and Meta are now drawing on technologies initially developed for electric vehicles (EVs), particularly 400VDC systems, to address the dual challenges of high-density power delivery and thermal management. The emerging vision is of data center racks capable of delivering up to 1 megawatt of power, paired with liquid cooling systems engineered to manage the resulting heat. Borrowing EV technology for data center evolution The shift to 400VDC power distribution marks a decisive break from legacy sy...

The Apple Watch ban is lifted, on appeal – but the reprieve might only be temporary

Web Hosting & Remote IT Support The Apple Watch ban story has developed quickly over the last week and a bit, and there's now a new twist: the US Court of Appeals is putting a pause on the US sales and import ban while it reviews the case, which means the Apple Watch 9 and Apple Watch Ultra 2 can go back on sale for the time being. "We are thrilled to return the full Apple Watch lineup to customers in time for the new year," an Apple spokesperson told TechRadar. "We are pleased the US Court of Appeals for the Federal Circuit has stayed the exclusion order while it considers our request to stay the order pending our full appeal." The watches in question are now once again available from "select" Apple Stores, and will also be going on sale from the Apple website from 12pm PT / 3pm ET on Thursday, December 28 (that's 8pm in the UK, and early on December 29 in Australia). All Apple Stores should have stock by the weekend. As for how long t...

The Samsung Galaxy Ring could go into production as soon as next month

Web Hosting & Remote IT Support With the dust beginning to settle from the huge Samsung Unpacked 2023 event, we can turn our attention towards what Samsung might have planned next: and a smart ring seems to be in the company's near future. As per a report from South Korean outlet The Elec (via SamMobile ), mass production on a Samsung Galaxy Ring could begin as early as August, with a decision imminent on the schedule for getting the wearable manufactured and out to consumers. A full launch is slated for some point during 2024 though, rather than 2023. The nature of the device means that it'll need to clear several regulatory hurdles before it can go on sale and start tracking various vital statistics. An early 2024 launch would put the Galaxy Ring on a similar schedule to the Samsung Galaxy S24 – and it would therefore make sense to launch both gadgets at the same time, perhaps in January or February if Samsung follows its 2023 routine. The story so far Rumors ar...