Christmas remains a hot time for phishing attacks

Up to a fifth of British internet users have fallen victim to a phishing campaign, research finds

Although half of British internet users delete phishing emails as soon as they receive them, one fifth have fallen for the scams, according to research. 

These figures have come to light as we head into the festive season - one of the rifest periods for criminals to launch attacks on their victims, according to GMX, which commissioned the study.

GMX explained the most frequent type of phishing attack at this time of year are linked to logistics, with criminals faking emails from parcel suppliers, using track and trace links as a gateway to the malware.

Because more people receive parcels at Christmas, the criminals' rate of success is statistically higher, making it a highly effective way to steal victims' details, the company explained.

Advertisement
Advertisement - Article continues below
Advertisement - Article continues below

"During the festive period not only does the number of phishing scams increase, but also the quality," said Jan Oetjen, CEO of GMX.

"Cyber criminals are highly professional and manage to copy invoices or newsletters so well that they can hardly be differentiated from the original. Therefore, users should keep an eye on their mailbox with increased attention."

Although half of phishing recipients usually delete malicious emails as soon as they receive them, just under a quarter (24 percent) mark them as spam and two percent say curiosity gets the better of them, so they do open them.

GMX advised anyone receiving a suspicious email that looks as though it may be from a shipping company should manually enter the company's web address into their browser rather than clicking the link. From there, they can enter the tracking information provided in the email - if there is any. Some 26 percent of those questioned by GMX said they follow this process to ensure they're not a victim of a phishing campaign.

Featured Resources

Digitally perfecting the supply chain

How new technologies are being leveraged to transform the manufacturing supply chain

Download now

Three keys to maximise application migration and modernisation success

Harness the benefits that modernised applications can offer

Download now

Your enterprise cloud solutions guide

Infrastructure designed to meet your company's IT needs for next-generation cloud applications

Download now

The 3 approaches of Breach and Attack Simulation technologies

A guide to the nuances of BAS, helping you stay one step ahead of cyber criminals

Download now
Advertisement

Most Popular

Visit/business-strategy/mergers-and-acquisitions/354602/xerox-to-nominate-directors-to-hps-board-reports
mergers and acquisitions

Xerox to nominate directors to HP's board – reports

22 Jan 2020
Visit/operating-systems/25802/17-windows-10-problems-and-how-to-fix-them
operating systems

17 Windows 10 problems - and how to fix them

13 Jan 2020
Visit/business-strategy/public-sector/354608/uk-gov-launches-ps300000-sen-edtech-initiative
public sector

UK gov launches £300,000 SEN EdTech initiative

22 Jan 2020
Visit/web-browser/30394/what-is-http-error-503-and-how-do-you-fix-it
web browser

What is HTTP error 503 and how do you fix it?

7 Jan 2020