{"id":5092,"date":"2020-11-25T18:05:55","date_gmt":"2020-11-25T16:05:55","guid":{"rendered":"https:\/\/www.retarus.com\/blog\/es\/phishing-flourishes-during-covid-pandemic"},"modified":"2024-05-07T19:55:54","modified_gmt":"2024-05-07T17:55:54","slug":"phishing-flourishes-during-covid-pandemic","status":"publish","type":"post","link":"https:\/\/www.retarus.com\/blog\/es\/phishing-flourishes-during-covid-pandemic\/","title":{"rendered":"Phishing flourishes during Covid pandemic"},"content":{"rendered":"
At the initial height of the Covid-19 pandemic, phishing incidents rose to more than 220 percent the annual average. This is one of the key findings in the \u201c2020 Phishing and Fraud Report\u201d released by F5 Labs, the research subsidiary of F5. <\/p>
In the previous year\u2019s report, the experts had highlighted an increase in the use, or rather abuse, of automated free services such as blogging platforms and free-of-charge digital certificates for HTTPS. F5 Labs notes<\/a> that the past twelve months have not seen a revolution but rather an evolution in the in the methods attackers have employed in phishing, a method of social engineering focusing on exploiting email communication. Based on current figures, phishing incidents are projected to have increased by 15% in 2020.<\/p> There was a particularly huge increase in phishing attacks during the \u201cfirst wave\u201d of the Covid pandemic in spring. The various lockdowns around the globe and the increase in working from home (WFH) were accompanied at their peak by nearly 15,000 active certificates containing \u201cCovid\u201d or \u201ccoronavirus\u201d in their names \u2013 almost three quarters of all phishing websites use digital certificates and TLS encryption to appear genuine. This dramatic increase is likely to have contributed to a rise in the theft of payment card details detected in May and June this year \u2013 the number of stolen cards discovered on the darknet belonging to customers at seven major banks was found to be almost twice the amount noted during a similar peak period in 2019.<\/p> According to F5Labs, phishers are generally going about their business with increasing speed, professionalism and creativity, for instance when it comes to generating website addresses that look as realistic as possible. Vulnerabilities in generally trustworthy websites (WordPress, for instance, has been exploited) have readily been used to conceal phishing websites. Attackers are increasingly focusing on Microsoft\/Office 365 with new tactics such as \u201cconsent phishing\u201d. Last, but not least, a growing number of phishing websites are employing \u201cevasion techniques\u201d to avoid being detected by companies or investigated by security researchers.<\/p> To safeguard your company\u2019s email accounts, we highly recommend the Retarus Email Security<\/a> service, which boasts an enhanced phishing filter<\/a> and dedicated CxO Fraud Protection<\/a>. In this way, you can ensure that the vast majority of phishing emails don\u2019t even reach your employees\u2019 inboxes. And if one does make it through, our patented Patient Zero Detection<\/a> service can find it even after it has been delivered. You are also welcome to download our free anti-phishing guide<\/a> in five languages to sensitize your users on this tricky topic. For more information, please take a look at our website or get directly in touch with your local Retarus representative<\/a>.<\/p> ","protected":false},"excerpt":{"rendered":" At the initial height of the Covid-19 pandemic, phishing incidents rose to more than 220 percent the annual average. This is one of the key findings in the \u201c2020 Phishing and Fraud Report\u201d released by F5 Labs, the research subsidiary of F5.<\/p>\n","protected":false},"author":14,"featured_media":4901,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_et_pb_use_builder":"off","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[8,15],"tags":[102,24],"dipi_cpt_category":[],"class_list":["post-5092","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","category-security","tag-email-security","tag-phishing"],"acf":[],"yoast_head":"\n