• News
  • Security
  • Products
  • About Seqrite
Seqrite Blog Blog
  • News
  • Security
  • Products
  • About Seqrite
Home  /  Uncategorized  /  Email-borne cyber attacks: A constant security threat
email-attacks
12 July 2018

Email-borne cyber attacks: A constant security threat

Written by Seqrite
Seqrite
Uncategorized
  • 5
    Shares
Estimated reading time: 3 minutes

Since the invention of the World Wide Web in 1989 by Tim Berners-Lee, the technology has changed. What used to be a collection of simple text-based Usenet groups metamorphosed into multimedia and graphics. First email communication was all the rage, then it shifted to social media. But, there’s one technology which continues to remain ubiquitous: electronic mail or e-mail.

Texting and social media may be popular now but email remains the preferred mode of communication for the majority of businesses worldwide and it shows no signs of signing down. The Radicati Group estimated that the total number of business and consumer emails sent and received per day will exceed 281 billion in 2018 and is forecast to grow over 333 billion by the end of 2022. There are 3.8 billion email users worldwide and the figure is estimated to grow beyond 4.2 million by the end of 2022.

With these numbers, it’s not really a wonder why email continues to be a preferred mode of attack for cyber criminals. The sheer widespread usage of e-mails, both on a personal and on a professional basis by sheer billions of people, means hackers and cyber criminals can target multiple people at once. The United States’ Federal Bureau of Investigation (FBI) estimated that business email compromise and email account compromise represented the highest reported losses at more than $676 million in 2017.

The most common email-based attacks normally take the following form:

Ransomware:

Ransomware refers to malicious software that locks systems or encrypts data and demands a ransom in exchange. The two most common channels through which ransomware infiltrate a system are through email and compromised websites. In fact, 93% of all phishing emails contained encryption ransomware in 2016. To make these emails look genuine and convincing, they are disguised as invoices, tax forms, letters from a co-employee or a boss.

Cyber criminals like using ransomware as it is an easy, anonymous way to terrorize corporate and get money. Ransomware does not even need any specialized technical knowledge to be effective – hackers can use shared code and even access services which will collect the ransom via Bitcoin. In fact, a report suggested that ransomware attacks were up by a momentous 400 percent, mainly attributing it to the popularity of WannaCry.

Spear phishing

Spear phishing is a variation of a phishing scam wherein hackers send a targeted email to an individual which appears to be from a trusted source. The agenda of these mails like any other cyber fraud is to either gain access to the user’s system or obtain other classified information. Spear phishing is considered one of the most successful cyber attack techniques because of the superior level of personalization done to attack users which makes it highly believable.

In spear phishing, users get meticulously personalized mails from a trusted source or a company you’re familiar with and interact quite often. This could be as scrupulous as an email from a friend, colleague or your boss asking you for access to classified information. Spear phishing hackers thrive on their knowledge about you which lets you lose your guard in most cases.

Business Email Compromise (BEC)

Business Email Compromise is a type of phishing attack where cyber criminals show up as company executives and try to convince the customers, employees or vendors into transferring sensitive information and associated funds. BEC attacks are probably the most focused form of phishing where the cyber attackers research the landscape by looking at the social profiles of the targeted employees. Looking closely at the employees, vendors and non-suspecting customers allow cyber criminals to draft highly targeted emails.

A BEC is often a highly focused attack and works in a manner that the emails flowing in look completely legitimate to the receiver making him act on it and thus becoming a victim. BEC attacks mostly focus on individuals who are responsible for wire transfers, targeting businesses and employees through spoof emails.

To guard against email-borne cyber attacks, organizations must employ a multi-layered solution which offers advanced protection, URL filtering, Data loss prevention and encryption along with firewall and email protection. Organizations can consider Seqrite’s range of powerful tools to allow enterprises to unallow malware, untolerate vulnerabilities and unauthorize alien access, leading to an unrisk enterprise.

As an IT security partner for your business, Seqrite provides comprehensive security from advanced cyber threats. To know more

 Previous PostA new ransom-miner malware campaign emerging in wild!
Next Post  Seqrite Endpoint Encryption: The encryption that your business ne...
Seqrite
About Seqrite

Follow us for the latest updates and insights related to security for enterprise networks. Subscribe to our newsletter to stay...

Articles by Seqrite »

Related Posts

  • APT

    MaaS Moving Towards APT as a Service?

    February 5, 2019
  • invasion

    This is how hackers can invade your system without installing malware

    February 1, 2019
  • Applying Deep Learning for PE-Malware Classification

    January 10, 2019

No Comments

Leave a Reply.Your email address will not be published.

Cancel reply

CAPTCHA Image
Refresh Image

Popular Posts

  • Benefits of having Intrusion Prevention/Detection System in your enterprise Benefits of having Intrusion Prevention/Detection System in your enterprise February 15, 2018
  • 5 Security measures you should take to protect your organization’s network 5 Security measures you should take to protect your organization’s network August 11, 2017
  • This is how hackers can invade your system without installing malware This is how hackers can invade your system without installing malware February 1, 2019

Featured Authors

  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Ankita Ashesh
    Ankita Ashesh

    Ankita is a Communications Strategist at Quick Heal with a passion for covering...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director and Chief Technology Officer of...

    Read more..

Latest Posts

  • GandCrab Riding Emotet’s Bus!

    GandCrab Riding Emotet’s Bus!

    February 15, 2019
  • Increase in threats to mobile devices

    Increase in threats to mobile devices

    February 14, 2019
  • Biometric authentication data at risk

    Biometric authentication data at risk

    February 12, 2019
Tweets by @Seqrite

Join our Newsletter

Sign up for our Newsletter and get regular cybersecurity round-ups delivered to your inbox.

Follow Us On

Topics

Antivirus For Linux (9) Antivirus For Server (9) Bitcoin (6) Cryptocurrency (7) Cyber-attack (29) cyber-attacks (54) Cybersecurity (165) cyber security (24) Cyber threat (28) cyber threats (44) data breach (48) data breaches (27) data loss (28) data loss prevention (33) data protection (20) data security (13) DLP (49) Encryption (11) endpoint security (94) Enterprise security (12) Exploit (12) firewall (8) GDPR (7) hackers (7) incident response plan (9) malware (24) malware attack (20) malware attacks (12) MDM (18) mobile device management (9) Network security (16) Patch Management (12) phishing (15) Ransomware (43) ransomware attack (29) ransomware attacks (29) ransomware protection (12) Seqrite (15) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) Unified Threat Management (7) UTM (30) Vulnerability (9) WannaCry (7)

Products

  • End Point Security (EPS)
  • Seqrite Encryption
  • Seqrite Endpoint Security Cloud
  • Mobile Device Management (MDM)
  • Cloud Security
  • Unified Threat Management
  • Antivirus for Server
  • Antivirus for Linux

Resources

  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies

About Us

  • Company Overview
  • Leadership
  • Why choose SEQRITE?
  • Awards & Certifications
  • Newsroom

Archives

  • By Date
  • By Category

© 2018 Quick Heal Technologies Ltd. (Formerly Known as Quick Heal Technologies Pvt. Ltd.) Cookie Policies Privacy Policies

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website.
By browsing this website, you agree to our cookie policy.