BUSINESS

Hackers Enjoy Targeting Users With Their Cyberattacks Using Google And Microsoft: Learn More

After Google, Microsoft is the most popular platform that con artists use to launch phishing assaults. Hackers sometimes utilize these two tech titans as a hoax to gain people’s confidence and unintentionally divulge personal information. With the increase in cyberthreats, 2024 is looking to be a worrying year for consumers.

These problems are highlighted in a recent Check Point research, which also names Microsoft as the most popular scammer, showing up in almost 38% of the malicious actors’ phishing efforts. The cybersecurity company notes that attackers appear to be finding it easier to trick individuals into clicking on their fictitious websites that mimic Microsoft’s products and even sharing personal information, believing that Microsoft is requesting it.

To distinguish between authentic and fraudulent websites, it is crucial for users to closely monitor any protected websites they visit and search for errors in the URL or page content.

Returning to the research, Google is ranked second with just 11% of the assaults conducted via the use of the corporation. After that, LinkedIn comes in at number three. Apple and DHL complete the top five. Apple’s ranking of fourth on the list indicates that people are aware that the corporation doesn’t engage in these kinds of activities, despite the fact that other companies may be vulnerable to such efforts.

Microsoft is the 38th most imitated tech brand among the top 10 brands used by hackers for spear phishing.

Google accounted for 11%.

LinkedIn: Eleven percent

Apple: five percent

– DHL: five percent

Amazon: three percent

Facebook: two percent.

Roblox: Two percent

– Wells Fargo, with 2%

Airbnb: One percent

The most surprise on the list is the lack of popularity and higher ranking of Amazon and Facebook among these con artists, particularly considering how simple it would be to trick people by pretending to be well-known digital companies.

A BRAND PHISHING ATTACK: WHAT IS IT?
According to Check Point, “criminals attempt to mimic the official website of a well-known brand by using a similar domain name or URL and web-page design to the legitimate site” in these assaults. These con artists may quickly and simply construct a form that can be used to “steal users’ credentials, payment details, or other personal information” by using the fictitious website.

Related Articles

Back to top button