Research: Phishing is popular method for digital espionage




Phishing is not just the field of criminal groups that users want to steal banking information. Attackers to do phishing also use digital espionage, set the security branch of provider Verizon.

This is contained in a report on security of Verizon. In two-thirds of 290 espionage campaigns researched Verizon, phishing played a role. Unlike phishing attacks from criminals who login information for example on bank sites, the attackers are not looking for user input. They use phishing primarily as a method to be able to easily perform code on a system, by means of an infected attachment.

With success, as the study shows, where the Dutch National Cyber ​​Security Centre has supplied information. In 23 percent of cases, a person appears to open an e-mail, and in 11 percent of cases, he still click an attachment. By 10 people within an organization to mail, chances are therefore 90 percent that one of them can be infected with malware.

In addition, 99.9 percent of the vulnerabilities exploited attackers, according to Verizon for over a year was patched. That indicates that many companies and organizations fail to update their software on time. Some companies are even abused vulnerabilities of ten to fifteen years of age; in some cases, even the case of bugs in 1999.

A report by Symantec, which has not yet been issued but probably later published on Tuesday, shows that attackers not only for phishing attacks to choose because of its effectiveness, but also because security phishing attacks notice less rapidly, reports Reuters.

The same report shows that many attacks still go through Netherlands, writes De Volkskrant on the basis of the report. Netherlands is in first place in Europe and fourth place worldwide; only from China, the United States and India more attacks are coming. That does not mean that most of the attackers were Dutch, but they house their servers in the Netherlands. That has long been so, partly because of the good Internet connections.


In: Technology & Gadgets Asked By: [15554 Red Star Level]

Answer this Question

You must be Logged In to post an Answer.

Not a member yet? Sign Up Now »