Microsoft Tops List as Most Imitated Brand in Phishing Scams

SeniorTechInfo
2 Min Read

The Most Impersonated Brands in Phishing Attacks: Microsoft Tops the List

When it comes to phishing attacks, Microsoft has taken the lead as the most impersonated brand in the third quarter of 2024, according to a recent study by CheckPoint.

The latest edition of Check Point Research’s Brand Phishing Ranking revealed that a staggering 61% of brand phishing attempts are utilizing Microsoft branding, solidifying the tech giant’s position at the top of the list.

Apple follows closely behind, holding onto its second-place ranking with 12% of phishing attempts using the company’s branding. Google, on the other hand, climbed to third place with 7%, up from fourth place in the previous ranking.

Surprisingly, Alibaba made its debut in the top 10, securing the seventh spot with 1.1% of brand phishing attempts. Adobe also re-entered the ranking at eighth place with 0.8%, marking its first appearance since Q2 2022.

Check Point’s threat intelligence team identified some highly sophisticated brand impersonation attempts during the study. One example is alibabashopvip\[dot]com, a malicious phishing website in Vietnamese that convincingly impersonates the Alibaba e-commerce retail brand, complete with official branding and counterfeit products.

Another concerning trend involves a series of Whatsapp-related websites, such as whatsapp-io[dot]com, that mimic a Whatsapp security center. These sites prompt users to enter personal information like their phone number and country or region under the guise of resolving account issues, posing a significant threat to unsuspecting users.

In summary, the prevalence of brand phishing attacks continues to pose a significant risk to individuals and businesses alike. As cybercriminals become increasingly sophisticated in their tactics, it is crucial for users to remain vigilant and cautious when sharing sensitive information online. By staying informed and adopting best practices for online security, we can all play a role in combating cyber threats and protecting our digital identities.

Share This Article
Leave a comment

Leave a Reply

Your email address will not be published. Required fields are marked *