Blog

Blog

The “I’s” Have It: How BEC Scammers Validate New Targets with Blank Emails

Courtesy of Agari by Fortra. Have you ever received a blank email from someone you don’t know? If you have, it may have been from a cybercriminal making sure your email account is legitimate prior to a BEC attack. We released a report on a business email compromise (BEC) cybercriminal group named London Blue in December 2018. The report dove into the organizational structure of West African...
Blog

Top 4 Threats to Retail Brands

Cyber-attacks targeting retail brands have increased dramatically over the last year. Since Q3 2021, retail has experienced a nearly 500% increase in attacks on social media alone. Counterfeit websites and look-alike domains are also among the top threats to online retailers. Attackers incorporate stolen designs and trademarks to stand up counterfeit sites, outbid legitimate businesses with...
Blog

10,000 organisations targeted by phishing attack that bypasses multi-factor authentication

Courtesy of Tripwire by Fortra. Microsoft has shared details of a widespread phishing campaign that not only attempted to steal the passwords of targeted organisations, but was also capable of circumventing multi-factor authentication (MFA) defences. The attackers used AiTM (Attacker-in-The-Middle) reverse-proxy sites to pose as Office 365 login pages which requested MFA codes, and then use them...
Blog

Interview: How Organizations Can Proactively Tackle Phishing Attacks

Courtesy of Expert Insights Billy Smith is the Managing Director at PhishLabs by Fortra. With a wealth of experience in the IT and cybersecurity industry, Smith is an expert in using curated threat intelligence to take down cyberthreats. In his role at PhishLabs, Smith enables organizations to proactively identify and remediate threats across their digital channels, including email, social media,...
Blog

Emotet Tops Payload Attack Volume in Q2

Emotet contributed to just over 47% of all attacks targeting corporate users in Q2, narrowly surpassing former leader QBot. This is the first quarter Emotet has represented the majority of payload reports since its disruption in January 2021. Together, Emotet and QBot dominated payload volume, totaling more than 90% of reported payload activity. Malicious payloads distributed via phishing emails...
Blog

What Is Email Spoofing and How Do You Protect Against It?

Courtesy of Agari by Fortra. What is Email Spoofing? Email spoofing is one of the most common forms of cybercriminal activity, specifically a form of identity deception that’s widely used in phishing and spam attacks. It underpins the mechanism required to conduct hacking activities, and it can take many forms. Unfortunately, most email users will eventually receive an email that has been...
Blog

Protecting Your Customers from Phishing Has Never Been This Easy

Cybercrime is relentless — and no business is immune. From small startups to global enterprises, organizations face an onslaught of advanced email threats and socially engineered attacks like executive and brand impersonation. According to the FBI’s Internet Crime Report, phishing and sophisticated email scams led to over $44 million in losses in 2021 alone.Despite massive investments in perimeter...
Blog

Building Cybersecurity Resilience in Financial Services

Cybersecurity for financial services is a complex, high-stakes challenge. Organizations face a maze of overlapping regulations, relentless threats, and chronic staffing shortages. Despite significant investments and heightened attention, many remain vulnerable to advanced persistent threats, fraud, sophisticated phishing campaigns, and other aggressive tactics targeting PII and sensitive...
Blog

Dark Web Disruptions in Q1 Trigger Shift in Illicit Exchanges

In Q1, the exchange of sensitive data on Carding Marketplaces and Forums increased as government seizure of multiple Dark Web sites prompted a shift in where actors conduct illegal activities, according to the Agari and PhishLabs Quarterly Threat Trends & Intelligence Report.These sites specialize in the trafficking of stolen credentials and data such as usernames, passwords, banking, and account...
Blog

Q1 Phishing Volume Consistent, Up Over Q4

In Q1, more than 51% of phishing sites abused paid services, according to the Agari and PhishLabs Quarterly Threat Trends & Intelligence Report. This is the first time in five consecutive quarters where the majority of phishing sites were staged using Paid Domain Registrations or Compromised Sites. Phishing volume as a whole continues to increase in 2022 in comparison to the same time period last...
Blog

Hybrid Vishing Attacks Soar YoY, Achieve All-Time High In March

Vishing reports in Q1 2022 increased nearly 550% over Q1 2021, according to Agari and PhishLabs’ Quarterly Threat Trends & Intelligence Report. While these Response-Based attacks have recently displayed stunning numbers, malicious emails as a whole are growing steadily, and represent the top online attack vector targeting corporate users. Malicious emails are delivered primarily in the form of...
Blog

Social Media Attacks Targeting Businesses Increase 105%

Social media attacks targeting enterprises have increased 105% from Q1 2021 to Q1 2022, according to the latest Quarterly Threat Trends & Intelligence Report. Social media threat volume has consistently climbed quarter over quarter, as threat actors increasingly use social platforms to target business via fake pages, messaging, and advertisements.Every quarter, Agari and PhishLabs analyzes...
Blog

Dramatic Increase Detected in Impersonation Attacks on Social Media

Impersonations of brands and executives on social media have grown more than 300% and 250% year-over-year, respectively, according to the Agari and PhishLabs Quarterly Threat Trends & Intelligence Report. This highlights the overall increase in social media activity and ease of accessibility for bad actors to repurpose stolen trademarks and intellectual property (IP) for a variety of malicious...
Blog

Vishing Attacks Are at an All-Time High, Report Finds

Vishing attacks have increased almost 550% over the last 12 months, according to Agari and Fortra Brand Protection's Quarterly Threat Trends & Intelligence Report.The May report uses hundreds of thousands of phishing and social media threats analyzed and mitigated. By identifying and mitigating attacks targeting enterprises, their employees, and brands, we are able to provide insight into key...
Blog

Why BitB Attacks are Concerning

PhishLabs has identified a Browser-in-the-Browser (BitB) campaign targeting financial institutions with a fake Office 365 (O365) authorization protocol. The attack is delivered via phishing email and redirects the victim to a website impersonating an O365 single sign-on (SSO) page. A BitB attack is a novel phishing technique that replicates pop-up windows used for SSO in an effort to steal login...
Blog

Qbot Payloads Dominate Q1

Qbot payloads targeting enterprises contributed to almost three quarters of all email-based malware since the beginning of 2022. Although reported malware activity among families continues to fluctuate dramatically from quarter to quarter, QBot reports in Q1 represent the highest volume of a single malware variety over the past 12 months.Phishing lures delivering payloads remain the primary...
Blog

Social Media as a Threat Channel

Social media offers an important outline for people of all ages and walks of life to connect, share life experiences and post pictures of their breakfast. But oversharing - or not being wary of impostors - can lead to serious compromises in personal and professional security. In a press release on the report's findings, Phishlabs “enterprises must broaden their line of defense [in 2022,]...
Blog

What is the Fortra Value Proposition for Cybersecurity?

In this guest blog, Dr Ed Amoroso, CEO, Tag Cyber, provides a high-level overview of the Fortra cybersecurity portfolio value proposition based on a mapping of its component solution offerings to the NIST Cybersecurity Framework (CSF) phases. Forty years ago, an engineer in Minnesota decided that computer costs for the IBM System/38 were getting too high. So, he began investigating and building...
Blog

Cybercrime Cost U.S. $6.9 Billion in 2021

Courtesy of Digital Guardian by Fortra. The FBI's annual look at phishing, scam, and personal data breach statistics is out. Like clockwork, the Federal Bureau of Investigation's annual Internet Crime Complaint Center (IC3) report (.PDF) is out, and with it, numbers that show a marked uptick in cybercrime over the past 365 days. Skimming through the report's 33 pages, it's hard not to notice the...
Blog

Understanding the What, How, and Why of DMARC

Courtesy of Agari by Fortra. You probably already know this, but it bears repeating: Email by itself is NOT secure; anyone can use someone else’s identity to send emails. In fact, email is the #1 way cyberattackers can target your customers and your email ecosystem. No brand is untouchable when it comes to attackers using or spoofing email domains to send spam, phishing attempts, malware, or...