Check Point Research has published its Brand Phishing Report for Q3 2022, which highlights the brands which were most frequently imitated by criminals in their attempts to steal individuals’ personal information or payment credentials during July, August and September.
Most imitated brand in Q3 2022 phishing attempts
While LinkedIn was the most imitated brand in both Q1 and Q2 2022, it’s shipping company DHL that took the top spot in Q3, accounting for twenty-two percent of all phishing attempts worldwide. Microsoft is in second place (16%) and LinkedIn has fallen into third, making up just 11% of scams, compared to 52% in Q1 and 45% in Q2.
DHL’s increase could be due in part to a major global scam and phishing attack that the logistics giant warned about itself just days before the quarter started. Instagram has also appeared in the top ten list for the first time this quarter, following a ‘blue-badge’ related phishing campaign that was reported in September.
Shipping is one of the top industry sectors for brand phishing, second only to technology. As we head into the busiest retail period of the year, CPR will continue to monitor shipping related scams as threat actors will likely increase their efforts to take advantage of online shoppers.
“Phishing is the most common type of social engineering, which is a general term describing attempts to manipulate or trick users. It is an increasingly common threat vector used in most security incidents,” commented Omer Dembinsky, Data Research Group Manager at Check Point.
“In Q3, we saw a dramatic reduction in the number of phishing attempts related to LinkedIn, which reminds us that cybercriminals will often switch their tactics to increase their chances of success. It is still the third most commonly impersonated brand though, so we’d urge all users to stay mindful of any emails or communications purporting to be from LinkedIn. Now that DHL is the brand most likely to be imitated, it’s crucial that anyone expecting a delivery goes straight to the official website to check progress and/or notifications. Do not trust any emails, particularly those asking for information to be shared.”
In a brand phishing attack, criminals try to imitate the official website of a well-known brand by using a similar domain name or URL and web-page design to the genuine site. The link to the fake website can be sent to targeted individuals by email or text message, a user can be redirected during web browsing, or it may be triggered from a fraudulent mobile application. The fake website often contains a form intended to steal users’ credentials, payment details or other personal information.
DHL phishing email: Account theft example
As part of campaigns using DHL’s branding that appeared during Q3 2022, CPR observed a malicious phishing email that was sent from a webmail address “info@lincssourcing[.]com” and spoofed to appear as if it was sent from “DHL Express”. The email contained the subject- “Undelivered DHL(Parcel/Shipment)”, and the content tries to persuade the victim to click on a malicious link claiming that there is a delivery intended for them that can be sent just after updating the delivery address. The link leads to a malicious website that requires the victim’s username and password to be entered.
The malicious email which contained the subject “Undelivered DHL(Parcel/Shipment)”
Fraudulent login page
OneDrive phishing email: Account theft example
In this phishing email, we see an attempt to steal a user’s Microsoft account information. The email which was sent from the webmail address “email@example.com” under the fake sender name – “OneDrive”, contained the subject “ A document titled ‘Proposal’ has been shared with you on Onedrive”. The attacker tries to lure the victim to click on the malicious link claiming that an important document titled “Proposal” shared with them on their OneDrive. The malicious link redirects the user to a fraudulent Microsoft web app login page, there the user needs to enter their account password.
The malicious email which contained the subject
“A document titled ‘Proposal’ has been shared with you on Onedrive”
Fraudulent login page
As always, users are encouraged to be cautious when divulging personal data and credentials to business applications or websites, and to think twice before opening email attachments or links, especially emails that claim to be from companies such as DHL, Microsoft or LinkedIn, as they are the most likely to be impersonated.