Home Security Email Attacks Require 99% Human Interaction

Email Attacks Require 99% Human Interaction

The cyber-attacks through emails have become common these days. We receive hundreds of emails every month saying that the attached file contains data that might be interested, or that the file attached is an invoice that is past due, or that there are important documents attached that I should see right away. This is called social engineering, this has become one of the best tools attackers use to convince their targets to open infected links or attachments.

A report by Proofpoint titled “The Human Factor 2019 Report” shows us how email attacks rely on human interaction rather than automated exploits. The report shows that more than 99% of the attacks required human interaction to succeed. This data was obtained by screening more or less 1 billion messages per day over 18 months. This means that no automated process can success when the attack is made through email.

Social engineering attack makes more difficult to distinguish from a genuine email or a fraud one. Most attackers structure the email message in a way that it looks like you’ve received it from a trusted source like Google, Microsoft or a known contact.

The report also mentions that hackers tend to imitate the business routines of organizations to fool employees working there.

Other key conclusions found in the report include:

  • People who are frequently targeted by fraud emails are, usually, not high-profile individuals or VIPs. These are discovered identities or “targets of opportunities” for attackers.
  • Domain fraud — registering a domain name that looks similar to popular brands to trick users — lends a sense of legitimacy to a socially engineered fraud email.
  • Social engineering is extensively used in credential phishing, sextortion scams, and business email compromise (BEC).

While malicious actors prepare email attacks in a way that makes it difficult to distinguish a spam mail from a genuine one. However, you can identify a potentially malicious mail by checking its domain name. You should also avoid clicking on unknown links and more.

Have you witnessed and escaped an email attack? Tell us in the comments.

Richard Sabinohttp://itspecialistdr.com
I like to share Information Technology News and how-to tips with all the people around me. I created this blog to reach the most people I can.


Please enter your comment!
Please enter your name here

Must Read

Microsoft Azure Virtual Training Day: Fundamentals

(adsbygoogle = window.adsbygoogle || ).push({}); Today we're...

Eliminate background noise from conference calls with Krisp for free

Krisp is an AI-powered filter that virtually eliminates background noise, letting your work-from-home experience be a little more pleasant and professional.

Microsoft is offering free certification voucher

(adsbygoogle = window.adsbygoogle || ).push({}); If you have been desiring to...

How to share your Calendar in Outlook with someone else

(adsbygoogle = window.adsbygoogle || ).push({}); Have you ever been struggling in...

A San Francisco church file a lawsuit against Zoom claiming the company is failing to protect users

An online Bible study session has been victim of Zoom-bombing which led this San Francisco Church to file a lawsuit against Zoom...

Google removed 813 creepware apps from the Android Play Store

(adsbygoogle = window.adsbygoogle || ).push({}); NortonLifeLock and researchers from the New...

Microsoft stopped the release of Windows 10 32-Bit Build for new PC

(adsbygoogle = window.adsbygoogle || ).push({}); There are signals that Microsoft is...