当前位置:网站首页>Email security report in the second quarter: email attacks have soared fourfold, and well-known brands have been used to gain trust
Email security report in the second quarter: email attacks have soared fourfold, and well-known brands have been used to gain trust
2022-07-28 02:37:00 【Internet Security Research Institute】
In recent days, 《ASRC 2022 Second quarter E-mail Security Report 》 Release , The report shows email attacks in the second quarter , Still mainly phishing emails , The second is the mail with malicious virus attachments , Its number has increased over the previous quarter 4 times .
meanwhile , Recently released 《 Second quarter phishing brand report 》 Show , Attackers will use brands with sufficient influence and consumer trust to launch phishing email attacks . Among the well-known brands used ,LinkedIn、Microsoft、DHL、 Amazon、Apple、 Adidas 、Google、Netflix、Adobe And HSBC before entering 10 The list . This explanation , Attackers are using our trust and needs for these brands to launch attacks .
If email channel is not controlled or restricted , It is easy to become the breakthrough of active attack .
that , What are the e-mail security issues that we tend to overlook ?
1、 Malicious email
Insiders Click to start malicious programs , It is not intended to open the door to hackers , Make hackers have the ability to obtain or delete data in the database . Hide malicious programs in email attachments , Is a very common behavior .
Such as harpoon mail , Similar emails usually contain a malicious attachment or provide a download of malicious files URL, After clicking on a similar file, the embedded malicious macro code will be executed and the remote control Trojan horse will be installed . The attacker can take a screenshot of the lost host through the Trojan 、 Keystroke record 、 Credential theft 、 Malicious acts such as data theft .
Use email to transmit malicious Trojan virus , It's the usual trick of hackers .
2、 Misoperation or malicious disclosure
Due to the negligence of employees , Data leakage caused by the loss of confidential equipment or the wrong sending of important information , These losses may be higher than network attacks .
The survey shows that , There are about 74% The security incident of is due to the fact that insiders have not encrypted confidential information , And in case of misoperation, it is sent to the outside .
Some employees retaliated for emotional retaliation 、 Take the initiative to disclose data for reasons such as interest buying . This is the most easily overlooked point , Investigation found , The reasons for enterprise data leakage are as high as 50% The left and right come from the inside .
E-mail is the transmission channel of important data , It is easy to become a tool for negligence or malicious disclosure .
3、 Mail plaintext transfer
E-mail is the carrier of information , The main security threat it faces is email interception , Email content leaked . In addition, any system platform 、 There are vulnerabilities in the server , This is unavoidable . therefore , The Internet transmits information 、 The sensitive data stored in the server must be encrypted .
According to the working principle of e-mail system , In the process of e-mail from the sender to the recipient , You need to transit through different networks and mail servers , Until the email arrives at the final receiving host , This brings opportunities for attackers , Attackers can intercept e-mail packets when they pass through network devices and multiple media e-mail servers , Get information about these emails .
Traditional mail is transmitted in clear text , According to the different e-mail circulation links , Attackers can deploy sniffing devices in the LAN where specific target users send and receive e-mail , Restore email through analysis , Get mail information , You can also invade the e-mail system server , Steal multiple users , Even mail data of all users .
Clear text transmission email , Prone to interception 、 Tampering 、 Security risks such as theft .

边栏推荐
猜你喜欢
![This operation may not be worth money, but it is worth learning | [batch cutting of pictures]](/img/e8/a34e471b0089f8085b140c74b5c01f.jpg)
This operation may not be worth money, but it is worth learning | [batch cutting of pictures]
![[Yugong series] July 2022 go teaching course 019 - for circular structure](/img/40/b4e673de0462c3dd6ca8b8fb513914.png)
[Yugong series] July 2022 go teaching course 019 - for circular structure

「冒死上传」Proe/Creo产品结构设计-止口与扣位

Say yes, I will love you, and I will love you well
![[Yugong series] use of tabby integrated terminal in July 2022](/img/df/bf01fc77ae019200d1bf57be783cb9.png)
[Yugong series] use of tabby integrated terminal in July 2022

重要安排-DX12引擎开发课程后续直播将在B站进行
![[机缘参悟-53]:阳谋立身,阴谋防身](/img/93/2f61993770d93d9adc80a9fa89e71c.jpg)
[机缘参悟-53]:阳谋立身,阴谋防身

MySQL 中的 INSERT 是怎么加锁的?(荣耀典藏版)

作业7.27 IO进程

MySQL high availability and master-slave synchronization
随机推荐
Interviewer: what is the factory method mode?
Pytorch optimizer settings
2020.7.7 eth price analysis
The virtual host website cannot access the self-test method
【ROS进阶篇】第十讲 基于Gazebo的URDF集成仿真流程及实例
Detailed explanation of the lock algorithm of MySQL lock series (glory Collection Edition)
What can you say to comfort your girlfriend or daughter-in-law
What is eplato cast by Plato farm on elephant swap?
Wechat campus bathroom reservation applet graduation design finished product (1) development outline
怎么简单实现菜单拖拽排序的功能
Lombok prompts variable log error when using JUnit test in idea
Flask1.1.4 werkzeug1.0.1 source code analysis: Blueprint
2022.7.8 eth price analysis
【TA-霜狼_may-《百人计划》】图形3.7 移动端TP(D)R架构
cn+dt
作业7.27 IO进程
功能测试和非功能测试区别简析,上海好口碑软件测试公司推荐
支付宝小程序授权/获取用户信息
TypeScript(零) —— 简介、环境搭建、第一个实例
Unity 保存图片到相册以及权限管理