1

Phishing attacks increased by 40% in 2023

Over 709 million attempts to access phishing and scam websites in 2023 have been thwarted by Kaspersky’s anti-phishing system, marking a 40% increase compared to the previous year’s figures. Messaging apps, artificial intelligence platforms, social media services, and cryptocurrency exchanges were among the pathways most frequently exploited by threat actors to scam users.

 

Kaspersky’s annual analysis of the spam and phishing threat landscape revealed a persistent trend for 2022: a marked increase in phishing attacks. This continued to escalate in 2023, surging by over 40%. Besides a significant spike in phishing activity observed in May and June, the number of attacks rose steadily throughout the year. This trend could be linked to the onset of the holiday season, during which scammers commonly propagate travel-related scams, such as counterfeit airline tickets, tours, and enticing hotel deals.

 

The widespread integration of technologies featuring built-in GPT chats has provided scammers with new avenues to exploit. However, attackers have not forgotten their time-honored tactics. High-profile releases, events, and premieres, such as Barbie and Wonka, remained irresistible to phishers and scammers, whose counterfeit websites ensnared those eager to access the next big thing ahead of schedule or at a discounted rate.

 

Additionally, experts have observed a surge in attacks spread via messaging platforms. There were thwarted 62,127 attempts to redirect via phishing and scam links on Telegram, a notable 22% increase in such threats from the last year.

 

To avoid becoming a victim of phishing-based scams, experts advise the following:

 

  • Only open emails and click links if you are sure you can trust the sender.
  • When a sender is legitimate, but the content of the message seems strange, it is worth checking with the sender via an alternative means of communication.
  • Check the spelling of a website’s URL if you suspect you are faced with a phishing page. If you are, the URL may contain mistakes that are hard to spot at first glance, such as a 1 instead of I or 0 instead of O.

 

Source: Securitymagazine.com

Related Posts

card__image

Cyberattacks on Critical Infrastructure: The Digital Battlefield

Cyber threats are escalating in critical sectors like energy and healthcare. Recent warnings from CISA, NSA, and FBI highlight vulnerabilities exploited by Chinese-linked operations.   In today’s world, it’s hard to miss the constant buzz about cyber threats, especially when they hit critical infrastructure and sectors like energy, healthcare, and transportation. These attacks are not […]

card__image

Cybersecurity workforce growth stalls and skills gaps widen

A first look at data from the 2024 ISC2 Cybersecurity Workforce Study has revealed a marked need for organizations to increase opportunities for cybersecurity workforce growth, enable more entry-level professionals to enter the field, and develop much-needed skills with support from experienced peers.   According to new research, the growth of the global cybersecurity workforce […]

card__image

Surge in DDoS Attacks: Gcore Report Reveals 46% Increase in First Half of 2024

Monitoring evolving DDoS trends is essential for anticipating threats and adapting defensive strategies. The comprehensive Gcore Radar Report for the first half of 2024 provides detailed insights into DDoS attack data, showcasing changes in attack patterns and the broader landscape of cyber threats. Here, we share a selection of findings from the full report.   Key Takeaways […]