Contactez-nous Suivez-nous sur Twitter En francais English Language

De la Théorie à la pratique

Freely subscribe to our NEWSLETTER

Newsletter FR

Newsletter EN



DHL attracted 23% of all Q4 2021 phishing attempts

February 2022 by Check Point Software

DHL attracted 23% of all Q4 2021 phishing attempts. That’s according to recent data compiled by That figure made it the most alluring to phishers. It also represented a 14% increase from Q3 stats earning the firm the unenviable tag. The logistics and shipments firm replaced Microsoft at the index’s helm in doing so.

Check Point Software’s Omer Dembinsky links DHL’s attractiveness to phishers to an increase in new and vulnerable online customers during the year’s busiest retail period. He holds that many older customers were purchasing online for the first time. Thus they might not have known how to check for delivery confirmation emails or tracking updates.

Falling to the second spot was Microsoft, which had dominated the Q3 rankings. Then it had attracted up to 29% of all the attacks. But the software giant experienced some reprieve in Q4. Its share of phishing attempts declined by 9% to stand at 20%.

Social media and phishing

Additionally, social platforms remained prime targets for phishing schemes. WhatsApp commanded the third spot in those Q4 rankings after drawing 11% of the pursuits. Also, LinkedIn rose from eighth to fifth place, drawing 8% of all phishing-related attempts. But Facebook dropped from the top 10 brands that appeal to phishers.

Omer attributes that to the opportunistic nature of fraudsters in the cyber scene. They often explore market trends to impersonate prominent companies. This way, phishers may succeed in stealing personal information or deploying malware on a user’s device.

He adds that criminal actors will continue targeting social media for their exploitation. They target online users who, because of working remotely and the COVID-19’s effects, rely on social media channels.

The phisher’s Motive

Phishers strive to replicate legitimate websites of prominent brands. They do so by employing domain names or URLs which mimic the actual sites. Moreover, they can design their web pages to resemble legitimate ones.

Attackers can provide bogus web links in several ways. The first one is via emails or texts. Alternatively, the scammers can redirect you while you’re browsing the internet. Moreover, the exploit may come as a malicious app. All these means direct you to a sham site where the bad actors steal your confidential information.

See previous articles


See next articles