SecurityBrief New Zealand - Technology news for CISOs & cybersecurity decision-makers
Story image
HelpSystems shines light on impact of response-based threats
Tue, 16th Aug 2022
FYI, this story is more than a year old

Response-based attacks targeting corporate inboxes have climbed to their highest volume since 2020, representing 41% of all email-based scams targeting employees, during Q2 of this year.

This is according to the latest Quarterly Threat Trends - Intelligence Report from Agari and PhishLabs, part of the HelpSystems cybersecurity portfolio.

From April through June, researchers at Agari and PhishLabs analysed hundreds of thousands of phishing and social media attacks targeting enterprises and their employees. The report uses the data from those attacks to present key trends shaping the threat landscape.

A response-based threat is a social-engineering attack that relies on victims responding through a chosen channel of communication and comprises methods such as phishing (targeting victims over email), vishing/smishing (over a voice call or an SMS text message) and advance-fee fraud where victims are tricked into sending an upfront-fee in exchange for a larger sum of money - also known as a 419 or Nigerian scam.

According to the report, advance-fee scams represented 54% of all response-based email threats in Q2. This threat type has seen a 3.4% increase in share of reports so far in 2022, and routinely occupies the majority of response-based attacks.

Business Email Compromise (BEC), where threat actors pose as a trusted source, such as a company employee or third-party contractor, also experienced an increase in Q2, contributing to 16% of overall attack volume. And while the share of attacks was down from Q1 among other threats within the response-based category, hybrid vishing (email-initiated voice phishing) attacks also increased by volume, reaching a six-quarter high in Q2, increasing 625% in volume from Q1 2021.

John Wilson, senior fellow, threat research at HelpSystems, says, "Response-based attacks consistently represent a significant portion of phishing volume, which highlights the fact that social engineering tactics continue to prove effective for criminals.

"We've seen threat actors continue to adapt 419, vishing, and BEC lures, so it is clear that most threat actors aren't reinventing the wheel, but instead relying on new variants of the same socially engineered threats that have proven successful in the past."

Additional key findings:

  • Phishing is steadily on the rise. Attacks are up nearly 6% in Q2 from Q1 2022.
  • In Q2, social media attacks increased 20% from Q1, averaging nearly 95 attacks per enterprise, per month. This represents a more than 100% increase in attacks in the last 12 months, as social platforms represent the most accessible tools capable of scamming the largest pool of victims.
  • In Q2, the Emotet trojan officially regained its status as the top payload after increasing 30% to represent nearly half of all malware attacks. Notably, newcomer Bumblebee jumped from unknown to the third spot, and is thought to be linked to former preferred payloads Trickbot and BazaLoader.
  • Credential theft attacks targeting Office 365 accounts reached a six-quarter high in share and volume during Q2. More than 58% of all credential theft phishing links were delivered with the intent to steal O365 login credentials, up 17.7% for the year.

Wilson concludes, "While most reported emails are typically not malicious, the proactive identification and reporting of suspicious emails is critical to keeping enterprises secure from credential theft, response-based, and malware attacks.

"Going forward, security teams should counteract the attack footprint by investing in cross-channel monitoring and partnerships with technology providers where abuse may occur."