cofense.com Open in urlscan Pro
141.193.213.20  Public Scan

Submitted URL: https://cofense.com/real-phishing-examples-and-threats/
Effective URL: https://cofense.com/knowledge-center-hub/real-phishing-examples-and-threats/
Submission: On January 12 via api from US — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

 * Blog
 * Customer Resource Center
 * Contact Support
 * Contact Us

Menu
 * Blog
 * Customer Resource Center
 * Contact Support
 * Contact Us

 * Stop Threats
   
   End-to-End Email Security
   
   Defend your organization with a complete email security solution designed to
   identify, protect, detect & respond to threats.
   
   Security Awareness Training
   
   Condition your workforce against today’s latest threats and transform them
   into your front line of defense.
   
   Global Intelligence Network
   
   Protect your organization with our deep analysis into the current threat
   landscape and emerging trends.
   
   Cofense vs. The Competition
   
   See why the Cofense Intelligent Email Security suite stands out against the
   competition 
   
   Business Email Compromise (BEC)
   
   BEC amounts to an estimated $500 billion-plus annually that’s lost to fraud.
   Ensure your business is protected.
   
   Ransomware & Malware
   
   Phishing is the #1 attack vector for ransomware attacks. Stop phishing
   attacks in their tracks.
   
   Credential Theft
   
   Protect your user’s credentials and avoid a widespread, malicious attack.

 * Solutions
   
   Email Security for the Enterprise
   
   Complete threat protection, detection and response tailored for enterprise
   businesses.
   
   Email Security for Managed Service Providers (MSPs)
   
   Best-in-Class Phishing Protection and Simulations designed for MSPs, from the
   ground up.
   
   Managed Email Security Solutions
   
   Protect your organization from attacks with managed services from the Cofense
   Phishing Defense Center™.
   
   Detect and Stop Attacks
   
   Automatically identify and quarantine email threats across your organization
   in minutes.
   
   Analyze & Remediate Reported Threats
   
   Accelerate threat detection and response, empowering fast resolution.
   
   Actionable Insight into Emerging Threats
   
   Protect your organization with our deep analysis into the current threat
   landscape and emerging trends.
   
   Easily Report Suspected Threats
   
   Report suspicious threats with just one click.
   
   Empower Your Team
   
   Train employees through an with award-winning Learning Management System.
   
   Security Awareness Training
   
   Condition your workforce against today’s latest threats and transform them
   into your front line of defense.

 * Clients
   
   Industries We Serve
   
   Businesses from all industries rely on Cofense to safeguard their teams.
   
   What Our Customers Say
   
   Global organizations trust Cofense to protect their most critical assets.

 * Resources
   
   Knowledge Center Hub
   
   Check out our resource library of solution content, whitepapers, videos and
   more.
   
   Events & Webinars
   
   Come see us at a local event or join us at an upcoming webinar.
   
   Blog
   
   Stay current on cybersecurity trends, market insights and Cofense news.
   
   Check Your SEG
   
   See the real threats that are currently evading your Secure Email Gateway
   (SEG).

 * About
   
   About Cofense
   
   Cofense stops email security threats and protects your company through our
   network of 35+ Million human reporters.
   
   News Center
   
   See the latest articles, press releases and more in our news center.
   
   Awards
   
   It’s an honor to be recognized in the cybersecurity market. Check out our
   recent awards.
   
   Partners
   
   Grow your business, drive new revenue streams, and improve your competitive
   posture through our Partner Program.
   
   Careers
   
   We’re looking for passionate people to join us in our mission to stop all
   email security threats for organizations around the globe.
   
   Management Team
   
   Get to know our management team.


X

Get a Demo



PHISHING DATABASE: REAL EMAIL PHISHING ATTACK EXAMPLES & THREATS


DEFINE THE SEARCH BELOW TO SEE THE REAL THREATS THAT ARE CURRENTLY EVADING YOUR
SEG.

Home » Knowledge Center Hub » Real Phishing Examples and Threats


THE TOP SEGS IN THE WORLD MISSED ALL OF THESE ATTACKS.
COFENSE CLIENTS DON’T HAVE TO WORRY ABOUT THAT.

1,519 Threats Caught by Cofense



MISSED BY: MICROSOFT DEFENDER FOR O365

Type: Credential Phishing
Posted On: 01/10/2023
Tactic: Link
Theme: Document
Phishing Example Description: Document-themed emails found in environments
protected by Proofpoint and Microsoft ATP deliver Credential Phishing via an
embedded link.


MISSED BY: PROOFPOINT

Type: Credential Phishing
Posted On: 01/10/2023
Tactic: Link
Theme: Document
Phishing Example Description: Document-themed emails found in environments
protected by Proofpoint and Microsoft ATP deliver Credential Phishing via an
embedded link.


MISSED BY: MICROSOFT DEFENDER FOR O365

Type: Credential Phishing
Posted On: 01/09/2023
Tactic: HTML Attachment
Theme: Notification
Phishing Example Description: Notification-themed emails found in environments
protected by Microsoft ATP deliver Credential Phishing embedded in an attached
HTML file.


MISSED BY: SYMANTEC MESSAGELABS

Type: Credential Phishing
Posted On: 01/06/2023
Tactic: Link
Theme: Notification
Phishing Example Description: Notification-themed emails found in environments
protected by Proofpoint, Microsoft ATP, and Symantec MessageLabs deliver
Credential Phishing via an embedded link.


MISSED BY: MICROSOFT DEFENDER FOR O365

Type: Credential Phishing
Posted On: 01/06/2023
Tactic: Link
Theme: Notification
Phishing Example Description: Notification-themed emails found in environments
protected by Proofpoint, Microsoft ATP, and Symantec MessageLabs deliver
Credential Phishing via an embedded link.


MISSED BY: PROOFPOINT

Type: Credential Phishing
Posted On: 01/06/2023
Tactic: Link
Theme: Notification
Phishing Example Description: Notification-themed emails found in environments
protected by Proofpoint, Microsoft ATP, and Symantec MessageLabs deliver
Credential Phishing via an embedded link.
« Page1 Page2 Page3 … Page254 »

FREQUENTLY ASKED QUESTIONS

What is a Phishing Attack & Why Are They So Dangerous?

A phishing attack is when a fraudster sends an email to trick the recipient. The
idea is to persuade the target into giving up sensitive information, for
instance, your corporate network credentials, or perhaps to authorize some type
of financial transaction. The vast majority of data breaches against businesses
today begin as phishing attacks.

Just a couple of famous phishing examples:

The infamous Target breach back in 2013 started with a phishing email that gave
attackers a foothold in Target’s business systems for further attacks.
Phishing appeared prominently in the Mueller Report on the 2016 presidential
election hacking.

Some quick phishing statistics:

Over 55% organizations experienced a successful phish last year.
$12 billion is the 5-year global cost of just one type of phishing attack,
business email compromise (BEC).
The average phishing attack costs a mid-sized business $3.86 million.

Types of Phishing Attacks

Our database has thousands of phishing examples, but most fit into one of these
3 categories:

Phishing Emails with Malicious Links: Sometimes a phishing attack is simply an
email with an embedded link. When you click, you either unknowingly activate
malware or are directed to a webpage that looks perfectly legitimate but is
designed to harvest your information.

Phishing Attacks with Malicious Attachments: Phishing attackers often send
emails with attachments containing malware. When you click, look out. Many times
phishing attackers use popular document types such as Microsoft Word or Excel or
even Adobe PDFs. They take advantage of the trust people place in popular
business tools.

Business Email Compromise (BEC): BEC emails, also known as CEO Fraud, typically
don’t use malware but simply try to manipulate the target into sending money.
Traditionally, BEC phishing attacks try to get employees in the finance
department to authorize wire transfers, for instance, to a “vendor” or
“partner.” This kind of attack often uses ‘CEO fraud phishing’ where attackers
pretend to be the CEO or CFO to spur quick action.

What Are Phishing Attack Examples Good For?

Phishing attack examples of real phish provide highly useful intelligence that
helps security teams better pinpoint attacker methods and tactics. They help
protect businesses from malware-bearing phish. Because attacker campaigns change
quickly, real-world phishing examples are a central component of comprehensive
security. Phishing attack examples reveal the latest threat actor maneuvers as
they are being launched.

All third-party trademarks referenced by Cofense whether in logo form, name form
or product form, or otherwise, remain the property of their respective holders,
and use of these trademarks in no way indicates any relationship between Cofense
and the holders of the trademarks.

1602 Village Market Blvd, SE #400
Leesburg, VA 20175

(888) 304-9422

Facebook-f Twitter Linkedin Youtube


COMPANY

 * What We Do
 * How We Do It
 * About
 * Contact Us
 * Legal
 * Privacy Policy


RESOURCES

 * Knowledge Center Hub
 * Events & Webinars
 * Blog
 * Check Your SEG
 *  
 *  

Get a Demo
©2023 Cofense. All rights reserved.

This site is registered on wpml.org as a development site.

We use our own and third-party cookies to enhance your experience by showing you
relevant content, personalizing our communications with you, and remembering
your preferences when you visit our website. We also use them to improve the
overall performance of our site. You can learn more about the cookies and
similar technology we use by viewing our privacy policy. By clicking ‘Accept,’
you acknowledge and consent to our use of all cookies on our website.

Accept