F-Secure Labs Shares the Top Companies Spoofed in Spam in 2017Social engineering is simple these days, and spam has re-surged as an attack vector.
Social engineering is simple these days, and spam has re-surged as an attack vector.
Helsinki, Finland – June 21, 2017: With the decline of exploit kits, spam email has re-emerged as a popular attack vector for spreading malware, frauds and scams. And one trick spammers use to fool recipients is posing as a legitimate company. F-Secure Labs is sharing a list of the top companies email spammers have been spoofing in the first half of 2017.
Populated by giants like Apple, Amazon and Microsoft, the list underscores that the bigger the organization, the more attractive it is to use its brand name as bait in spam.
“There are so many people that have relationships with these companies, it makes these the most successful ones to imitate in spam,” says Sean Sullivan, Security Advisor at F-Secure.
If not big tech giants, popular-to-spoof companies fall into certain industries such as online dating (Match.com) and financial (PayPal). Delivery services like USPS and FedEx are high on the list, using package delivery as bait. In Germany, Giropay and Ebay are popular spoofed brands, and in the Nordics, Nordea Bank and Ikea.
“When it comes to spam, social engineering is simpler than in the past,” says Sullivan. “E-commerce is now so common it only takes a simple ‘Your order cannot be delivered,’ nothing else is needed. The amount of spam pushed practically guarantees that numerous recipients will actually be waiting for a delivery. And that serendipity is what short-circuits any amount of awareness training.”
Email spoofs may push ransomware as an attachment, or other types of malware such as banking trojans or keyloggers. They may purport to sell legitimate products but actually be aiming to gather up credit card details or other personal information. They may be phishing emails engineered to steal account credentials.
Exploit kits, which lurk on compromised or malicious websites to exploit vulnerabilities found in visitors’ browsers and systems, used to dominate as a vector for malware infections. They have seen declining use as software vulnerabilities get patched more promptly, and as zero day vulnerabilities are rarer than ever. Malicious email volumes have increased as criminals adjust to the market forces.
Sullivan says we don’t see spam slowing down as an attack vector, so he offers these tips to IT admins to prevent infections via spam:
- Do your users really need to be able to receive zip files? With cloud services, users can link to large documents securely. Consider blocking zip files at the gateway or using a group policy to make it an unsafe file type.
- Disassociate jscript from something that will actually execute something on the user’s machine.
- Disable macro scripts from Office files received via email.
Top Companies Spoofed in Spam, H1 2017:
- Bank of America
Don’t be fooled: these companies are the most-spoofed in spam
Nobody knows cyber security like F-Secure. For three decades, F-Secure has driven innovations in cyber security, defending tens of thousands of companies and millions of people. With unsurpassed experience in endpoint protection as well as detection and response, F-Secure shields enterprises and consumers against everything from advanced cyber attacks and data breaches to widespread ransomware infections. F-Secure’s sophisticated technology combines the power of machine learning with the human expertise of its world-renowned security labs for a singular approach called Live Security. F-Secure’s security experts have participated in more European cyber crime scene investigations than any other company in the market, and its products are sold all over the world by over 200 broadband and mobile operators and thousands of resellers.
Founded in 1988, F-Secure is listed on the NASDAQ OMX Helsinki Ltd.
F-Secure media relations
+358 45 209 3595
Latest Press Releases
Certifications validate F-Secure’s unique security engineering expertise in developing mission critical ICS components
F-Secure’s report highlights that threat actors are advanced and persistent, but companies are using outdated systems and technology to save money. Poor security posture, prioritization, and awareness are also gifts to attackers.
F-Secure delivers a safe and secure network environment with customized F-Secure SAFE to So-net subscribers
Protecting up to 7 devices per account, allowing parents to protect children’s devices.