1

vv

Извините, этот текст доступен только на “en” и “ua”.

Over 709 million attempts to access phishing and scam websites in 2023 have been thwarted by Kaspersky’s anti-phishing system, marking a 40% increase compared to the previous year’s figures. Messaging apps, artificial intelligence platforms, social media services, and cryptocurrency exchanges were among the pathways most frequently exploited by threat actors to scam users.

 

Kaspersky’s annual analysis of the spam and phishing threat landscape revealed a persistent trend for 2022: a marked increase in phishing attacks. This continued to escalate in 2023, surging by over 40%. Besides a significant spike in phishing activity observed in May and June, the number of attacks rose steadily throughout the year. This trend could be linked to the onset of the holiday season, during which scammers commonly propagate travel-related scams, such as counterfeit airline tickets, tours, and enticing hotel deals.

 

The widespread integration of technologies featuring built-in GPT chats has provided scammers with new avenues to exploit. However, attackers have not forgotten their time-honored tactics. High-profile releases, events, and premieres, such as Barbie and Wonka, remained irresistible to phishers and scammers, whose counterfeit websites ensnared those eager to access the next big thing ahead of schedule or at a discounted rate.

 

Additionally, experts have observed a surge in attacks spread via messaging platforms. There were thwarted 62,127 attempts to redirect via phishing and scam links on Telegram, a notable 22% increase in such threats from the last year.

 

To avoid becoming a victim of phishing-based scams, experts advise the following:

 

  • Only open emails and click links if you are sure you can trust the sender.
  • When a sender is legitimate, but the content of the message seems strange, it is worth checking with the sender via an alternative means of communication.
  • Check the spelling of a website’s URL if you suspect you are faced with a phishing page. If you are, the URL may contain mistakes that are hard to spot at first glance, such as a 1 instead of I or 0 instead of O.

 

Source: Securitymagazine.com

Related Posts

card__image

Secure by Design: From Concept to Cybersecurity Imperative in 2025

Извините, этот текст доступен только на “en” и “ua”. In a rapidly evolving digital landscape, the Secure by Design (SbD) philosophy is proving strategically essential and measurably effective. A report from Secure Code Warrior, analyzing data from 600 enterprise customers over nine years, found that large organizations that train developers in secure-by-design practices can reduce […]

card__image

Zero-Day Vulnerabilities: Unseen Threats and Their Impact

Извините, этот текст доступен только на “en” и “ua”. The ultimate guide to zero-day vulnerabilities and their effects in 2025 starts with a clear truth: zero-day vulnerabilities rank among the most severe dangers in the modern digital landscape.   A zero-day vulnerability  — flaws exploited before patches are available. This makes them incredibly challenging to […]

card__image

Отчет CrowdStrike 2025: Генеративный ИИ усиливает атаки социальной инженерии, кибершпионаж Китая вырос на 150%

  Отчет CrowdStrike о глобальных угрозах в 2025 году выявляет стремительный рост киберугроз, связанных с Китаем, а также все более широкое использование генеративного ИИ (GenAI) и рост атак на облачную инфраструктуру. В отчете содержится четкое предупреждение для бизнес-лидеров: недооценка угроз может дорого стоить.   Злоумышленники быстро эволюционируют — они становятся все более виртуозными и методичными, […]