Cybercriminals often hide attack attempts behind well-known brand names with the intent to trick targeted users into making the fatal click. Microsoft is their favorite — by far. Credit: Ed Hardie / Unsplash Cybercriminals are increasingly imitating well-known brands as a means for infiltrating corporate networks and stealing sensitive data, according to recent research from Cisco Talos Intelligence. This attack vector sees cybercriminals exploiting trust in well-known brands on social media and websites, but especially via email to entice users to click carelessly or to share personal login details. “Brand imitation attacks work like a Trojan horse,” explains Thorsten Rosendahl, technical leader at Cisco Talos in Germany. “People trust what they see without checking exactly what’s inside. Unfortunately, such attacks are becoming increasingly successful.” Most imitated brands The Cisco Talos researchers examined the extent of these attacks in detail. With the help of the Brand Impersonation Detection Engine from Cisco Secure Email Threat Defense, corresponding attack attempts were registered and analyzed worldwide from March 22, 2024, to April 22, 2024. What Cisco Talos researches found was that the most frequently imitated brand worldwide by cybercriminals was by far Microsoft, followed by DocuSign and Amazon in second and third place. PayPal, Adobe, and Instagram also rank in the top 10, along with Nortonlifelock, Chase, Geek Squad, and Home Depot, according to Cisco Talos. The illegal use of brand names is relatively easy, according to the researchers. For example, attackers insert the trademarks directly into the HTML source code of the email. To make detection more difficult, cybercriminals also encode this email using base64. Another method is to retrieve the logo from a remote server when requested by the email program. In this scenario, the URI (Uniform Resource Identifier) of the resource is embedded in the HTML source code of the email. Alternatively, the attackers provide a logo — base64 encoded — as an attachment, which is displayed by email clients when referenced in the HTML source to persuade potential victims to reveal their login details and other sensitive information. The attackers’ perfidious goal: By making the email about the brand name appear to come from a trustworthy company, recipients are less likely to doubt the message’s authenticity. For example, the fraudsters pose as technical support employees of a company that is supposedly acting on behalf of the company whose brand is being exploited. The email requests the victim’s login credentials, for example, and thus gains access to the relevant accounts. Trust shamelessly exploited Hackers use brand imitations primarily in the areas of e-commerce or office software. Also popular are fake job offers with the logo of a trustworthy brand. The same applies to emails from law firms or government organizations. “Cyber attackers shamelessly exploit trust in well-known brands,” warns Rosendahl. “When big brands appear in emails, it at least arouses interest. Often enough, there are already real emails from these companies in your own inbox — you really have to look very closely.” The manager recommends that users always check whether such an email really makes sense and not share information and access carelessly. CSOs should also make their workforces aware of these issues through regular security awareness training. More Microsoft security news: Microsoft fixes dangerous zero-click Outlook remote code execution exploit Microsoft mandates Chinese staff to use iPhones, not Android Microsoft continues to add, shuffle security execs in the wake of security incidents Related content news The US offers a $2.5M bounty for the arrest of Angler Exploit Kit co-distributor The State Department has placed a bounty of up to $2.5 million on information leading to Volodymyr Kedariya’s arrest. By Shweta Sharma 29 Aug 2024 3 mins Hacking Cybercrime analysis RansomHub, Play, Akira: Die gefährlichsten Ransomware-Banden Nachdem LockBit durch Polizeieinsätze geschwächt wurde, versuchen andere Banden wie Play und Cactus deren Platz einzunehmen. By Martin Bayer 14 Aug 2024 5 mins Cybercrime analysis Sellafield drohte IT-GAU: Massive Security-Lücken in britischer Atomanlage Nachdem Untersuchungen immer mehr katastrophale Security-Lücken im britischen Sellafield offenlegten, haben die Behörden ein Verfahren gegen die Betreiber eröffnet. By Martin Bayer 13 Aug 2024 5 mins Cybercrime analysis Microsoft OneDrive und Google Drive als Angriffsbasis: Hacker verstecken sich in der Cloud Immer mehr Hacker-Gruppen, auch staatlich gesteuerte, nutzen frei verfügbare Cloud-Dienste als Plattform für ihre Angriffe. By Lucian Constantin 12 Aug 2024 4 mins Cybercrime PODCASTS VIDEOS RESOURCES EVENTS SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe