Story image

Thursdays are the most dangerous days for our inboxes, Proofpoint finds

08 Jun 17

Be especially wary of the dangers lurking in your inbox on Thursdays - because that's when malicious email attachments are likely to spike, according a new report from Proofpoint.

The Human Factor 2017 report says that attackers are going after people more than tech flaws in order to spread malware, steal credentials and money and transfer that money elsewhere.

Business email compromise (BEC) scams may be driving the increases in email attack volumes. The report says that they jumped from 1% of all mail scams in 2015 to 42% housing banking email trojans in 2016.

BEC attacks are the fastest-growing attack types and according to Proofpoint statistics, cost $5 billion worldwide so far.

99% of email-based financial fraud attacks worked through human-based clicks rather than automated malware. Most phishing messages were after Apple IDs, but users most clicked on Google Drive phishing links.

Enterprises don't have full control over all devices uses in their network - the report found that 42% of clicks to malicious links came through mobile devices. 8% occurred through older versions of Windows that are not supported by new patches.

Thursday is also the most popular day for malicious attachment volume - which spikes 38% on that day alone.

Keyloggers and backdoors pop up on Mondays; Ransomware attacks spread more frequently between Tuesday and Thursday. Banking Trojans pop up mostly on Wednesdays. Thursday and Friday are major targets for point-of-sale campaigns.

The report found that 'peak clicking times' - i.e. when users click on suspicious links - coincide with business hours. 95% of those clicks happen in 24 hours, and 50% of clicks happen within the first hour of receiving it.

The median time between emails received and clicked links is just one hour. Most occur within one day after getting the email. More than 90% of those malicious links led to credential phishing pages.

The report also found that social media 'fraudulent support account phishing' jumped 150% last year. Called "angler phishing", attacks targeted bank customers, social media customers and other services that targeted customer posts on companies' social media channels.

JASK prepares for global rollout of their AI-powered ASOC platform
The JASK ASOC platform automates alert investigations, supposedly freeing the SOC analyst to do what machines can’t. 
Pitfalls to avoid when configuring cloud firewalls
Flexibility and granularity of security controls is good but can still represent a risk for new cloud adopters that don’t recognise some of the configuration pitfalls.
Why total visibility is the key to zero trust
Over time, the basic zero trust model has evolved and matured into what Forrester calls the Zero Trust eXtended (ZTX) Ecosystem.
Gartner names Proofpoint Leader in enterprise information archiving
The report provides a detailed overview of the enterprise information archiving market and evaluates vendors based on completeness of vision and ability to execute.
Tensions on the rise after Huawei CFO arrest
“Recently our corporate CFO, Meng Wanzhou, was provisionally detained by the Canadian authorities on behalf of the United States of America."
Palo Alto Networks integrates RedLock and VM-Series with AWS Security Hub
AWS Security Hub is designed to provide users with a comprehensive view of their high-priority security alerts and compliance status.
Juniper simplifies data integration to improve threat detection
Updates to the Juniper Advanced Threat Prevention Appliances leverage third-party firewalls and security data sources.
Is mobile shopping compromising your enterprise security?
When employees do their holiday shopping on company resources, security teams have a challenge with the surge in browsing and online transactions.