当前位置:网站首页>Email security report in the second quarter: email attacks have soared fourfold, and well-known brands have been used to gain trust
Email security report in the second quarter: email attacks have soared fourfold, and well-known brands have been used to gain trust
2022-07-28 02:37:00 【Internet Security Research Institute】
In recent days, 《ASRC 2022 Second quarter E-mail Security Report 》 Release , The report shows email attacks in the second quarter , Still mainly phishing emails , The second is the mail with malicious virus attachments , Its number has increased over the previous quarter 4 times .
meanwhile , Recently released 《 Second quarter phishing brand report 》 Show , Attackers will use brands with sufficient influence and consumer trust to launch phishing email attacks . Among the well-known brands used ,LinkedIn、Microsoft、DHL、 Amazon、Apple、 Adidas 、Google、Netflix、Adobe And HSBC before entering 10 The list . This explanation , Attackers are using our trust and needs for these brands to launch attacks .
If email channel is not controlled or restricted , It is easy to become the breakthrough of active attack .
that , What are the e-mail security issues that we tend to overlook ?
1、 Malicious email
Insiders Click to start malicious programs , It is not intended to open the door to hackers , Make hackers have the ability to obtain or delete data in the database . Hide malicious programs in email attachments , Is a very common behavior .
Such as harpoon mail , Similar emails usually contain a malicious attachment or provide a download of malicious files URL, After clicking on a similar file, the embedded malicious macro code will be executed and the remote control Trojan horse will be installed . The attacker can take a screenshot of the lost host through the Trojan 、 Keystroke record 、 Credential theft 、 Malicious acts such as data theft .
Use email to transmit malicious Trojan virus , It's the usual trick of hackers .
2、 Misoperation or malicious disclosure
Due to the negligence of employees , Data leakage caused by the loss of confidential equipment or the wrong sending of important information , These losses may be higher than network attacks .
The survey shows that , There are about 74% The security incident of is due to the fact that insiders have not encrypted confidential information , And in case of misoperation, it is sent to the outside .
Some employees retaliated for emotional retaliation 、 Take the initiative to disclose data for reasons such as interest buying . This is the most easily overlooked point , Investigation found , The reasons for enterprise data leakage are as high as 50% The left and right come from the inside .
E-mail is the transmission channel of important data , It is easy to become a tool for negligence or malicious disclosure .
3、 Mail plaintext transfer
E-mail is the carrier of information , The main security threat it faces is email interception , Email content leaked . In addition, any system platform 、 There are vulnerabilities in the server , This is unavoidable . therefore , The Internet transmits information 、 The sensitive data stored in the server must be encrypted .
According to the working principle of e-mail system , In the process of e-mail from the sender to the recipient , You need to transit through different networks and mail servers , Until the email arrives at the final receiving host , This brings opportunities for attackers , Attackers can intercept e-mail packets when they pass through network devices and multiple media e-mail servers , Get information about these emails .
Traditional mail is transmitted in clear text , According to the different e-mail circulation links , Attackers can deploy sniffing devices in the LAN where specific target users send and receive e-mail , Restore email through analysis , Get mail information , You can also invade the e-mail system server , Steal multiple users , Even mail data of all users .
Clear text transmission email , Prone to interception 、 Tampering 、 Security risks such as theft .

边栏推荐
- 第三章 队列
- Flask1.1.4 werkzeug1.0.1 source code analysis: Blueprint
- Say yes, I will love you, and I will love you well
- Network must know topics
- [understanding of opportunity -53]: Yang Mou stands up and plots to defend himself
- 剑指offer专项突击版第12天
- 分层图解决的一些最短路问题
- 【HCIP】BGP 基础
- Plato Farm在Elephant Swap上铸造的ePLATO是什么?
- 使用BigDecimal类型应该避免哪些问题?(荣耀典藏版)
猜你喜欢
![[solution] solve the problem of SSH connection being inactive for a long time and being stuck and disconnected](/img/66/99bd61223cbe622db3e28474f4fa15.png)
[solution] solve the problem of SSH connection being inactive for a long time and being stuck and disconnected

Interviewer: what is the factory method mode?

修改MySQL密码的四种方法(适合初学者)

Emotional drama in the world Zhou Bingkun lost his job because he saw Tu Zhiqiang and was shot

Red hat official announced the new president and CEO! Paul Cormier, a key figure in transformation, is "retiring"

Notes for the fourth time of first knowing C language

基于stm32的恒功率无线充电

Lock mechanism in MySQL database InnoDB storage engine (glory Collection Edition)

Say yes, I will love you, and I will love you well

1313_pyserial的安装以及文档的生成
随机推荐
Leetcode hot topic Hot 100 - > 2. Add two numbers
Sqlserver problem solving: replication components are not installed on this server. Please run SQL Server Setup again and select the option to install replication components
2022.7.8 supplement of empty Luna
Class notes (5) (1) - 593. Binary search
智能合约安全——selfdestruct攻击
How is insert locked in MySQL? (glory Collection Edition)
Maskedauutoencoders visual learner cvpr2022
Which database is the fastest to query data only?
ps 简单使用
Flask1.1.4 werkzeug1.0.1 source code analysis: Blueprint
别人发你的jar包你如何使用(如何使用别人发您的jar包)
Explore flex basis
小程序毕设作品之微信校园浴室预约小程序毕业设计成品(2)小程序功能
初识C语言 -- 操作符和关键字,#define,指针
1313_pyserial的安装以及文档的生成
初识C语言 -- 结构体,分支和循环语句
Network must know topics
Canvas 从入门到劝朋友放弃(图解版)
regular expression
Detailed explanation of the lock algorithm of MySQL lock series (glory Collection Edition)