Saudi Ministry of Education to showcase innovations at 2025 Geneva International Exhibition    7,523 violators of residency, labor, and border security laws deported in a week    Video contradicts Israeli army account of deadly March 23 strike on Gaza paramedics    Saudi Arabia spends over $241 million to implement de-mining projects in 3 countries    Italy's Meloni government approves controversial security decree expanding police protections and penalties    Egypt submits new Gaza ceasefire and prisoner exchange proposal: Report    'Everything is possible' — Ronaldo focused on titles, not 1,000-goal milestone after Riyadh Derby win    Saudi, US military leaders discuss enhanced defense cooperation in Riyadh    King Salman Global Academy for Arabic Language launches program with Indiana University    Ronaldo brace powers Al Nassr past Al Hilal in Riyadh derby thriller    Ed Sheeran weaves Persian music into new song, Azizam    Al-Jadaan: Crown Prince's directives confirm government's ability to bring back balance to real estate market    Veteran Bollywood actor Manoj Kumar dies at 87    Foreign investors are allowed to engage in real estate business outside Makkah and Madinah Commercial speculation should not be the purpose of real estate transaction    Aubameyang fires Al Qadsiah into King's Cup final with stoppage-time winner over Al Raed    Musk's X is suing India, as Tesla and Starlink plan entry    Tesla sales plunge after backlash against Elon Musk    Danilo Pereira fires Al Ittihad into King's Cup final with dramatic stoppage-time double    Screen time in bed linked to insomnia, study finds    Mexico bans junk food in schools to fight childhood obesity epidemic    Sweet sales surge ahead of Eid as Saudi chocolate imports top 123 million kg in 2024    Bollywood actress vindicated over boyfriend's death after media hounding    Grand Mufti rules against posting prayers and preaching in mosques on social media    King Salman prays for peace and stability for Palestinians in Ramadan message King reaffirms Saudi Arabia's commitment to serving the Two Holy Mosques and pilgrims    Exotic Taif Roses Simulation Performed at Taif Rose Festival    Asian shares mixed Tuesday    Weather Forecast for Tuesday    Saudi Tourism Authority Participates in Arabian Travel Market Exhibition in Dubai    Minister of Industry Announces 50 Investment Opportunities Worth over SAR 96 Billion in Machinery, Equipment Sector    HRH Crown Prince Offers Condolences to Crown Prince of Kuwait on Death of Sheikh Fawaz Salman Abdullah Al-Ali Al-Malek Al-Sabah    HRH Crown Prince Congratulates Santiago Peña on Winning Presidential Election in Paraguay    SDAIA Launches 1st Phase of 'Elevate Program' to Train 1,000 Women on Data, AI    41 Saudi Citizens and 171 Others from Brotherly and Friendly Countries Arrive in Saudi Arabia from Sudan    Saudi Arabia Hosts 1st Meeting of Arab Authorities Controlling Medicines    General Directorate of Narcotics Control Foils Attempt to Smuggle over 5 Million Amphetamine Pills    NAVI Javelins Crowned as Champions of Women's Counter-Strike: Global Offensive (CS:GO) Competitions    Saudi Karate Team Wins Four Medals in World Youth League Championship    Third Edition of FIFA Forward Program Kicks off in Riyadh    Evacuated from Sudan, 187 Nationals from Several Countries Arrive in Jeddah    SPA Documents Thajjud Prayer at Prophet's Mosque in Madinah    SFDA Recommends to Test Blood Sugar at Home Two or Three Hours after Meals    SFDA Offers Various Recommendations for Safe Food Frying    SFDA Provides Five Tips for Using Home Blood Pressure Monitor    SFDA: Instant Soup Contains Large Amounts of Salt    Mawani: New shipping service to connect Jubail Commercial Port to 11 global ports    Custodian of the Two Holy Mosques Delivers Speech to Pilgrims, Citizens, Residents and Muslims around the World    Sheikh Al-Issa in Arafah's Sermon: Allaah Blessed You by Making It Easy for You to Carry out This Obligation. Thus, Ensure Following the Guidance of Your Prophet    Custodian of the Two Holy Mosques addresses citizens and all Muslims on the occasion of the Holy month of Ramadan    







Thank you for reporting!
This image will be automatically disabled when it gets reported by several people.



74% of all targeted attack attempts globally use email as attack vector
Published in The Saudi Gazette on 21 - 04 - 2016

Globally 74% of all targeted attack attempts use email vectors, even as business emails are estimated to reach 139.4 billion per day by 2017. Trend Micro on average blocks 50 billion email spam-sending IP addresses.
Spear phishing is commonly being used by attackers to gain access to a company networks to facilitate a targeted attack, through malicious emails.
Attackers gather intel on an individual in the targeted company and using the gathered information an email with malicious attachment or link is then sent to the target. Once the target opens the email, the attachment or link leads the target to a malicious website hosting malware, thus infecting the targets machine, giving the attackers access to the network.
"Attackers disguise these emails to make it look like its coming from a legitimate source, a colleague, a new updated from the HR team or something work related. The attackers will have done their homework, so the target is not suspicious of the incoming email, a few clicks and the criminals have been successful in infiltration the system. Email is the most common form of business communication, and one of the easiest way for attackers to get into a company's network," said Ihab Moawad, VP Mediterranean, Middle East, Africa, Russia & CIS at Trend Micro.
How do attackers/cybercriminals gain unauthorized access to company networks and manage to steal personal information, financial data? While some people may know a little about corporate data breaches, few know how it's actually done, or the methods cybercriminals use to execute an attack.
In a targeted attack, attackers have a certain level of expertise and have sufficient resources to execute their schemes over a long period of time.
In cases where the breach indeed resulted from a targeted attack, it is important to know that attackers can adapt, adjust, and improve their attacks to counter their victim's defenses.
Attackers utilize various social engineering techniques that leverage recent events, work-related issues, and other areas of interest pertaining to the intended target. Techniques like the use of backdoors, zero-day or software exploits, watering hole, and spear phishing are the most common methods used to gain information.
While phishing and spear phishing share similar techniques, they are not to be confused. Phishing is a generally exploratory attack that targets a broader audience, while spear phishing is a targeted version of phishing.
They are different in the sense that phishing is a more straightforward attack—once information such as bank credentials, is stolen, the attackers have pretty much what they intended to get. In spear phishing, the successful theft of credentials or personal information is often only the beginning of the attack, because it's only used to gain access to the target network—a move that ultimately leads to a targeted attack.
As mentioned above, spear phishing is a targeted form of phishing in which fraudulent emails target specific organizations in an effort to gain access to confidential information.


Clic here to read the story from its source.