CONTACT US
info@bidaiondo.com

Phishing emails are the source of 90% of attacks on companies

Email is one of the main technological innovations that has revolutionized the way we understand the world, as well as reconfigured the business model. Since its invention in 1965, the evolution of this means of communication has been transgressive, and according to data from Statista, there were already more than 4.26 billion users using email in 2022 and the number of emails sent on that same date amounted to 330,000 million, with a growth forecast of 17.8% until 2026. However, the high use of this technology has also made it one of the most vulnerable: according to Tecnopedia, more than 3,400 million emails occur. daily phishing attacks, with these attacks being responsible for 90% of data breaches.

On the occasion of National Email Day, Check Point® Software Technologies Ltd., a leading provider of AI-based cloud cybersecurity solutions, wanted to review the evolution of email, to see how it was born and developed until it became one of the main media outlets today, and in turn, the main point of attack for cybercriminals. According to Check Point Software sources, currently, more than 90% of attacks on companies originate from malicious emails. In the last thirty days, 62% of malicious files have been distributed through email, and it has been shown that one in 379 emails contains this type of files, with the PDF format being the most common, with a percentage of 59, 3% frequency.

Check Point Software also reveals how phishing is prevalent in different regions: in Europe, an organization is being attacked an average of 871 times per week in the last 6 months, while 89% of malicious files were sent via email. In Africa, the data is even more alarming: an organization is attacked an average of 2,042 times per week, while 77% of malicious files are sent by email.
The evolution since the first email

Email was invented in 1965 by a group of researchers at the Massacahusetts Institute of Technology (MIT). It was the first electronic messaging system for internal use, although at that time it differed greatly from what is known today. In 1971, Ray Tomlinson invented the email system with an infrastructure similar to today's: it was a personal digital mailbox in which you could receive messages.

Email began to be used as a method of doing business in 1978, when the first email marketing campaign began. The person responsible for this task was Gary Thuerk. However, email was restricted to business use until the late 1980s. Microsoft Mail was the first program released for users, which in turn added the option to add attachments in 1992. From that moment on, Other electronic mailbox options began to emerge: Microsoft Outlook in 1993, Hotmail in 1996, Yahoo Mail and Gmail.

Email has been one of the most recurrent malware distribution formulas, with attacks as significant as Creeper or Happy99, causing corporate disasters such as WannaCry (3.8 billion euros) or MyDoom (34 billion euros).
Phishing attacks are one of the most used formulas for the distribution of malware and ransomware.

These types of cyber threats began in 1996, when the term was first used by America Online (AOL). Cybercriminals created random credit card numbers and opened new accounts on AOL, posing as employees of the service itself to steal users' credentials. Later, in the 2000s, the concept of 'Spray and Pray' emerged, a phishing campaign in which a well-known brand was impersonated to scam potential customers and steal their credentials.

This threat has evolved over time using sophisticated techniques such as identity theft and putting Artificial Intelligence and DeepFake technology at your service. Spoofing is a technique where the use of AI is essential: the attacker spoofs the email address to impersonate another person or company with the main objective of tricking the recipient into believing that the email comes from a legitimate source. Ransomware attacks very often use these types of methods to encrypt the victim's files or lock the entire system until the ransom is paid. According to Check Point Software, 10% of companies globally have experienced ransomware attacks, which is a 33% increase compared to the previous year.

The scope of phishing attacks is unlimited and mainly affects largees corporations: according to Check Point Research (Brand Phishing Report Q1 2024) on phishing attacks, Microsoft was the most attacked (38% of phishing attacks worldwide), followed by Google and LinkedIn. This type of threat can lead to large-scale data leaks, as recently happened with the well-known “Mother of Breaches” case that occurred this January 2024, with a leak of more than 26 billion records containing user data. from LinkedIn, Twitter, Tencent and other platforms.


https://cybersecuritynews.es/los-correos-electronicos-de-phishing-son-el-origen-del-90-de-los-ataques-a-las-empresas/

Last news

base_url:
host: www.bidaiondo.com
REQUEST_URI: /articles/phishing-emails-are-the-source-of-90-of-attacks-on-companies
path: /news/meta-reactivates-facial-recognition-on-facebook-claims-to-fight-scams-using-celebrities
Meta reactiva el reconocimiento facial en Facebook: afirma que luchan contra las estafas que usan celebrities
Con la introducción de esta herramienta, Meta quiere abordar las preocupaciones de los reguladores sobre el creciente número de fraudes y minimizar las quejas sobre el manejo de datos de los usuarios. Facebook dejó de usar su...
base_url:
host: www.bidaiondo.com
REQUEST_URI: /articles/phishing-emails-are-the-source-of-90-of-attacks-on-companies
path: /noticias/google-elimina-mas-de-200-apps-maliciosas-con-millones-de-descargas-comprueba-si-las-tienes-en-tu-movil
Google elimina más de 200 apps maliciosas con millones de descargas: comprueba si las tienes en tu móvil
Las aplicaciones tenían el malware Joker, un virus informático que suscribe a las víctimas en servicios de facturación premium. Gran parte de los usuarios españoles tienen un teléfono móvil con el s...

online trading systems.

We show you the best way to market products and services online, through a professional service of installation, management and maintenance of your virtual store

We program to suit you

We help you achieve operational excellence in all your business processes, whether they are production, logistics, service or office processes. In addition, we assure you to maintain continuous improvement in your management.

Bidaiondo Articles

Advertising takes over digital marketing

Data mining and campaign customization drive an activity that is constantly evolving and with a wide range of learning opportunities Digital marketing has become an omnipresent career in Spain in recent years. In both public and private institutions, you can find a huge educational offer of degrees, master's degrees, diplomas and other specialized programs. This is because it is an increasingly sought-after profession in companies. According...

Ver más »

La revolución de las redes sociales y el influencer marketing en el marketing de la salud

En un entorno marcado por tasas de natalidad en declive, un aumento en la esperanza de vida y costos de atención médica en ascenso, la industria de la salud enfrenta desafíos sin precedentes. A medida que las preferencias de los consumidores evolucionan rápidamente, las marcas de salud y bienestar deben adoptar estrategias innovadoras para mantenerse a la vanguardia. El uso de las redes sociales para buscar informac...

Ver más »