Home Security Financial phishing scams up sharply from a year ago

Financial phishing scams up sharply from a year ago

Financial phishing scams, which target online payment systems, banks and retailers, now account for nearly half (49.77%) of all phishing attacks, up from 34.33% in 2015, security company Kaspersky Lab says.

This year, the company found that China, Australia and Brazil were particularly vulnerable with up to 28% of users targeted.

The company released statistics for phishing before the year's two big US shopping days and ahead of the silly season which is fast approaching.

It said the statistics covered the period from the fourth quarter of 2016 right up to 18 October this year.

The company said its data came from the "heuristic anti-phishing component that activates every time a user tries to open a phishing link that has not yet been added to Kaspersky Lab’s database".

phishing map

The percentage of users on whose computers Kaspersky Lab’s heuristic anti-phishing system was triggered as a proportion of the total number of Kaspersky users in that country, Q1-Q3 2017.

The data has been presented either as the number of attacks or the number of attacked users and covers all regions where Kaspersky has users.

The statistics collected showed that there was generally a rise in financial phishing in the approach to Black Friday, which this year falls on 24 November.

The following Monday, known as Cyber Monday, a term created by marketers for the Monday holiday in the week after the US festival of Thanksgiving, is a big day for online shoppers. It is also big for Australian shoppers.

Kaspersky tied the rise in financial phishing to the rising number of payments made on mobile devices.

phishing stats

The change in the share of different types of financial phishing in 2013-2017.

"The use of smartphones for online banking, payment and shopping has doubled in a year, and mobile users will have less time to think and check each action, particularly if they are out and about," the company said.

During the shopping and festive seasons, a mass of promotional emails, offers and ads, which were often browsed on smartphones, meant a small screen to view them on and the degree of distraction when viewing such messages on the move contributed to the rise in success rates for attackers, Kaspersky said.

Attackers were found to be using popular brands to target users, but the use of online payment system brands was roughly equal.

Graphics: courtesy Kaspersky Lab

LEARN HOW TO REDUCE YOUR RISK OF A CYBER ATTACK

Australia is a cyber espionage hot spot.

As we automate, script and move to the cloud, more and more businesses are reliant on infrastructure that has the high potential to be exposed to risk.

It only takes one awry email to expose an accounts’ payable process, and for cyber attackers to cost a business thousands of dollars.

In the free white paper ‘6 Steps to Improve your Business Cyber Security’ you’ll learn some simple steps you should be taking to prevent devastating and malicious cyber attacks from destroying your business.

Cyber security can no longer be ignored, in this white paper you’ll learn:

· How does business security get breached?
· What can it cost to get it wrong?
· 6 actionable tips

DOWNLOAD NOW!

RECOVERING FROM RANSOMWARE

Ransomware is a type of malware that blocks access to your files and systems until you pay a ransom.

The first example of ransomware happened on September 5, 2013, when Cryptolocker was unleashed.

It quickly affected many systems with hackers requiring users to pay money for the decryption keys.

Find out how one company used backup and cloud storage software to protect their company’s PCs and recovered all of their systems after a ransomware strike.

DOWNLOAD THE REPORT!

Sam Varghese

website statistics

A professional journalist with decades of experience, Sam for nine years used DOS and then Windows, which led him to start experimenting with GNU/Linux in 1998. Since then he has written widely about the use of both free and open source software, and the people behind the code. His personal blog is titled Irregular Expression.

 

Popular News

 

Telecommunications