Get The Latest Insights

By The PhishLabs Team | June 14, 2021

In Q1, PhishLabs analyzed and mitigated hundreds of thousands of phishing attacks that targeted corporate users. In this post, we break down these attacks and shed light on the phishing emails that are making it into corporate inboxes.
Q1 Threat Types
Threats Found in Corporate Inboxes 

Credential Theft

Credential theft attacks continue to be the most prolific threats observed in corporate inboxes. In Q1, nearly two-thirds of all reported email threats attempted to steal credentials. This was an 11.6% increase from Q4 2020. 
Eighty-four percent of credential theft phishing attacks contained a link that led to a web page with a login form designed to harvest credentials. The remaining 16% delivered attachments similarly designed to lead victims to fake sites and steal sensitive information. Both tactics rely heavily on brand impersonation. 


Corporate credentials for Microsoft Office 365  continued to be targeted heavily in Q1. More than 44% of credential theft email lures targeted O365 logins. This is a 10.4% increase from Q4 2020. 


Response-based attacks such as BEC and 419 scams continued to thrive during Q1, contributing to 31% of total phishing emails that targeted corporate users. Advanced-Fee or 419 scams contributed to 60.6% of reported response-based threats. 
Breakdown of response-based threats:
  1. 419 (60.6%)
  2. BEC (19.7%)
  3. Job Scams (7.7%)
  4. Vishing (6.3%)
  5. Tech Support (5.7%)
Although BEC attacks contributed to less than a quarter of response-based attacks Q1, they continue to be a top threat to enterprises. Last year, losses attributed to BEC totaled more than $1.8 Billion.  


In Q1, 6% of reported phishing lures delivered attachments or links to malware. This suggests email security controls are far better at detecting malicious code in email traffic than they are at detecting social engineering techniques. 
ZLoader accounted for 62% of all reported email-based payload activity. This was driven by a one-day spike in attacks in February that represented one of the largest surges of a single payload we have seen in a 24-hour period.
ZLoader and other malware payloads delivered via email are often part of malware-as-a-service botnets. These botnets are used in many different ways. They can harvest credentials, steal sensitive information, and facilitate ransomware attacks. 
In summary, we continued to see high volumes of malicious emails reaching corporate user inboxes in Q1. Credential theft and response-based threats are especially effective at slipping through email security controls.  The continued growth in attacks targeting corporate credentials confirmed that enterprise accounts are in high demand. Additionally, the volume of response-based attacks indicate impersonation and social engineering continue to be effective and profitable techniques.
Additional Resources: