Threat Intelligence & Incident Response

Brand Phishing Report for Q1 2023: Check Point Research

Check Point Research’s latest Brand Phishing Report reveals it is all change at the top for most imitated brands with new entries from financial services and retail

Check Point Research (CPR), the Threat Intelligence arm of Check Point® Software Technologies Ltd. (NASDAQ: CHKP) and a leading provider of cyber security solutions globally, has published its Brand Phishing Report for Q1 2023. The report highlights the brands that were most frequently imitated by cybercriminals in their attempts to steal individuals’ personal information or payment credentials during January, February and March 2023.

Multinational retail giant Walmart topped the ranking last quarter, accounting for 16% of all attempts and climbing from 13th place in Q4 2022. This is due to a significant phishing campaign urging victims to click on a malicious survey link, relating to ‘the supply system collapse’. Meanwhile, DHL held onto second place, appearing in 13% of phishing events, closely followed by Microsoft with 12% during the quarter. Overall, the technology sector was the most imitated industry, followed by shipping and retail.

The latest report also highlights how threat actors are leveraging organizations in the finance sector to steal account details. Brazilian financial services company Bradesco and bank Raiffeisen made the list for the first time in 5th and 9th places, respectively. In the Bradesco phishing campaign, which accounted for 5% of phishing attacks last quarter, recipients were encouraged to click on a malicious link and enter their account details to redeem a cashback offer. Once submitted, those details would then be stolen by the attacker.

“Criminal groups orchestrate phishing campaigns to get as many people to part with their personal data as possible,” said Omer Dembinsky, Data Group Manager at Check Point Software. “In some cases, attacks are designed to obtain account information, as seen with the Bradesco and Raiffeisen campaigns. Others are deployed to steal payment details, which we witnessed with popular streaming service Netflix.”

He added: “The best defense against phishing threats, as ever, is knowledge. Employees should be given appropriate training to spot suspicious traits such as misspelled domains, typos, incorrect dates, and other details that can expose a malicious email or link.”

In a brand phishing attack, criminals try to imitate the official website of a well-known brand by using a similar domain name or URL and a web-page design that resembles the genuine site. The link to the fake website can be sent to targeted individuals by email or text message, a user can be redirected during web browsing, or it may be triggered from a fraudulent mobile application. The fake website often contains a form intended to steal users’ credentials, payment details or other personal information.

Top phishing brands in Q1 2023

Below are the top brands ranked by their overall appearance in brand phishing attempts:

  1. Walmart (relating to 16% of all phishing attacks globally)
  2. DHL (13%)
  3. Microsoft (12%)
  4. LinkedIn (6%)
  5. Bradesco (5%)
  6. FedEx (4.9%)
  7. Google (4.8%)
  8. Netflix (4%)
  9. Raiffeisen (3.6%)
  10. PayPal (3.5%)

Bradesco Phishing Email – Account Theft Example
During Q1 of 2023, a phishing email was observed that used the branding of Bradesco, a Brazilian financial services company. The email was sent from a webmail address “bradesco@cashback[.]com[.]br” that was spoofed to appear as “Banco Bradesco” and contained the subject “Redeem your cashback” in Portuguese (origin: “Efetue o resgate do seu cashback”), with the content urging the recipient to click on a malicious link to access their account and redeem their cashback. The link – “https://sh5-krrdbo6imq-uc[.]a[.]run[.]app” leads to a malicious website that requires the victim to enter their account details, which can then be stolen by the attacker.

Raiffeisen Bank Phishing Email – Account Theft Example
This is an example of an attempt to steal a user’s Raiffeisen bank account information through a phishing email. The sender’s name is “Raiffeisen”, but the email address is “support@raiffeisen-info[.]com”. The email’s subject is “The new SmartToken service is not active” in Romanian (origin:”Noul serviciu SmartToken nu este acti”), and the content claims that the victim needs to activate the “SmartToken“ service to ensure the account’s security against any fraudulent activity. The email contains a malicious link, “https://urlz[.]fr/kxnx” which the attacker tries to lure the victim into clicking so he could steal his account.

Netflix Phishing Scam – Attempts to Steal Payment Details
During the first quarter of 2023, we detected a fraudulent email that utilized Netflix’s branding to deceive individuals. The email, which appeared to originate from “Netflix”, was sent from the webmail address “support@bryanadamstribute[.]dk”. The subject line of the email was “Uрdаtе rеquіrеd – ассоunt оn hоld“, and the message claimed that the recipient’s Netflix account had been suspended, due to a failure to authorize payment for the next billing cycle. The email provided a link to renew the subscription and requested that the victim enter accurate payment details. However, the link directed users to a malicious website “https://oinstitutoisis[.]com/update/login/” with the intention of stealing their payment information.

Visit AITechPark for cutting-edge Tech Trends around AI, ML, Cybersecurity, along with AITech News, and timely updates from industry professionals!

Related posts

Expel Introduces Managed Detection and Response for Microsoft

Business Wire

CRN® Recognizes Stellar Cyber for Open XDR Innovations

Business Wire

2024 Threat Intelligence and Collaboration Survey: Cyware

Business Wire