www.cyren.com
Open in
urlscan Pro
84.39.152.48
Public Scan
Submitted URL: http://mkt.cyren.com/n/OTQ0LVBHTy0wNzYAAAF_PFnopgkBlc7GKiC5FCt8WOZtJvX4VTe5g1wLiPTBVG4e6f1ji_g60HS2yUnTUrys_Htuwa4=
Effective URL: https://www.cyren.com/blog/articles/phishing-by-the-numbers-july-2021?utm_campaign=ongoing_blog&utm_medium=email&utm_s...
Submission: On September 01 via api from SG
Effective URL: https://www.cyren.com/blog/articles/phishing-by-the-numbers-july-2021?utm_campaign=ongoing_blog&utm_medium=email&utm_s...
Submission: On September 01 via api from SG
Form analysis
2 forms found in the DOMGET /search.html
<form action="/search.html" method="get" class="container">
<input type="search" name="keywords" placeholder="Enter search" class="text search-input" value="">
<button type="submit" class="search-submit">
<img src="/tl_files/cyren_v3_preview/images/top-nav-search-icon-white.png" alt="Search Icon">
</button>
</form>
POST https://feedburner.google.com/fb/a/mailverify
<form action="https://feedburner.google.com/fb/a/mailverify" method="post" target="popupwindow"
onsubmit="window.open('https://feedburner.google.com/fb/a/mailverify?uri=CyrenSecurityBlog', 'popupwindow', 'scrollbars=yes,width=550,height=520');$('#subscribe-blog-modal').modal('toggle');return true">
<div class="row">
<div class="form-group col-md-12">
<label class="control-label" for="LastName">Please enter your email address</label>
<input class="form-control" type="text" name="email" required="">
<input type="hidden" value="CyrenSecurityBlog" name="uri">
<input type="hidden" name="loc" value="en_US">
</div>
<div class="col-md-12">
<p class="submit-container" style="text-align: center;"><button class="btn btn-cyren-red submit" type="submit" tabindex="8">Subscribe</button></p>
</div>
</div>
</form>
Text Content
Phishing by the numbers – July 2021 Go back * Skip navigation * < Products and Solutions PRODUCTS For the Enterprise * Threat InDepth Threat Intelligence * Inbox Security for Office 365 * F-Prot Anti-Virus -------------------------------------------------------------------------------- For Service Providers and Tech Companies (OEM) * Threat InDepth Threat Intelligence * Cyren Email Security Engine * Cyren Web Security Engine * Cyren Malware Detection Engine * Cyren Threat Lookup SOLUTIONS Phishing and Spam Protection * Threat InDepth Threat Intelligence * Inbox Security for Office 365 * Cyren Email Security Engine -------------------------------------------------------------------------------- Advanced Malware Detection * Threat InDepth Threat Intelligence * Cyren Malware Detection Engine * Cyren Threat Lookup -------------------------------------------------------------------------------- Web Traffic Protection * Cyren Web Security Engine * Threat InDepth Threat Intelligence * < Research * Cyren Security Center * Cyren Security Blog -------------------------------------------------------------------------------- More on threats * Glossary of cyber threats * Phishing * Malware * Ransomware * Botnets * < Expert Content * Webinars & Events * On-Demand Webinars * Brochures and datasheets * Reports and white papers * Videos * Show all resources * < Company About Cyren More than 1.3 billion users around the world rely on Cyren's 100% cloud internet security solutions to protect them against cyber attacks and data loss every day. Learn more * Contact Us * Careers Press and Investors * In the News * Press Releases * Investor Relations * Security Alliance -------------------------------------------------------------------------------- Leadership * Management * Board of Directors * * Login * Cyren Inbox Security Login * Cyren Cloud Security Login * MyEleven Login * Partners * Partner Portal * Partner Lookup Tool * Support * Contact * Blog * EN * Select your language: * English * Deutsch * Get A Demo CYREN SECURITY BLOG PHISHING BY THE NUMBERS – JULY 2021 by Mike Fleck August 24, 2021 Security Research & Analysis The Cyren Incident and Response research team continuously collects phishing data and identifies the most effective phishing attacks using Cyren Inbox Security (CIS), the company’s flagship Inbox Detection and Response* solution. CIS directly connects to Office 365, continuously detecting and automatically capturing phishing attacks that evade secure email gateways and arrive in a user’s inbox. This data provides insights about the scale and nature of evasive and targeted phishing threats, and why phishing continues to be a problem for many organizations despite investments in email security best practices and security awareness training. In July, the Incident and Response team identified nearly 20,000 confirmed email threats, which contained malicious content, and defied detection by third-party email security engines and the native security capabilities of Office 365. Key takeaways include: * Phishing continues to be the predominant email threat arriving in users’ mailboxes. Ransomware and business email compromise attacks are costly, but the data clearly illustrated that they are symptoms of previous successful phishing attacks. * 93% contained phishing URLs * 4% were business email compromise (BEC) or impostor emails * 3% of messages included a malware attachment Figure 1 Types of email threats beyond the SEG * Specialized detection and automated incident response are critical to eliminating threats before risky users do something they shouldn’t. * 97% of confirmed malicious incidents were detected before users read the messages. * 94% of evasive threats were detected by Cyren’s specialized engines and threat intelligence rather than helpdesk or SOC analysts. * Threat intelligence is important but real-time analysis is critical for detecting evasive and zero-day email threats. * 88% of evasive threats were detected with real-time techniques like machine learning. * 6% were netted with proprietary threat intelligence or readily matched patterns of previous attacks (heuristics). * The remaining 6% were suspicious messages that required human analysis to confirm the detection * User education matters but organizations must put it to good use, especially since most employees think phishing is IT’s problem to solve. Providing the users with a tool for ad-hoc scans of emails before submitting them to the helpdesk/SOC greatly reduces the volume of phishing alerts. * 6% of total of confirmed phishing threats were triaged by end users rather than bogging down helpdesk or SOC personnel with basic or initial analysis. * Of the messages submitted to the IDR platform, less than 2% were false positives. Phishing Attack of Note From July 16-17, Cyren’s Incident and Response analysts noticed an attack that affected 192 users across 16 of our customers but with a few hallmarks of a highly targeted effort. This shows that some attackers have refined their tactics so they can automate attacks that used to require a high amount of manual effort. * The sender’s name was spoofed and varied based on the target company. This is a typical trick used to associate the sender with an entity the users are likely to trust. * The email subject related to an incoming voicemail. Again, this is typical. Phishing email subjects tend to mention voice messages, shipments, invoices, password resets, etc. – anything that creates some urgency but is also in keeping with our digital, mid-pandemic lives. * There was no body text, just an attachment containing javascript. Criminals are increasingly putting phishing URLs or javascript in files to avoid the time of click protection offered by the SEG. * The attachment contained code that would open an Office 365 phishing page that displayed the target company’s logo and pre-completed the login form with the user’s email address. The fact that attackers were able to customize the look of the phishing page for each company is not something we see every day, at least not for an attack targeting so many companies at once. Figure 2 Targeted Office 365 phishing attack. The logo images and other identifying information have been redacted. This attack is a good example of the ability of bad actors to execute targeted attacks at scale through automation and abusing services and technologies designed to accelerate and secure digital transformation. Like many phishing attacks, this one targeted Office 365 credentials. Valid credentials would have allowed the attackers to access a variety of Office 365 services to launch devastating or email account compromise attacks and steal volumes of sensitive data. *Inbox Detection and Response is a new category of anti-phishing solution designed to continuously detect and automatically respond to phishing, business email compromise, email account compromise, and other targeted email threats. Gartner’s name for IDR is Cloud Email Security Supplement (CESS) and Forrester calls it Cloud-native API-enabled Email Security (CAPES). Go back Share: Subscribe to this Blog Read Another Article THANK YOU! Thank you for your request – a Cyren representative will be contacting you to discuss how Cyren can benefit your business. Subscribe to Cyren Security Blog Please enter your email address Subscribe Your privacy is important to us. We will never share your information. * Cyren Inbox Security * Expert Content * Company * Get a Demo Terms of Use // Privacy Policy // Cookie Policy © Cyren 2021. All trade/service marks or names referenced on this site belong to their respective owners. The information contained herein is subject to change without notice. * * * PRIVACY PREFERENCE CENTER YOUR PRIVACY YOUR PRIVACY When you visit any website, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences or your device and is mostly used to make the site work as you expect it to. The information does not usually directly identify you, but it can give you a more personalized web experience. Because we respect your right to privacy, you can choose not to allow some types of cookies. Click on the different category headings to find out more and change our default settings. However, blocking some types of cookies may impact your experience of the site and the services we are able to offer. More information about our cookies * STRICTLY NECESSARY COOKIES STRICTLY NECESSARY COOKIES Always Active Strictly Necessary Cookies These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work. These cookies do not store any personally identifiable information. Cookies Details * PERFORMANCE COOKIES PERFORMANCE COOKIES Performance Cookies These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. All information these cookies collect is aggregated and therefore anonymous. If you do not allow these cookies we will not know when you have visited our site, and will not be able to monitor its performance. Cookies Details * TARGETING COOKIES TARGETING COOKIES Targeting Cookies These cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising. Cookies Details Back Button ADVERTISING COOKIES Filter Button Consent Leg.Interest Select All Vendors Select All Vendors Select All Hosts Select All * REPLACE-WITH-DYANMIC-HOST-ID 33ACROSS 33ACROSS View Third Party Cookies * Name cookie name * REPLACE-WITH-DYANMIC-VENDOR-ID 33ACROSS 3 Purposes View Privacy Notice 33ACROSS 3 Purposes View Privacy Notice REPLACE-WITH-DYANMIC-VENDOR-ID Consent Purposes Location Based Ads Consent Allowed Legitimate Interest Purposes Personalize Require Opt-Out Special Purposes Location Based Ads Features Location Based Ads Special Features Location Based Ads Clear Filters Information storage and access Apply Confirm My Choices Allow All ON CYREN.COM WE USE COOKIES TO IMPROVE YOUR USER EXPERIENCE. By clicking “Accept All Cookies”, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts. Cookie Policy Accept All Cookies Cookies Settings