sb-as logo
Story image

Thursdays are the most dangerous days for our inboxes, Proofpoint finds

08 Jun 2017

Be especially wary of the dangers lurking in your inbox on Thursdays - because that's when malicious email attachments are likely to spike, according a new report from Proofpoint.

The Human Factor 2017 report says that attackers are going after people more than tech flaws in order to spread malware, steal credentials and money and transfer that money elsewhere.

Business email compromise (BEC) scams may be driving the increases in email attack volumes. The report says that they jumped from 1% of all mail scams in 2015 to 42% housing banking email trojans in 2016.

BEC attacks are the fastest-growing attack types and according to Proofpoint statistics, cost $5 billion worldwide so far.

99% of email-based financial fraud attacks worked through human-based clicks rather than automated malware. Most phishing messages were after Apple IDs, but users most clicked on Google Drive phishing links.

Enterprises don't have full control over all devices uses in their network - the report found that 42% of clicks to malicious links came through mobile devices. 8% occurred through older versions of Windows that are not supported by new patches.

Thursday is also the most popular day for malicious attachment volume - which spikes 38% on that day alone.

Keyloggers and backdoors pop up on Mondays; Ransomware attacks spread more frequently between Tuesday and Thursday. Banking Trojans pop up mostly on Wednesdays. Thursday and Friday are major targets for point-of-sale campaigns.

The report found that 'peak clicking times' - i.e. when users click on suspicious links - coincide with business hours. 95% of those clicks happen in 24 hours, and 50% of clicks happen within the first hour of receiving it.

The median time between emails received and clicked links is just one hour. Most occur within one day after getting the email. More than 90% of those malicious links led to credential phishing pages.

The report also found that social media 'fraudulent support account phishing' jumped 150% last year. Called "angler phishing", attacks targeted bank customers, social media customers and other services that targeted customer posts on companies' social media channels.

Story image
Microsoft takes legal action to disrupt botnet and combat ransomware
Microsoft has announced it took action to disrupt a botnet, Trickbot, one of the world's most infamous botnets and prolific distributors of malware and ransomware.More
Story image
BlueVoyant acquires Managed Sentinel, builds out Microsoft MSS offerings
“Combining Managed Sentinel’s Azure Sentinel deployment expertise with BlueVoyant’s MDR capabilities will help customers operationalise and maximise Microsoft security technologies."More
Story image
Lumen launches managed security services for APAC market
The new service is designed to provide enterprise businesses with a proactive, connected security strategy to enhance threat detection and protection across endpoints. More
Story image
Interview: How cyber hygiene supports security culture - ThreatQuotient
We spoke with ThreatQuotient’s APJC regional director Anthony Stitt to dig deeper into cyber hygiene, security culture, threat intelligence, and the tools that support them.More
Link image
How to head off a rise in DDoS attacks
Many businesses invest in costly DDoS mitigation and protection solutions, but few test them. NCC Group tests all environments and is one of only two AWS DDoS Test Partners. Claim 10% off your next DDoS service today.More
Story image
CrowdStrike targets Zero Trust blind spot with new offering
CrowdStrike has officially launched CrowdStrike Falcon Zero Trust Assessment (ZTA), designed to aid in overall security posture by delivering continuous real-time assessments across all endpoints in an organisation regardless of the location, network or user. More