{"id":63235,"date":"2025-01-02T11:04:55","date_gmt":"2025-01-02T19:04:55","guid":{"rendered":"http:\/\/www.enxmag.com\/twii\/?p=63235"},"modified":"2025-01-02T11:04:58","modified_gmt":"2025-01-02T19:04:58","slug":"nearly-half-a-billion-emails-in-2024-were-malicious","status":"publish","type":"post","link":"https:\/\/www.enxmag.com\/twii\/the-week-in-imaging-twii\/editors-blog\/2025\/01\/nearly-half-a-billion-emails-in-2024-were-malicious\/","title":{"rendered":"Nearly Half a Billion Emails in 2024 Were Malicious"},"content":{"rendered":"\n<div class=\"wp-block-image\"><figure class=\"alignleft size-medium\"><img loading=\"lazy\" width=\"300\" height=\"263\" src=\"https:\/\/www.enxmag.com\/twii\/wp-content\/uploads\/2025\/01\/KnowBe4-Image-300x263.png\" alt=\"\" class=\"wp-image-63236\" srcset=\"https:\/\/www.enxmag.com\/twii\/wp-content\/uploads\/2025\/01\/KnowBe4-Image-300x263.png 300w, https:\/\/www.enxmag.com\/twii\/wp-content\/uploads\/2025\/01\/KnowBe4-Image.png 396w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/figure><\/div>\n\n\n\n<p>A new report from Hornetsecurity has found that 427.8 million emails received by businesses in 2024 contained malicious content.<\/p>\n\n\n\n<p>\u201cOnce again, phishing remains the most prevalent form of attack, responsible for a third of all cyber-attacks in 2024,\u201d Hornetsecurity\u2019s researchers write.<\/p>\n\n\n\n<p>\u201cThis was confirmed by the analysis of 55.6 billion emails, showing that Phishing remains a top concern consistently year over year. Malicious URLs and advanced fee scams were responsible for 22.7% and 6.4% respectively.\u201d<\/p>\n\n\n\n<p>The researchers observed fewer malicious attachments in 2024, as attackers shifted their focus to stealing credentials via social engineering.<\/p>\n\n\n\n<p>\u201cThe data shows a decrease in the use of malicious attachments, this is due to a rise in reverse-proxy credential theft attacks over the past year, which use social engineering and malicious links (not attachments) to trick users,\u201d Hornetsecurity says.<\/p>\n\n\n\n<p>\u201cThese attacks redirect users to fake login pages that capture credentials in real-time, even bypassing two-factor authentication. Malicious URLs are the second most common type of attack, making up 22.7% of all attacks. Their use surged in 2023 and continues to grow as attackers use them in credential-stealing attempts. Tools such as Evilginx allow attackers to set up fake login pages to trick users into entering their credentials, which are then captured.\u201d<\/p>\n\n\n\n<p>The researchers also found that shipping companies were the most commonly impersonated brands throughout 2024, with DHL and FedEx topping the list.<\/p>\n\n\n\n<p>\u201cShipping brands continue to be popular due to the fact that they can be easily incorporated in social engineering style attacks via phishing and smishing,\u201d the report says. \u201cBoth attack styles boast a high degree of similarity to real communications from these organizations and easily trick less trained users into giving away personal details and\/or payment information.\u201d<\/p>\n\n\n\n<p><em>New-school security awareness training can give your organization an essential layer of defense by teaching your employees to recognize social engineering attacks. <a href=\"https:\/\/www.knowbe4.com\/\">KnowBe4<\/a> empowers your workforce to make smarter security decisions every day. Over 70,000 organizations worldwide trust the KnowBe4 platform to strengthen their security culture and reduce human risk.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A new report from Hornetsecurity has found that 427.8 million emails received by businesses in 2024 contained malicious content. \u201cOnce again, phishing remains the most prevalent form of attack, responsible for a third of all cyber-attacks in 2024,\u201d Hornetsecurity\u2019s researchers write. \u201cThis was confirmed by the analysis of 55.6 billion emails, showing that Phishing remains a top concern consistently year over year. Malicious URLs and advanced fee scams were responsible for 22.7% and 6.4% respectively.\u201d The researchers observed fewer malicious attachments in 2024, as attackers shifted their focus to stealing credentials via social engineering. \u201cThe data shows a decrease in the use of malicious attachments, this is due to a rise in reverse-proxy credential theft attacks over the past year, which use social engineering and malicious links (not attachments) to trick users,\u201d Hornetsecurity says. \u201cThese attacks redirect users to fake login pages that capture credentials in real-time, even bypassing two-factor authentication. Malicious URLs are the second most common type of attack, making up 22.7% of all attacks. Their use surged in 2023 and continues to grow as attackers use them in credential-stealing attempts. Tools such as Evilginx allow attackers to set up fake login pages to trick users into entering their credentials, which are then captured.\u201d The researchers also found that shipping companies were the most commonly impersonated brands throughout 2024, with DHL and FedEx topping the list. \u201cShipping brands continue to be popular due to the fact that they can be easily incorporated in social engineering style attacks via phishing and smishing,\u201d the report says. \u201cBoth attack styles boast a high degree of similarity to real communications from these organizations and easily trick less trained users into giving away personal details and\/or payment information.\u201d New-school security awareness training can give your organization an essential layer of defense by teaching your employees to recognize social engineering attacks. KnowBe4 empowers your workforce to make smarter security decisions every day. Over 70,000 organizations worldwide trust the KnowBe4 platform to strengthen their security culture and reduce human risk.<\/p>\n","protected":false},"author":178,"featured_media":63236,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[80,1650,82,1638],"tags":[3267],"_links":{"self":[{"href":"https:\/\/www.enxmag.com\/twii\/wp-json\/wp\/v2\/posts\/63235"}],"collection":[{"href":"https:\/\/www.enxmag.com\/twii\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.enxmag.com\/twii\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.enxmag.com\/twii\/wp-json\/wp\/v2\/users\/178"}],"replies":[{"embeddable":true,"href":"https:\/\/www.enxmag.com\/twii\/wp-json\/wp\/v2\/comments?post=63235"}],"version-history":[{"count":1,"href":"https:\/\/www.enxmag.com\/twii\/wp-json\/wp\/v2\/posts\/63235\/revisions"}],"predecessor-version":[{"id":63237,"href":"https:\/\/www.enxmag.com\/twii\/wp-json\/wp\/v2\/posts\/63235\/revisions\/63237"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.enxmag.com\/twii\/wp-json\/wp\/v2\/media\/63236"}],"wp:attachment":[{"href":"https:\/\/www.enxmag.com\/twii\/wp-json\/wp\/v2\/media?parent=63235"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.enxmag.com\/twii\/wp-json\/wp\/v2\/categories?post=63235"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.enxmag.com\/twii\/wp-json\/wp\/v2\/tags?post=63235"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}