Welcome to IT-Branschen – The Channel for IT News, Cybersecurity and Digital Trends

For Companies, Suppliers and Decision Makers in the IT Industry

Digital strategy and insights for decision-makers in the IT industry

Subscribe

Stay up to date with the most important news

By pressing the Subscribe button, you confirm that you have read and agree to our privacy policy and terms of use
Contact us

Cybercriminals manipulate URLs to trick users

Cybercriminals manipulate URLs to trick users Cybercriminals manipulate URLs to trick users

The IT security company Check Point Software has recently drawn attention to a phishing campaign in which cybercriminals manipulate URL information to hide malicious links. Researchers have discovered around 200,000 email phishing attempts that have used this method.

Global spread and scope

The campaign, which was first detected on January 21, is still ongoing, although the daily volume of phishing attempts has decreased since then. Globally, 75 percent of these emails were distributed in the United States, followed by 17 percent in EMEA region and 5 percent in Canada. The actors do not seem to target any specific industries, but aim to attack as many businesses and individuals as possible – often those without sufficient cybersecurity protection, resulting in a wide range of vulnerable victims.

Sophisticated phishing methods

The methods used by cybercriminals are sophisticated, making it difficult for users to identify the danger before it is too late – despite increased awareness. cybersecurityThese sophisticated methods highlight how traditional means of identifying URL threats are increasingly inadequate against modern phishing campaigns.

Advertisement

How businesses can protect themselves

Businesses, as well as individuals, should take steps to reduce the risk of being targeted by phishing scams. Regularly updating systems to plug security holes and implementing advanced security solutions are just a few ways to minimize the risks.

The USA as an indicator of the threat landscape

  • Given the cyberattacks and threats that occur in the US, we can get a good indication of what could potentially affect us here in Sweden, says Fredrik Sandstrom, security expert at Check Point SoftwareThe US is often at the forefront of developments in both threats and cybersecurity. It is therefore important to closely monitor developments in the world in order to be able to prepare and take measures to minimize the risk of attacks.

Stay up to date with the most important news

By pressing the Subscribe button, you confirm that you have read and agree to our privacy policy and terms of use
Advertisement