FireEye: Two-thirds of email traffic wasn’t ‘clean’ in H1 2018

September 18, 2018 9:00 am


FireEye, Inc., the intelligence-led security company, today released the results of its Email Threat Report. Based on the analysis of a sample set of over half-a-billion emails from 1H 2018, FireEye found that less than a third (32%) of email traffic seen in the first half of 2018 was considered ‘clean’ and actually delivered to an inbox. The report also found that 1 in every 101 emails had malicious intent. When compared to the previous six-month period, the changes in both these numbers depict that the email landscape continues to see an increase in email-based threats.

“Not only is email the most pervasive form of communication, it is also the most popular vector for cyber attacks. This makes email the biggest vulnerability for every organization,” said Ken Bagnall, vice president of email security at FireEye. “From malware to malware-less attacks including impersonation attacks like CEO fraud, a single malicious email can cause significant brand damage and financial losses. By choosing an email security solution with features based on real-time knowledge gained from the front lines, and by teaching users to always ensure they are communicating with who they think they are, organizations can better defend against attacks.”

READ: Facial recognition innovation today, cyber-warfare tool in the future?

Email reliance continues; Cybercriminals adapt

With email security solutions focused on detecting malware, cybercriminals are now adapting their attacks, exposing organizations to malware-less assaults such as CEO fraud. In fact, the majority of attacks blocked (90%) during analysis were malware-less, with phishing attacks alone making up 81% of the blocked malware-less emails, almost doubling from January to June 2018. Data also indicates that phishing attacks will continue to rise, while impersonation attacks (which were at 19%) remain relatively proportional to the total number of attacks seen. With it only taking one email to potentially impact an entire organization, the protection of this data must be taken seriously.

READ: 7 Key cyber threat areas for Gulf governments, organizations

Other notable email attack trends

While the overall number of attacks stayed fairly consistent each month during the evaluated six-month period, a few notable trends stuck out relative to when and how attackers struck:

– Relative to malware-based attacks, Mondays and Wednesdays were most common

– Malware-less attacks were most likely to occur on a Thursday including domain name spoofing and attacks using a spoofed friendly username, with the exception of newly existing domains which peaked on Wednesdays instead

– Impersonation attacks were most likely to fall on a Friday

– When it comes to the weekend, malware-less attacks continued to be more prevalent than malware-based attacks, with domain name spoofing attacks and newly existing domains being the most likely among them

READ: Expert: Reducing the risk of cyber attacks in the Middle East

Follow AMEinfo on Facebook , LinkedIn, and Twitter , and subscribe to our newsletter at the bottom of this page.

Tags:

AMEinfo Staff
By AMEinfo Staff
AMEinfo staff members report business news and views from across the Middle East and North Africa region, and analyse global events impacting the region today.



AMEinfo EXPERTS