ITS OZX- Posted August 30, 2020 Posted August 30, 2020 With the growth of public awareness of cyber attacks, viruses, and user breaches, hackers have focused more on phishing attacks, or what is known as social engineering to trap unwary users, and the second quarter of 2020 witnessed a growth in this type of attacks, as these attacks reached In the Gulf countries and Egypt, 2,578,501 attacks, Saudi Arabia's share, were 973,061 attacks. The hackers relied on a number of new tricks that include rejection e-mails from human resources and covert attacks in the form of order delivery notices, to carry out these attacks that take place on a large scale, sending huge waves of e-mails under the cover of names to official parties or promoting fake pages, increases. Chances of fraudsters' success in seeking access data from targeted users to their account. However, the first six months of 2020 showed a new side to this known form of attack, according to a report by Kaspersky, an information security firm. Phishing is one of the oldest and most flexible types of digital attacks based on what is known as social engineering. It is used in a number of ways and for different purposes to entrap unwary users by attracting them to a website and urging them to enter their personal information, which often includes financial credentials such as passwords for accounts. Banking, bank card details or login details for social media accounts. The fall of this information into the wrong hands can lend itself to many sabotage operations, such as stealing money or hacking corporate networks, which makes phishing a common way to infect targets. Users in the Kingdom were affected the most by this type of threats, as 973,061 phishing attacks were discovered during the three months of the second quarter, the UAE with 617,347 attacks, then Egypt with 492,532 attacks, the Sultanate of Oman with 193,379 attacks, then Kuwait and Bahrain with 106,245 attacks and 67,581 attacks on Straight. During the second quarter, fraudsters carried out more targeted attacks, most of which focused on small businesses. Fraudsters visited, to attract attention, emails and websites belonging to well-known parties. Potential victims could buy their products or services, and thus trust them, while they did not try in much Sometimes they go to the trouble of making these sites look really original, and targeted phishing attacks may lead to serious consequences. Once the fraudster gains access to the employee's email account, he can use it to carry out further attacks on the company he works for and on the rest of its employees, even on Third parties that deal with it, including suppliers and contractors.
Recommended Posts