• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

Yahoo Overtakes DHL As Most Impersonated Brand in Q4 2022

You are here: Home / General Cyber Security News / Yahoo Overtakes DHL As Most Impersonated Brand in Q4 2022
January 25, 2023

Security researchers at Verify Level have revealed that Yahoo knocked DHL off the top spot as the most imitated manufacturer in the final quarter of 2022, now dependable for 20% of all phishing tries recorded in the wild.

The findings appear from the company’s newest Manufacturer Phishing Report and propose that numerous cyber-criminals had been observed distributing e-mail with issue strains that explained to a receiver they experienced received prize dollars from initiatives arranged by Yahoo, really worth hundreds of hundreds of bucks. Email senders confirmed names these as ‘Award Promotion’ or ‘Award Heart.’ 

The phishing messages also warned that the goal need to refrain from telling individuals about profitable the prize since of legal issues. It questioned the receiver to share their particular details and lender specifics in order to receive the successful prize funds into their accounts.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


As for other brand names most impersonated in Q4 2022, DHL arrived in 2nd spot with 16% of all manufacturer phishing attempts, and Microsoft followed in the 3rd spot with 11%.

Industry-smart, Check out Place stated the technology sector was the most imitated by model phishing in the very last quarter of 2022, followed by transport and social networks.

“We are viewing hackers seeking to bait their targets by giving awards and substantial amounts of funds. Bear in mind, if it appears to be much too excellent to be correct, it pretty much often is,” warned Omer Dembinsky, info group supervisor at Check Position Program.

“You can guard on your own from a brand phishing attack by not clicking on suspicious backlinks or attachments and by constantly examining the URL of the website page you are directed to. Look for misspellings and do not volunteer unneeded details.”

The Check Level report arrives a few of months after Egress security researchers discovered a 78% boost in email impersonation attacks spoofing the Netflix model in October 2022.


Some pieces of this report are sourced from:
www.infosecurity-magazine.com

Previous Post: «over 4,500 wordpress sites hacked to redirect visitors to sketchy Over 4,500 WordPress Sites Hacked to Redirect Visitors to Sketchy Ad Pages
Next Post: North Korean Group TA444 Shows ‘Startup’ Culture, Tries Numerous Infection Methods Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • New 5G Modems Flaws Affect iOS Devices and Android Models from Major Brands
  • N. Korean Kimsuky Targeting South Korean Research Institutes with Backdoor Attacks
  • Ransomware-as-a-Service: The Growing Threat You Can’t Ignore
  • Mac Users Beware: New Trojan-Proxy Malware Spreading via Pirated Software
  • WordPress Releases Update 6.4.2 to Address Critical Remote Attack Vulnerability
  • Founder of Bitzlato Cryptocurrency Exchange Pleads Guilty in Money-Laundering Scheme
  • Microsoft Warns of COLDRIVER’s Evolving Evading and Credential-Stealing Tactics
  • New Bluetooth Flaw Let Hackers Take Over Android, Linux, macOS, and iOS Devices
  • Hacking the Human Mind: Exploiting Vulnerabilities in the ‘First Line of Cyber Defense’
  • Building a Robust Threat Intelligence with Wazuh

Copyright © TheCyberSecurity.News, All Rights Reserved.