CONTACT US
info@bidaiondo.com

Phishing emails are the source of 90% of attacks on companies

Email is one of the main technological innovations that has revolutionized the way we understand the world, as well as reconfigured the business model. Since its invention in 1965, the evolution of this means of communication has been transgressive, and according to data from Statista, there were already more than 4.26 billion users using email in 2022 and the number of emails sent on that same date amounted to 330,000 million, with a growth forecast of 17.8% until 2026. However, the high use of this technology has also made it one of the most vulnerable: according to Tecnopedia, more than 3,400 million emails occur. daily phishing attacks, with these attacks being responsible for 90% of data breaches.

On the occasion of National Email Day, Check Point® Software Technologies Ltd., a leading provider of AI-based cloud cybersecurity solutions, wanted to review the evolution of email, to see how it was born and developed until it became one of the main media outlets today, and in turn, the main point of attack for cybercriminals. According to Check Point Software sources, currently, more than 90% of attacks on companies originate from malicious emails. In the last thirty days, 62% of malicious files have been distributed through email, and it has been shown that one in 379 emails contains this type of files, with the PDF format being the most common, with a percentage of 59, 3% frequency.

Check Point Software also reveals how phishing is prevalent in different regions: in Europe, an organization is being attacked an average of 871 times per week in the last 6 months, while 89% of malicious files were sent via email. In Africa, the data is even more alarming: an organization is attacked an average of 2,042 times per week, while 77% of malicious files are sent by email.
The evolution since the first email

Email was invented in 1965 by a group of researchers at the Massacahusetts Institute of Technology (MIT). It was the first electronic messaging system for internal use, although at that time it differed greatly from what is known today. In 1971, Ray Tomlinson invented the email system with an infrastructure similar to today's: it was a personal digital mailbox in which you could receive messages.

Email began to be used as a method of doing business in 1978, when the first email marketing campaign began. The person responsible for this task was Gary Thuerk. However, email was restricted to business use until the late 1980s. Microsoft Mail was the first program released for users, which in turn added the option to add attachments in 1992. From that moment on, Other electronic mailbox options began to emerge: Microsoft Outlook in 1993, Hotmail in 1996, Yahoo Mail and Gmail.

Email has been one of the most recurrent malware distribution formulas, with attacks as significant as Creeper or Happy99, causing corporate disasters such as WannaCry (3.8 billion euros) or MyDoom (34 billion euros).
Phishing attacks are one of the most used formulas for the distribution of malware and ransomware.

These types of cyber threats began in 1996, when the term was first used by America Online (AOL). Cybercriminals created random credit card numbers and opened new accounts on AOL, posing as employees of the service itself to steal users' credentials. Later, in the 2000s, the concept of 'Spray and Pray' emerged, a phishing campaign in which a well-known brand was impersonated to scam potential customers and steal their credentials.

This threat has evolved over time using sophisticated techniques such as identity theft and putting Artificial Intelligence and DeepFake technology at your service. Spoofing is a technique where the use of AI is essential: the attacker spoofs the email address to impersonate another person or company with the main objective of tricking the recipient into believing that the email comes from a legitimate source. Ransomware attacks very often use these types of methods to encrypt the victim's files or lock the entire system until the ransom is paid. According to Check Point Software, 10% of companies globally have experienced ransomware attacks, which is a 33% increase compared to the previous year.

The scope of phishing attacks is unlimited and mainly affects largees corporations: according to Check Point Research (Brand Phishing Report Q1 2024) on phishing attacks, Microsoft was the most attacked (38% of phishing attacks worldwide), followed by Google and LinkedIn. This type of threat can lead to large-scale data leaks, as recently happened with the well-known “Mother of Breaches” case that occurred this January 2024, with a leak of more than 26 billion records containing user data. from LinkedIn, Twitter, Tencent and other platforms.


https://cybersecuritynews.es/los-correos-electronicos-de-phishing-son-el-origen-del-90-de-los-ataques-a-las-empresas/

Last news

base_url:
host: www.bidaiondo.com
REQUEST_URI: /articles/phishing-emails-are-the-source-of-90-of-attacks-on-companies
path: /news/google-proposes-changes-to-the-design-of-search-results-to-avoid-an-eu-antitrust-penalty
Google propone cambios en el diseño de los resultados de la Búsqueda para evitar una sanción antimonopolio de la UE
Google continúa en el punto de mira de la Unión Europea por su modelo de negocio monopolístico. Los próximos 7 y 8 de julio, la compañía tiene una cita en Bruselas con varios competidores y la propia Comisi&o...
base_url:
host: www.bidaiondo.com
REQUEST_URI: /articles/phishing-emails-are-the-source-of-90-of-attacks-on-companies
path: /noticias/epic-games-retira-su-demanda-antimonopolio-contra-samsung-tras-llegar-a-un-acuerdo
Epic Games retira su demanda antimonopolio contra Samsung tras llegar a un acuerdo
Epic Games, empresa desarrolladora de videojuegos como Fortnite, ha anunciado el final de su disputa judicial contra Samsung. Ambas compañías han llegado a un acuerdo, cerrando así el caso antimonopolio iniciado en septiembre de...

online trading systems.

We show you the best way to market products and services online, through a professional service of installation, management and maintenance of your virtual store

We program to suit you

We help you achieve operational excellence in all your business processes, whether they are production, logistics, service or office processes. In addition, we assure you to maintain continuous improvement in your management.

Bidaiondo Articles

How to use social commerce to sell more on social media

Social commerce is the future of online shopping. Today, shoppers can explore, interact, and purchase products directly from their favorite platforms. They no longer need to be redirected to external websites. This barrier-free shopping experience creates more opportunities for brands to connect with their customers. It's especially useful for small businesses and personal brands. Selling through social media combines the power of storytellin...

Ver más »

5 essential skills to be a marketing leader in the digital age

Digital marketing is constantly evolving, and being a marketing leader today requires a set of key skills. Trends change rapidly, and a leader must be able to adapt, innovate, and make strategic decisions to guide their team to success. Training programs such as ESIC's Master in Marketing Management (MMM) help professionals develop these essential skills, preparing them to face the challenges of the digital environment. Below, we explain the...

Ver más »