Microsoft is the most used by hackers and hackers as bait to steal data or information from users through false e-mails using the method of «phishing». Basically, this consists of posing as a company with a fraudulent email and deceiving victims that they need to update their login details. Of course, if you provide this personal information, it falls into the hands of cyber criminals.
Microsoft Branded Use in Email Phishing Theft Techniques Up 19% in Q3 2020
The data comes from a study by the security company Check Point Research, which analyzes Top 10 Brands Used As Baits In Phishing Emails. According to the report, Microsoft has risen from fifth place in last year’s ranking to first place this year. In the third quarter of 2020 alone, Bill Gates’ tech company saw attempts to fraudulently grow the brand by 19% globally in an attempt to deceive users and mistake them for the company they contacted when it was in fact an attempted electronic fraud.
This increase in the use of the Microsoft brand to commit phishing crimes is due to the impulse to telework due to the pandemic. Among other things, in the past few months, an email purporting to be from Microsoft has become a popular invitation for users to renew their Microsoft Office 365 credentials, which many use to work at home.
The second place in this world ranking of brands used for “phishing” is for DHL, the parcel carrier that registers 9% of all attacks in the world under its name. Third place is for the Google search engine. The list is completed by PayPal, Netflix, Facebook, Apple, WhatsApp, Amazon and Instagram.
When it comes to sector classification, technology companies come in first, followed by banking and third for social media brands. Users who are generally victims of these attacks fall into the trap Since the contact is generated through a brand that is widely recognized or famous in various fields and whose contact appears legitimate, it is really a hoax, so users click the link and download a malware that is used by hackers to get your information access and confiscate them, usurp identities or take control of your computer.
In order not to fall for these phishing scams, you don’t have to press any links that you will get in your mailbox, regardless of where they come from. Then you need to analyze the emails, starting with the spelling of the letter, the format, the beginning of the greeting … and the type of information it contains. For example, if you are requesting a password change or similar requirement, you should know that these organizations and other responsible and legal entities do not request updates of credentials by email.
Finally, keep the operating and security systems of the computer and cellphone up to date because when they are out of date they leave openings for hackers to break into the computer.