Cybercriminals Impersonate These Well-Known Companies in Phishing Emails

Suspicious emails coming through to your mailbox? Does the email claim to be from Microsoft and need your login information to fix an unfounded issue? Cybercriminals increasingly send victims emails such as these, impersonating large-scale companies to appear legitimate, and it’s not only Microsoft impersonations. From Facebook to Amazon, to Paypal and Netflix, it’s a good idea to double check where those emails are actually coming from.

Cybersecurity company Vade Secure conducted an analysis of companies that were most impersonated and found that Microsoft was one of the most used brands in phishing schemes, with an increase of 15.5% since the previous year. Due to the popularity in Outlook mail and Office365, Microsoft is a widely popular impersonation target. With businesses and corporations relying on Office365 for keeping restricted and sensitive files, hackers look for any means necessary to get their hands on such valuable information. Access to Office365 accounts can also open more doors for targeting other users to gain access to more accounts. 

Illegitimate emails claiming to be from Microsoft ask users to log in via a link provided by the hacker and open up a spoof page that mirrors the actual website, prompting users to input their login credentials and submitting it to the cybercriminal.

Paypal comes out as the second most common company to be used in phishing schemes, as the brand is easily recognizable by many. While Paypal still remains a popular choice in targeting victims with fake emails, malicious URL targeting has been declining.

The third most popular company to be used in a phishing attack is Facebook, as Vade Secure tracked a 176% increase in fake URL use to target users’ social media accounts. The social network acts as a perfect opportunity for hackers to send phishing messages to victims’ friends. Facebook access can particularly be harmful if victims have third party applications connected, to which cybercriminals can also access. 

The report further lists other brands like Netflix, Bank of America, and Apple that are also used in these emails. Amazon is now the eighth most popular brand for phishing use by hackers, and its use has grown over 400% in just a year, this likely due to the popularity in Amazon Prime Day and the extensive number of shoppers on the site. 

Phishing attacks are continuously utilized by hackers due to the cheap and easy way it reaches a mass of users. If you receive any such suspicious emails in your inbox, mark it as spam immediately. If you are ever unsure about your account, log in through the company’s official site instead of clicking on malicious email links.

Cybercrime Groups Still Operate Over Facebook Platform

Cisco’s Talos threat intelligence researchers have identified an ongoing cybersecurity problem that looms within Facebook: dozens of groups created to trade and purchase spamming and phishing services.

The groups have been noted as partaking in “shady (at best) and illegal (at worst) activities,” using easily identifiable and locatable names such as “Spammer & Hacker Professional” or “Facebook hack (Phishing)” and yet remained up and active without intervention from Facebook itself.

Researchers at Cisco have found approximately 74 groups that partook in cybercriminal activities such as selling stolen login and account credentials and banking information. Others would sell tools for email spamming. The groups had amassed around 385,000 members in total and were easy to search for through simple keyword phrases like “spam” and “carding” when one looked into Facebook group search.

Cisco’s Talos team had notified Facebook about the hacker groups through abuse reporting, to which Facebook had responded by removing a few of the groups while keeping others up and only removing some posts deemed as a violation of policy. After the Talos researchers spoke directly with Facebook’s security team, the groups were taken down, but the issue of cybercrime on the social media site still remains a prevalent problem as new groups always seem to emerge.

Such activity isn’t new to the Facebook community. Groups like these have been operating for years on the social media platform. Brian Krebs from KrebsonSecurity had found 120 cybercrime groups back in 2018, for example, notifying Facebook in order to have the groups removed.

A spokesperson told The Verge that “[Facebook] know[s] [it] needs to be more vigilant and [they’re] investing heavily to fight this type of activity.”

Verizon Customers Will Receive Free Spam Call Protection

Image Source:

Beginning this year in March, Verizon is set to offer its services of spam and robocall protection to its customers–for free! Their previous subscription service offered their subscribers the option to utilize the Call Filter Service feature for a fee of $2.99 per month while other carriers such as AT&T and T-Mobile had been offering it for free already.

According to a statement from Verizon, customers would receive an alert on their phone screens if an incoming call was considered malicious by displaying “SPAM?” over Caller ID. Since this service was first offered, Verizon was able to notify its “customers to nearly 1 billion potentially malicious robocalls,” says Senior Vice President of Network Operations Joe Russo.

With their new Call Filter Service, Verizon is now able to identify nearly 300 million spam calls, with constant updates still in the works. iPhone and Android users–as well as other customers using various smartphones that support this spam blocking feature–will have access to the Call Filter Service starting in March.

Spam calling has become more and more difficult to detect by customers as spoof calls look more like local calls. Due to a heavy volume of spam calls reaching consumers, the Federal Communications Commission called for the STIR/SHAKEN mandate that requires mobile carriers to help put a stop to robocalling by this year. T-Mobile responded to the FCC’s demands by implementing a call verification feature that helps customers in distinguishing real calls from spam ones.

Verizon has stated that “[t]here will be more information on how to sign up for the free service as [the launch date]…get[s] closer.”

DDoS Attacks Slow Entire Internet

This week, users worldwide wonder why their Internet connections are slow, or why access to certain sites is temporarily unavailable. The cause of the problem is that anti-spam organization, Spamhaus, and Dutch hosting company, Cyberbunker, are involved in a cyber-attack of such large scale that Internet users are feeling the effects.


Cyberbunker, known for its unique facility, a former NATO command bunker, was recently put on Spamhaus’ blacklist, used by email providers to filter out spam messages.  Cyberbunker has admitted to providing its services to any organization, short of terrorists and child pornographers, yet has retaliated against Spamhaus. Spamhaus still distributed its blacklists, but experienced a Distributed Denial of Service (DDoS) attack starting on March 19.

For some perspective: While prior attacks against major banks reached a magnitude of about 50 billion bits per second, the current attacks use a data stream of 300 billion bits per second.


Most DDoS attacks only affect a few networks, but in this case, the use of a Domain Name System (DNS) flood has affected millions of Internet users. The attackers used botnets to send messages appearing to come from Spamhaus to the millions of computers making up the DNS, whose servers then amplified these messages which are sent as false requests to Spamhaus’ computers until its servers are overwhelmed and become unreachable. The use of the DNS makes it impossible to stop the attacks without halting the Internet worldwide.

Several cyber-police forces are currently investigating the attacks.