Christmas remains a hot time for phishing attacks

Up to a fifth of British internet users have fallen victim to a phishing campaign, research finds

Although half of British internet users delete phishing emails as soon as they receive them, one fifth have fallen for the scams, according to research. 

These figures have come to light as we head into the festive season - one of the rifest periods for criminals to launch attacks on their victims, according to GMX, which commissioned the study.

GMX explained the most frequent type of phishing attack at this time of year are linked to logistics, with criminals faking emails from parcel suppliers, using track and trace links as a gateway to the malware.

Because more people receive parcels at Christmas, the criminals' rate of success is statistically higher, making it a highly effective way to steal victims' details, the company explained.

"During the festive period not only does the number of phishing scams increase, but also the quality," said Jan Oetjen, CEO of GMX.

"Cyber criminals are highly professional and manage to copy invoices or newsletters so well that they can hardly be differentiated from the original. Therefore, users should keep an eye on their mailbox with increased attention."

Although half of phishing recipients usually delete malicious emails as soon as they receive them, just under a quarter (24 percent) mark them as spam and two percent say curiosity gets the better of them, so they do open them.

GMX advised anyone receiving a suspicious email that looks as though it may be from a shipping company should manually enter the company's web address into their browser rather than clicking the link. From there, they can enter the tracking information provided in the email - if there is any. Some 26 percent of those questioned by GMX said they follow this process to ensure they're not a victim of a phishing campaign.

Featured Resources

The ultimate law enforcement agency guide to going mobile

Best practices for implementing a mobile device program

Free download

The business value of Red Hat OpenShift

Platform cost savings, ROI, and the challenges and opportunities of Red Hat OpenShift

Free download

Managing security and risk across the IT supply chain: A practical approach

Best practices for IT supply chain security

Free download

Digital remote monitoring and dispatch services’ impact on edge computing and data centres

Seven trends redefining remote monitoring and field service dispatch service requirements

Free download

Recommended

X-rated phishing attacks just keep growing
phishing

X-rated phishing attacks just keep growing

4 Jun 2021
eBay, Apple, Microsoft, Facebook, and Google were phishers’ top targets in 2020
phishing

eBay, Apple, Microsoft, Facebook, and Google were phishers’ top targets in 2020

20 Apr 2021

Most Popular

Apple MacBook Pro 15in vs Dell XPS 15: Clash of the titans
Laptops

Apple MacBook Pro 15in vs Dell XPS 15: Clash of the titans

11 Oct 2021
Best Linux distros 2021
operating systems

Best Linux distros 2021

11 Oct 2021
HPE wins networking contract with Birmingham 2022 Commonwealth Games
Network & Internet

HPE wins networking contract with Birmingham 2022 Commonwealth Games

15 Oct 2021