Phishing attacks surge in 2024 as cybercriminals adopt AI tools and multi-channel tactics

Trending 1 month ago
Phishing
(Image credit: Vektor Illustration/Shutterstock)
  • Phishing attacks are becoming much analyzable and harder to detect
  • Attackers are utilizing caller techniques specified arsenic QR codes and deepfakes
  • Some businesses are receiving 36 phishing emails per day

Phishing attacks are consistently connected nan emergence and becoming much sophisticated, arsenic cybercriminals nary longer trust solely connected basal email schemes, alternatively incorporating caller strategies specified arsenic QR codification phishing (quishing), AI-powered attacks, and multi-channel phishing to heighten their effectiveness.

A caller Egress study has revealed phishing attacks spiked successful nan 2nd 4th of 2024, pinch a 28% emergence successful nan number of phishing emails compared to nan first quarter.

Phishing attacks are besides becoming much sophisticated. Cybercriminals now usage a assortment of caller strategies to bypass unafraid email gateways (SEGs) and autochthonal defenses for illustration Microsoft 365’s information features. In Q2 2024 alone, location was a 52.2% summation successful phishing attacks that successfully bypassed SEG detection.

Commodity attacks - a mass-produced threat

One type of phishing that has seen a notable summation successful 2024 is commodity attacks. These are mass-produced, malicious campaigns that impersonate well-known brands connected a ample standard to instrumentality users into clicking connected clone promotions, images, aliases hyperlinks.

The study reveals that during these attacks, organizations acquisition a staggering 2,700% summation successful phishing attempts, pinch organizations complete nan 2,000 worker people would person to woody pinch complete 1,128 phishing emails complete 31 days, which is astir 36 phishing emails per day. The sheer measurement of these attacks tin overwhelm galore companies' information systems, making it progressively difficult to forestall each malicious email from reaching an employee's inbox.

One of nan methods utilized to bypass SEG is HTML smuggling, wherever attackers hide malicious scripts wrong HTML attachments. Once opened by nan user, nan book assembles itself connected nan victim’s device, bypassing accepted signature-based detection. Another maneuver involves embedding phishing links wrong seemingly morganatic documents aliases exploiting vulnerabilities successful trusted websites to big malware.

Businesses must now instrumentality precocious information measures and foster a civilization of consciousness to amended protect themselves against nan increasing threat of phishing.

Sign up to nan TechRadar Pro newsletter to get each nan apical news, opinion, features and guidance your business needs to succeed!

Phishing attacks are progressively utilizing AI-powered devices to standard their operations. AI allows cybercriminals to automate and personalize phishing campaigns, making them much convincing and harder to detect. Deepfakes and AI-generated chatbots are now awesome devices of prime for cybercriminals.

These technologies let attackers to impersonate trusted individuals aliases organizations, further expanding nan likelihood of success. This year, location has been a important emergence successful "payloadless" attacks which trust solely connected societal engineering alternatively than accepted malicious attachments aliases links, accounting for astir 19% of phishing attempts successful 2024, up from 5.4% successful 2021.

Cybercriminals are besides utilizing multi-channel phishing tactics, allowing hackers to target victims crossed aggregate platforms specified arsenic email, SMS, and moreover collaboration platforms for illustration Microsoft Teams. This multi-channel attack has go much communal successful 2024, exploiting nan comparative deficiency of information connected non-email platforms.

You mightiness besides like

  • New method for phishing discovered for Android and IPhone users
  • Here's a database of nan best firewalls today
  • These are nan best antivirus services right now

Efosa has been penning astir exertion for complete 7 years, initially driven by curiosity but now fueled by a beardown passion for nan field. He holds some a Master's and a PhD successful sciences, which provided him pinch a coagulated instauration successful analytical thinking. Efosa developed a keen liking successful exertion policy, specifically exploring nan intersection of privacy, security, and politics. His investigation delves into really technological advancements power regulatory frameworks and societal norms, peculiarly concerning information protection and cybersecurity. Upon joining TechRadar Pro, successful summation to privateness and exertion policy, he is besides focused connected B2B information products.

More
Source Technology
Technology