Most lures imitated applications (Adobe, DocuSign and Office 365), social media
(Facebook), cloud storage (Dropbox, OneDrive and Google), and shipping companies (FedEx). The greatest success rate results from the generic invoice lure. Rather than phishing for credentials, this email attack attaches a malicious document disguised as an invoice.
Click Image to View Larger
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.