Email Security Blog

Hacktivism – Top Phishing Attacks of 2016

Nikki Tyson July 12, 2016 Cybercrime
Fallback Featured Image

In this series of blog posts we examine the most common forms of phishing attacks and appropriate countermeasures to protect both individuals and organizations – in this post we explore hacktivism and the growing range of victims.

Politically Motivated & Hacktivism

The threat of cyber criminals pursuing a political agenda and seeking to disrupt critical infrastructures has been well documented. However, hacktivists are now increasingly relying on high volumes of email communication to provide a new window of opportunity for attack.

  • Not Only Politicians – Evidence has emerged that sophisticated phishing scams have been aimed at targets as diverse as Hilary Clinton and industrial controls companies.
  • Energy Industry – Symantec previously revealed a Trojan, called Lozaik, was targeted at workers in the energy industry across the UAE, Kuwait, Saudi Arabia, United States, UK, and Uganda. The Trojan masqueraded as an Excel spreadsheet, spreading malware that observed and reported device data.

Hacktivism Countermeasures

With cyber attacks remaining one of the biggest threats to privacy, national security and the global economy, there needs to be greater collaboration and information sharing between the public and private sectors. It’s also imperative that anyone with valuable digital assets assumes that they are vulnerable to sophisticated cyber criminals who change their tactics and techniques on a daily basis.

While there is no one measure that can counter politically motivated attacks, having a multi-layered approach to security practices will put organizations in a better position to mitigate attacks and reduce the impact of any breaches.

Download Agari’s executive brief on the Top Phishing Attacks of 2016 to learn more about best practices to stopping phishing attacks.

You can also check out the other posts in the Top Phishing Scams series:

Leave a Reply

Your email will not be published. All fields are required.

Agari Blog Image

August 13, 2019 Crane Hassold

The “I’s” Have It: How BEC Scammers Validate New Targets with Blank Emails

Have you ever received a blank email from someone you don’t know? If you have,…

Agari Blog Image

July 23, 2019 James Linton

Weaponizing Accounts Receivable: How Scammers Use Aging Reports to Target Your Customers

Receipts and invoices—two accounting powerhouses that require little introduction. But step a little further into…

Agari Blog Image

July 10, 2019 Ronnie Tokazowski

‘Til Death Do Us Part… Romance Scams and the BEC Game

When we think of business email compromise (BEC), the first thing that comes to mind…

Agari Blog Image

June 5, 2019 Crane Hassold

From One to Many: Scattered Canary Evolves from One-Man Startup to BEC Enterprise

There is no denying that business email compromise (BEC) is big business, with losses exceeding…

Agari Blog Image

April 25, 2019 Crane Hassold

Bitcoin: The Next Evolution in BEC Cash Out Methods?

Historically, business email compromise (BEC) threat actors have used wire transfers as a means to…

mobile image