Emails Attacks are almost impossible without the involvement of human interaction, Says report

One of the most common ways to attack online is through emails. Attackers use several social engineering tricks to attract their targets to open the links or download attachments they sent via email. Many of the people must have received such email asking to check out the file in attachment.

A report, The Human factor 2019 Report by Proofpoint, shows that almost all of the email attacks require a response from humans instead of exploiting on their own. Around 1 billion messages were screened in a day for 18 months to obtain the data. The results proved that 99% of the emails attacks are useful only if there is human interaction involved.

Many of the malicious emails are designed so professionally that users find it challenging to recognize whether they are from a reliable source or are fraud emails. These emails often resemble like they have been received from Google, Microsoft, or any other trustworthy contact.

Hackers, at times, lure employees by imitating the business routines of their organizations.

The report also found out that:

Frauds email mostly sent to people that can be a source to reach the real target. Attackers play smartly by not sending malicious emails directly to VIPs or high-profile people.


Domains names similar to some popular brands are registered and then used to trick targets. Domain frauds are one example of using social engineering to fool users.

Social engineering is also widely used for sextortion scams, credential phishing, and BEC (business email compromise).

Though attackers do their best to trick users, but users must always check the domain name to identify malicious emails. Also, avoid clicking unknown links to stay away from attacks.


Credits: Getty Images

Read next: What are the most hated email jargon at a professional place?

No comments:

Post a Comment