CONTACT US
info@bidaiondo.com

Phishing emails are the source of 90% of attacks on companies

Email is one of the main technological innovations that has revolutionized the way we understand the world, as well as reconfigured the business model. Since its invention in 1965, the evolution of this means of communication has been transgressive, and according to data from Statista, there were already more than 4.26 billion users using email in 2022 and the number of emails sent on that same date amounted to 330,000 million, with a growth forecast of 17.8% until 2026. However, the high use of this technology has also made it one of the most vulnerable: according to Tecnopedia, more than 3,400 million emails occur. daily phishing attacks, with these attacks being responsible for 90% of data breaches.

On the occasion of National Email Day, Check Point® Software Technologies Ltd., a leading provider of AI-based cloud cybersecurity solutions, wanted to review the evolution of email, to see how it was born and developed until it became one of the main media outlets today, and in turn, the main point of attack for cybercriminals. According to Check Point Software sources, currently, more than 90% of attacks on companies originate from malicious emails. In the last thirty days, 62% of malicious files have been distributed through email, and it has been shown that one in 379 emails contains this type of files, with the PDF format being the most common, with a percentage of 59, 3% frequency.

Check Point Software also reveals how phishing is prevalent in different regions: in Europe, an organization is being attacked an average of 871 times per week in the last 6 months, while 89% of malicious files were sent via email. In Africa, the data is even more alarming: an organization is attacked an average of 2,042 times per week, while 77% of malicious files are sent by email.
The evolution since the first email

Email was invented in 1965 by a group of researchers at the Massacahusetts Institute of Technology (MIT). It was the first electronic messaging system for internal use, although at that time it differed greatly from what is known today. In 1971, Ray Tomlinson invented the email system with an infrastructure similar to today's: it was a personal digital mailbox in which you could receive messages.

Email began to be used as a method of doing business in 1978, when the first email marketing campaign began. The person responsible for this task was Gary Thuerk. However, email was restricted to business use until the late 1980s. Microsoft Mail was the first program released for users, which in turn added the option to add attachments in 1992. From that moment on, Other electronic mailbox options began to emerge: Microsoft Outlook in 1993, Hotmail in 1996, Yahoo Mail and Gmail.

Email has been one of the most recurrent malware distribution formulas, with attacks as significant as Creeper or Happy99, causing corporate disasters such as WannaCry (3.8 billion euros) or MyDoom (34 billion euros).
Phishing attacks are one of the most used formulas for the distribution of malware and ransomware.

These types of cyber threats began in 1996, when the term was first used by America Online (AOL). Cybercriminals created random credit card numbers and opened new accounts on AOL, posing as employees of the service itself to steal users' credentials. Later, in the 2000s, the concept of 'Spray and Pray' emerged, a phishing campaign in which a well-known brand was impersonated to scam potential customers and steal their credentials.

This threat has evolved over time using sophisticated techniques such as identity theft and putting Artificial Intelligence and DeepFake technology at your service. Spoofing is a technique where the use of AI is essential: the attacker spoofs the email address to impersonate another person or company with the main objective of tricking the recipient into believing that the email comes from a legitimate source. Ransomware attacks very often use these types of methods to encrypt the victim's files or lock the entire system until the ransom is paid. According to Check Point Software, 10% of companies globally have experienced ransomware attacks, which is a 33% increase compared to the previous year.

The scope of phishing attacks is unlimited and mainly affects largees corporations: according to Check Point Research (Brand Phishing Report Q1 2024) on phishing attacks, Microsoft was the most attacked (38% of phishing attacks worldwide), followed by Google and LinkedIn. This type of threat can lead to large-scale data leaks, as recently happened with the well-known “Mother of Breaches” case that occurred this January 2024, with a leak of more than 26 billion records containing user data. from LinkedIn, Twitter, Tencent and other platforms.


https://cybersecuritynews.es/los-correos-electronicos-de-phishing-son-el-origen-del-90-de-los-ataques-a-las-empresas/

Last news

base_url:
host: www.bidaiondo.com
REQUEST_URI: /articles/phishing-emails-are-the-source-of-90-of-attacks-on-companies
path: /news/openai-launches-its-own-ads-manager-here-s-how-advertising-campaigns-will-work-on-chatgpt
OpenAI lanza su propio Ads Manager: así funcionarán las campañas de publicidad en ChatGPT
Si pensabas que Sam Altman se iba a conformar con que le pagaras 20€ al mes por el Plus para que ChatGPT te hiciera los resúmenes de las reuniones que no querías tener, te equivocabas. Sobre todo teniendo en cuenta que hace un tiem...
base_url:
host: www.bidaiondo.com
REQUEST_URI: /articles/phishing-emails-are-the-source-of-90-of-attacks-on-companies
path: /noticias/el-efecto-miravia-redefine-la-inversion-publicitaria-en-el-ecommerce-en-espana
El “Efecto Miravia” redefine la inversión publicitaria en el eCommerce en España
El primer trimestre de 2026 ha confirmado una tendencia: el eje de gravedad de la inversión publicitaria se ha desplazado. Ya no se trata solo de captar atención en redes sociales, sino de dominar el retail media. Este crecimiento tiene un prota...

online trading systems.

We show you the best way to market products and services online, through a professional service of installation, management and maintenance of your virtual store

We program to suit you

We help you achieve operational excellence in all your business processes, whether they are production, logistics, service or office processes. In addition, we assure you to maintain continuous improvement in your management.

Bidaiondo Articles

Google fixes the inflated impressions problem in Search Console… but won't correct the historical data..

We told you about it exactly a month ago: Google acknowledged that an unspecified issue had caused the impressions counted in Search Console to be inflated since May 2025 (yes, a year ago). At the time, Google simply stated that they were working on the problem and that once it was fixed, "you may see a decrease in impressions in the Search Console performance report." Well, that moment has arrived. In a new post, Google announced that...

Ver más »

We know you like us. Now you can show it to Google (very easily).

Come on, admit it, you like us. You like what we tell you and how we tell it, you read us regularly, and you keep up with industry news through our publications. And we sincerely appreciate it. We don't usually ask you for anything, but this time is different. Because what we're going to ask is something that will benefit us, but above all, it will be very useful for you. And it's just a click away. A few days ago, Google launched a n...

Ver más »