Log In

In a year that has left us all feeling more vulnerable than ever, don’t let your inbox cause an ounce of extra stress. Stop those traps in their tracks and learn just how to spot a bad email in action. With our set of tips, discover just what to look for and exactly how to react as an email user. Protect yourself and your inbox from spam, phishing and malicious email.

The COVID-effect

As COVID-19 caused many of our daily tasks to move online, cyber criminals have been using the virus as a way to lure and trick users. Whether posing as a workmate, a COVID relief charity or even a health organization, 2020 saw cyber threats increase exponentially. Barracuda Networks found that phishing emails themed around the pandemic increased from 137 in January 2020 to 9,116 by the end of March—a growth rate of more than 600%. 

With the population being more dependent on email than ever, ensure you’re in the know before diving into your inbox. We’ve gathered a few of the emerging and growing trends in spam, phishing and harmful content in emails. 

COVID-19 Phishing

COVID-19 presented an opportunity for hackers like never before. Hackers created emails from government agencies and health organizations, requesting logins, password resets, presenting funding links and job opportunities during a time when many jobs were looking precarious. While others moved their office to home, COVID-19 phishing moved towards disguising emails to look like they were coming from your IT department.

While the pandemic exists, hackers will continue to adjust their methods to suit the situation. With sophisticated techniques that are ever-changing, users need to stay on top of what to look out for. During this COVID era, the most common phishing attacks were scamming, brand impersonation and business email compromise – with the goals being distributing malware, stealing credentials, and financial gain.

How to react:

Deceptive Phishing

On a broader scale, deceptive phishing is the most common type of phishing scam. Here fraudsters impersonate an existing company to steal personal data and login credentials. Cyber criminals often use a sense of urgency to cause panic and make users do as they ask. Here are some of the techniques most used in deceptive phishing:

How to react:

Scams

A technique targeting vulnerabilities and empathy, scams are a classic form of phishing, with new trends cropping up all the time. During COVID-19 there were trends selling masks, cures and vital information. Others claim foreign lottery wins, investment opportunities, outstanding invoices, or even send sextortion messages (messages claiming an attacker has obtained embarrassing information about you through search history or webcam footage).

Some scammers create company names that are oh-so-close to large existing companies, and some try to scare personal information out of you. Now’s the perfect time to make use of that spam folder in your inbox…

How to react:

Malware

Malware is any software designed to damage a computer, server, client or network. Malware includes viruses, worms, Trojan horses, ransomware, spyware and more. It can be installed on your computer through an email.

One form of malware that’s fast becoming a malicious email trend is Emotet. Emotet is a banking Trojan that collects financial information by injecting computer code into an infected computer, allowing data to be stolen. Emails with this particular Trojan often feature links or attachments that look like genuine invoices, financial documents, shipping information, resumes, scanned documents, or information on COVID-19 – but are all fake.

The embedded malicious code often acts as a downloader for even more malicious code, and some is designed to steal login credentials for email accounts on infected systems. These credentials can then be given to a spam bot that sends out emails to spread the malware further. Emotet can even use content of an existing email conversation to make an email look legitimate.

How to react:

Not all trends are a good idea to jump on, especially those of the malicious email variety! Ensure you and your workplace know just what to look out for in this ever-changing landscape of email. Take that extra time to scrutinize your inbox and keep your computer properly protected.

Leave a Reply

Your email address will not be published. Required fields are marked *

Ready for better email delivery?

Try SMTP2GO free for as long as you like:

Try SMTP2GO Free → Paid plans available for over 1,000 emails/month.
×

Ready for better email delivery?
Try SMTP2GO free for as long as you like:

Try SMTP2GO Free See Pricing