Share this article on:
Barracuda has released key findings about the ways spear-phishing attacks are evolving with their new report, titled Spear Phishing: Top Threats and Trends Vol. 7 which revealed the latest insights on social engineering tactics and the growing complexity of these attacks targeting businesses.
The new report shows that small businesses are three times more likely to be targeted than larger organisations and examined current trends in spear-phishing, the new tricks attackers are using to sneak past victims’ defences, and the number of accounts that are being compromised successfully. It also examined the best practices and technology that organisations should be using to defend against these types of attacks.
Between January 2021 and December 2021, Barracuda researchers analysed millions of emails across thousands of businesses. Here are some of the key takeaways from their analysis:
Account takeover is one of the fastest growing threats
In 2021, roughly one in five organisations (20 per cent) had at least one of their Microsoft 365 accounts compromised. This means that in 2021, hackers managed to compromise around 500,000 Microsoft 365 accounts around the globe. Without the right level of protection, account takeover can go undetected and cause real damage to the organisation, its business partners and its customers.
WeTransfer provides online file transfer services, allowing users to share files of large sizes that they may not be sent directly through email. The brand was used in 17 per cent of phishing attacks. The company is well aware of their brand being used in these types of attacks, and they warn their users to be vigilant. Organisations should include WeTransfer scams as part of their security awareness training. Other brands that made it into the top 10 included DocSign, Google, DHL, USPS, and LinkedIn. Compromising any of these accounts will provide hackers with a wealth of personal information that they can exploit in further attacks.
Hackers target high-value accounts for takeover
Accounts of CEOs and CFOs are almost twice as likely to be taken over compared to average employees. Once they have access, cyber criminals use these high-value accounts to gather intelligence or launch attacks within an organisation. Executive assistants are also popular targets as they often have access to executive accounts and calendars and usually can send messages out on behalf of executive teams.
Barracuda researchers also found that one in three fraudulent logins into compromised accounts came from Nigeria. Once they’re inside an account, hackers create forwarding rules or scripts to hide and delete any email that they send from the compromised inbox. Suspicious inbox rules are often one of the signs of an account takeover. A full 36 per cent of organisations that had an account compromised had hackers set up malicious inbox rules to hide their activity. In fact, hackers on average created two rules for each compromised account. The research of almost 12,000 compromised accounts showed that they were used to send over three million malicious messages and spam in 2021.
According to Don MacLennan, SVP, engineering and product management, email protection at Barracuda, small businesses often have fewer resources and lack security expertise, which leaves them more vulnerable to spear-phishing attacks, and cyber criminals are taking advantage.
“That's why it’s important for businesses of all sizes not to overlook investing in security, both technology and user education.
“The damage caused by a breach, or a compromised account can be even more costly,” MacLennan said.
Best practices to protect against spear-phishing attacks
Organisations today face increasing threats from targeted phishing attacks. To protect businesses and users, enterprises need to invest in technology to block attacks, and in training to help people act as a last line of defence.
Key solutions include:
[Related: Cyber criminals on Darknet use crypto funds raised for Ukraine for fraud]