Email Security Blog

Data Breach of Confidential Employee Information – Top Phishing Attacks of 2016

Nikki Tyson June 21, 2016 Email Security
Fallback Featured Image

In this series of blog posts, we examine the most common forms of phishing attacks and appropriate countermeasures to protect both individuals and organizations – in this post we explore the data breach of confidential employee information.

Over the last year, we have seen a trend in spear phishing attacks that aim to steal valuable employee payroll information. Many recent attacks have focused on stealing the US W-2 tax form information.

  • Snapchat – The messaging app hit the headlines when it’s payroll department handed over confidential information on current and former employees to a scammer impersonating the CEO.
  • Seagate Technology – An isolated phishing email also led to Seagate Technology being tricked into handing over the W-2 tax documents on all current and past employees, which contained confidential information on social security numbers and salaries.

The legal and reputational impact of such breaches can be far reaching and have significant financial impact.

“Data breach is the new normal – plan for it”

Unfortunately, the one-two punch of a data breach means that the worst may not yet be over for employees who have had their personal details stolen. Identity theft often follows data breaches as hackers use the confidential information they have accessed in the initial attack to facilitate a variety of frauds.

Steps to Reduce Risk

Here are our top tips on how organizations can better protect themselves to reduce risk:

  • Greater collaboration
  • Remember, it could be you!
  • Know your strongest assets
  • Introduce new controls
  • Restore trust in the digital ecosystem

Download Agari’s executive brief on the Top Phishing Attacks of 2016 to learn more about best practices to stopping phishing attacks.

You can also check out the other posts in the Top Phishing Scams series:

Leave a Reply

Your email will not be published. All fields are required.

Agari Blog Image

August 15, 2019 Paul Lorence

Building a Career at Agari: One Designer’s Experience

Being a user experience (UX) designer and managing design teams is a rewarding job. I…

Agari Blog Image

August 1, 2019 John Wilson

Email @ttack: Why Identity Deception is Your #1 Threat

Want to know how email became the number one attack vector for cybercriminals? Look no…

Agari Blog Image

July 31, 2019 Armen Najarian

2020 Presidential Candidates Remain Vulnerable to Email Fraud Despite Increased Warnings

Only three months ago, the Agari team published our first in-depth analysis on how the…

Agari Blog Image

July 25, 2019 Scot Kennedy

Using ML to Stop Latent Email Attacks That Dodge Early Detection

When implemented effectively, real-world deployments of machine learning (ML)-based email security can block business email…

Agari Blog Image

July 18, 2019 Patrick Peterson

Businesses Grow More Vulnerable to Email Attacks, Even with Improved Defenses

Cybercriminals increasingly use new forms of identity deception to launch an email attack to target…

mobile image