Cybercriminals are increasingly targeting popular content creation and collaboration platforms to execute sophisticated phishing attacks, according to recent research from Barracuda Networks.
These platforms, widely used by schools, graphic designers, and businesses, are appealing to attackers due to their high levels of user engagement and trusted reputation.
The research indicates that cybercriminals are embedding phishing links within emails disguised as legitimate posts, designs, or documents.
When unsuspecting recipients click these links, they are redirected to fake login pages or other deceptive sites designed to harvest sensitive information, including login credentials and personal data.
The rise in attacks is particularly notable in Singapore and the broader Asia-Pacific (APAC) region, where digital engagement and creative expression are booming. In Singapore alone, over 85% of the population actively participates in content sharing and creation.
According to Saravanan Govindarajan, Manager, Threat Analysis at Barracuda, Manager, Threat Analysis at Barracuda the increase in phishing attacks leveraging trusted content creation and collaboration platforms highlights a shift in cybercriminal tactics towards the misuse of popular, reputable online communities.
“It is vital for individuals and organisations in Singapore, and the wider Asia-Pacific region to remain vigilant and ensure they have robust security measures in place that can detect and adapt to evolving threats.” Govindarajan said.
Recent research from Barracuda has identified phishing attacks exploiting an online collaboration tool commonly used in educational settings. The platform enables students to create and share virtual boards or “walls” for organising various types of content.
This study is part of a broader series of reports leveraging Barracuda’s detection data and threat intelligence. The findings indicate that attackers are continuously honing their tactics to bypass advanced security measures.
Previous strategies have included the use of QR codes, popular webmail services, URL shorteners, and advanced infostealers designed to extract large amounts of sensitive data.
Content Platforms
Content creation platforms, including social media networks and content management systems (CMS), are used by millions worldwide, fostering open collaboration and creativity.
However, the trust in the platforms’ tools is being manipulated by cybercriminals to spread malicious content while evading detection.
Recent analyses have revealed that attackers are sending emails that appear to originate from these legitimate platforms, featuring authentic-looking posts, designs, and documents.
Within these communications, embedded phishing links redirect unsuspecting recipients to fraudulent login pages or other deceptive websites aimed at stealing sensitive information, including login credentials and personal data.
Experts believe this strategy marks a significant shift in phishing tactics, as attackers increasingly target well-known and trusted platforms to enhance their chances of success while circumventing security measures.
The trend not only complicates the landscape for users but also presents heightened challenges for security professionals and email protection technologies that are responsible for safeguarding against these threats.
The exploitation of these trusted tools also underscore the need for heightened awareness and vigilance among users, as well as the continuous adaptation of security measures to combat the evolving tactics of cybercriminals.
Organisations Of Different Sizes Are Being Targeted By Email Threats
A recent threat analysis by Barracuda, covering email attack trends from June 2023 to May 2024, has revealed critical insights into how organisations of different sizes are being targeted by email threats.
The analysis shows that larger companies are especially susceptible to lateral phishing attacks, where attackers compromise an employee’s account and then attempt to deceive other employees within the organisation.
This tactic exploits the established trust and communication channels within the company, making it difficult for individuals to recognize malicious activity.
In contrast, smaller businesses face a different set of challenges. They are more frequently targeted by external phishing attempts and extortion schemes, which often leverage social engineering tactics to exploit vulnerabilities.
Businesses may lack the robust security infrastructure of larger organisations, making them appealing targets for cybercriminals looking for quick gains.
An analysis of targeted email attacks from early June 2023 to the end of May 2024 reveals that smaller companies are especially vulnerable to external phishing threats, which comprised 71% of targeted attacks over the past year. In comparison, these external attacks were reported in only 41% of incidents at larger organisations.
Moreover, smaller businesses experience nearly three times the number of extortion attacks as their larger counterparts. For small companies, extortion incidents represent 7% of targeted attacks, while for firms with 2,000 or more employees, these incidents account for just 2%.
This disparity highlights the unique challenges faced by organisations of different sizes and underscores the need for tailored security measures to protect against evolving email threats.
The Current Email Security Landscape
- The current email security landscape reveals alarming statistics regarding data breaches and phishing attacks.
Nearly 1.2% of all emails sent globally are classified as malicious, resulting in an astonishing 3.4 billion phishing emails dispatched each day. The massive volume underscores the persistent threat facing both individuals and organisations.
Research indicates that human factors play a critical role in these security breaches, with 74% of incidents tied to elements such as social engineering tactics, human errors, or misuse.
The vulnerability is especially concerning in the context of phishing, where attackers employ deceptive strategies to manipulate unsuspecting users into clicking harmful links or providing sensitive information.