Follow Us

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

91% of cyberattacks begin with spear phishing email

Spear phishing makes use of information about a target to make attacks more specific and 'personal'

Article comments

Some 91% of cyberattacks begin with a "spear phishing" email, according to research from security software firm Trend Micro.

Spear phishing is an increasingly common form of phishing that makes use of information about a target to make attacks more specific and “personal”.

These attacks may, for instance, refer to their targets by their specific name or job position, instead of using generic titles like in broader phishing campaigns.

The goal of a spear phishing attack is to trick the victim into either opening a malicious file attachment or clicking a link to a malware- or an exploit-laden website, which could compromise the victim’s network.

According to a Trend Micro report 94% of targeted emails use malicious file attachments as the payload or infection source. The remaining 6% use alternative methods such as installing malware through malicious links.

"We fully expect to see a resurgence of malicious email as targeted attacks expand and evolve”, said Rik Ferguson, director of security research and communications at Trend Micro. “Experience has shown us that criminals continue to abuse tried and trusted methods to directly leverage intelligence gathered during the reconnaissance for targeted attacks."

Ferguson said the abundance of information on individuals and companies online makes the job of creating extremely credible emails "far too simple".

The most commonly used file types for spear phishing attacks accounted for 70% of them. The main file types were .RTF (38%), .XLS (15%) and .ZIP (13%).

Executable (.EXE) files were not as popular among cybercriminals because emails with .EXE file attachments are usually detected and blocked by security systems, said Trend.

Trend said the most highly targeted industries for spear phishing were government and activist groups. Information about government agencies and appointed officials are readily found on the internet, said Trend, and often posted on public government websites.

Because activist groups are highly active in social media, and are also quick to provide member information - in order to facilitate communication, organise campaigns or recruit new members - member profiles are highly visible targets.

Trend said 75% of email addresses for spear phishing targets are easily found through web searches or using common email address formats.

If firms are going to tackle spear phishing they'll need to make sure they have the right protection in place though. Antivirus software is now so ineffective at detecting new malware threats most enterprises are probably wasting their money buying it, a recent analysis by security firm Imperva concluded.

The Imperva team ran a collection of 82 new malware files through the VirusTotal system that checks files against around 40 different antivirus products, finding that the initial detection rate was a startling zero.


More from Techworld

More relevant IT news


Send to a friend

Email this article to a friend or colleague:

PLEASE NOTE: Your name is used only to let the recipient know who sent the story, and in case of transmission error. Both your name and the recipient's name and address will not be used for any other purpose.

Techworld White Papers

Choose – and Choose Wisely – the Right MSP for Your SMB

End users need a technology partner that provides transparency, enables productivity, delivers...

Download Whitepaper

10 Effective Habits of Indispensable IT Departments

It’s no secret that responsibilities are growing while budgets continue to shrink. Download this...

Download Whitepaper

Gartner Magic Quadrant for Enterprise Information Archiving

Enterprise information archiving is contributing to organisational needs for e-discovery and...

Download Whitepaper

Advancing the state of virtualised backups

Dell Software’s vRanger is a veteran of the virtualisation specific backup market. It was the...

Download Whitepaper

Techworld UK - Technology - Business

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.

Techworld Mobile Site

Access Techworld's content on the move

Get the latest news, product reviews and downloads on your mobile device with Techworld's mobile site.

Find out more...

From Wow to How : Making mobile and cloud work for you

On demand Biztech Briefing - Learn how to effectively deliver mobile work styles and cloud services together.

Watch now...

Site Map

* *