AITS Careers

Threat Actors Imitate Microsoft to Trick Remote Staff

Technology giant Microsoft has become the number one impersonated brand. The cybersecurity attackers executed upgraded phishing attacks in the third quarter of this year, imitating Microsoft software. In this article at TechRepublic, Lance Whitney reveals some eye-opening facts about hackers using Microsoft for phishing attacks.

Unfortunate Fact

According to a recent report by Check Point, Microsoft has taken the front spot from the fifth in the second quarter. About 19 percent of phishing attacks worldwide imitated the software giant to manipulate users. Email phishing is rampant in the remote work scenario. Thus, the current quarter sees a 44 percent surge in malicious activities.

The threat actors are leaving no stone unturned to seize your credentials. They would share a malicious web link in your email, faking a Microsoft login page to access your professional network. DHL scores the second spot in the list of top spoofed brands, with 9 percent of the phishing attacks impersonating it. Google is in the third position, followed by PayPal and Netflix at fourth and fifth positions.

The Game Plan

Work from home in the global lockdown is the primary reason for the growing number of phishing attacks. Follow these tips to guard your hard-earned market position from cybercriminals:

  • Beware of red flags to avert email phishing attempts. Some are incorrectly formatted, so observe if the link in the email starts with https://. Do not click on any link with only http:// and ignore threatening emails.
  • Never sharing personal information over the internet should be your thumb rule. Keep your credentials to yourself. Do not text or share it with anyone, even with the closest mate.
  • Avoid suspicious emails by deleting them. If you come across something fishy, believe it is inappropriate. Get rid of it immediately without opening or forwarding it to someone for confirmation. You can block the controversial senders.
  • Never open or download an attachment from suspicious emails. Avoid checking any attached Word, Excel, PowerPoint, or PDF file from an unknown source.

Click on the following link to read the original article: https://www.techrepublic.com/article/microsoft-now-the-most-impersonated-brand-in-phishing-attacks/

The post Threat Actors Imitate Microsoft to Trick Remote Staff appeared first on AITS CAI’s Accelerating IT Success.

Show More
0 0 votes
Article Rating

Comments are moderated, and may be edited for clarity or brevity.

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments

Related Articles

Back to top button
0
Would love your thoughts, please comment.x
()
x
X