CHKP Check Point Software Technologies Ltd.

LinkedIn Still Number One Brand to be Faked in Phishing Attempts while Microsoft Surges up the Rankings to Number Two Spot in Q2 Report

LinkedIn Still Number One Brand to be Faked in Phishing Attempts while Microsoft Surges up the Rankings to Number Two Spot in Q2 Report

Check Point Research issues its Q2 Brand Phishing Report, highlighting the brands that cyber criminals most often imitate to trick people into giving up their personal data 

SAN CARLOS, Calif., July 19, 2022 (GLOBE NEWSWIRE) -- Check Point Research (CPR), the Threat Intelligence arm of (NASDAQ: CHKP) and a leading provider of cyber security solutions globally, has published its Brand Phishing Report for Q2 2022. The report highlights the brands that were most frequently imitated by cybercriminals in their attempts to steal individuals’ personal information or payment credentials over the quarter.

The social media platform LinkedIn continued its reign as the most imitated brand after entering the rankings for the first-time in Q1. While its share has dropped slightly; down from 52% in Q1 to 45% of all phishing attempts in Q2, this is still a worrying trend that highlights the ongoing risks facing users of the trusted social media platform. Social networks generally continue to be the most imitated category, followed by technology which, this quarter, took over second place from shipping.

The most striking rise in technology household names being exploited was Microsoft, making up 13% of all brand phishing attempts, more than double the amount in the previous quarter and edging DHL into third place with 12%. Some new brands entering the top 10 were: Adidas, Adobe and HSBC although all on low single digits, these brands will be followed closely by researchers in Q3 for any developments.

The increase in the use of Microsoft related scams is a danger to both individuals and organizations. Once someone has hold of your account login details, they have access to all the applications behind it, such as Teams and SharePoint, as well as the obvious risk of compromise to your Outlook email account. The report highlights a specific example of an Outlook phishing email luring users to a fraudulent Outlook web page with the subject line: “[Action Required] Final Reminder - Verify your OWA Account now”, asking the victim to enter their login credentials.

LinkedIn based phishing campaigns imitated the style of communication of the professional social media platform with malicious emails using subjects like: “You appeared in 8 searches this week” or “You have one new message” or “I’d like to do business with you via LinkedIn.” Although appearing to come from LinkedIn they used an email address that was completely different to that of the brand.

Meanwhile, with the relentless trend to online shopping, it is not surprising that Q2 also saw shipping company DHL being faked in 12% of all phishing attacks. The report specifically references a tracking related phishing scam, with the subject line “Incoming Shipment Notification”, enticing the consumer to click on a malicious link.

“Phishing emails are a prominent tool in every hacker’s arsenal as they are fast to deploy and can target millions of users at relatively low cost,” said Omer Dembinsky, Data Research Group Manager at Check Point Software. “They give cybercriminals the opportunity to leverage the reputation of trusted brands to give users a false sense of security that can be exploited to steal personal or commercial information for financial gain.

“The criminals will use any brand with sufficient reach and consumer trust. Hence, we see hackers expanding their activities with the first appearance of Adidas, Adobe, and HSBC in the top 10, The hackers trade on our trust in these brands and that very human instinct for ‘the deal.’ There’s a reason the hackers continue to use brand-based phishing. It works. So, consumers need to act with caution and look out for tell-tale signs of the fake email, like poor grammar, spelling mistakes or strange domain names. If in doubt head for the brand’s own website rather than clicking any links.”

A brand phishing attack not only takes advantage of our implicit trust in a familiar brand, adopting its brand imagery often using a similar URL, it also plays on human emotions, like the fear of missing out on a discount. The sense of urgency this creates leads consumers to click in haste without first checking if the email is from the brand in question. This could lead to them inadvertently downloading malware or handing over precious personally identifiable information which can give criminals access to their entire online world and potential financial loss.

Top phishing brands in Q2 2022 

Below are the top brands ranked by their overall appearance in brand phishing attempts: 

  1. LinkedIn (45%)
  2. Microsoft (13%)
  3. DHL (12%)
  4. Amazon (9%)
  5. Apple (3%)
  6. Adidas (2%)
  7. Google (1%)
  8. Netflix (1%)
  9. Adobe (1%)
  10. HSBC (1%)

LinkedIn Phishing Email- Account Theft Example

During the Q2 of 2022, we observed a malicious phishing email that used LinkedIn’s branding. The phishing email was sent from a webmail address and spoofed to appear as if it was sent from “LinkedIn Security ( [.]ec)”. The email contained the subject “LinkedIn Notice!!!”, and the content tries to entice the victim to click on a malicious link under the guise of updating their LinkedIn account version. This click will lead to the link “[.]webnode[.]page/”, where the victim is then required to enter their LinkedIn account information.

DHL Phishing Email – Account Theft Example

During the second quarter of 2022, we observed a malicious phishing email that used DHL’s branding. The phishing email was sent from a webmail address and spoofed to appear as if it was sent from “DHL EXPRESS (track@harbormfreight[.]com)”. The email contained the subject line “Incoming Shipment Notification”, and the content tries to persuade the victim to click on a malicious link that leads them to “https:// delicate-sea-3417.on.fleek.co”. The victim is then required to enter their username and password.

Outlook Phishing Email - Account Theft Example

In this phishing email, we see an attempt to steal a user’s Outlook account information. The email which was sent from the email address “Outlook OWA ( )”, contained the subject line “[Action Required] Final Reminder - Verify your OWA Account now”. The attacker was trying to lure the victim to click on a malicious link, which redirects the user to a fraudulent Outlook web app login page. In the malicious link (jfbfstxegfghaccl-dot-githu-dir-aceui-xoweu[.]ue[.]r[.]appspot[.]com), the user needed to enter their username and password.

Amazon Phishing Email - Billing Information Theft Example

In this phishing email, we see an attempt to steal a user’s billing information. The email which was sent from the email address “Amazon (fcarvache@puertoesmeraldas[.]gob[.]ec)”, contained the subject line “Your amazon account verification”. The title of the email and its contents are an attempt by the attacker to entice the victim to click on a malicious link “[.]com”, which redirects the user to a fraudulent page asking to enter billing information.

Follow Check Point Research via:

Blog:  

Twitter:  

About Check Point Research 

Check Point Research provides leading cyber threat intelligence to Check Point Software customers and the greater intelligence community. The research team collects and analyzes global cyber-attack data stored on ThreatCloud to keep hackers at bay, while ensuring all Check Point products are updated with the latest protections. The research team consists of over 100 analysts and researchers cooperating with other security vendors, law enforcement and various CERTs. 

About Check Point Software Technologies Ltd.

Check Point Software Technologies Ltd. () is a leading provider of cyber security solutions to corporate enterprises and governments globally. Check Point Infinity´s portfolio of solutions protects enterprises and public organizations from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware and other threats. Infinity comprises three core pillars delivering uncompromised security and generation V threat prevention across enterprise environments: Check Point Harmony, for remote users; Check Point CloudGuard, to automatically secure clouds; and Check Point Quantum, to protect network perimeters and datacenters, all controlled by the industry’s most comprehensive, intuitive unified security management. Check Point protects over 100,000 organizations of all sizes.  

MEDIA CONTACT:

Emilie Beneitez Lefebvre

Check Point Software Technologies Technologies         

INVESTOR CONTACT: 

Kip E. Meintzer 

Check Point Software Technologies         

 



EN
19/07/2022

Underlying

To request access to management, click here to engage with our
partner Phoenix-IR's CorporateAccessNetwork.com

Reports on Check Point Software Technologies Ltd.

Check Point Software Technologies Ltd: 1 director

A director at Check Point Software Technologies Ltd sold 141,288 shares at 227.800USD and the significance rating of the trade was 100/100. Is that information sufficient for you to make an investment decision? This report gives details of those trades and adds context and analysis to them such that you can judge whether these trading decisions are ones worth following. Included in the report is a detailed share price chart which plots discretionary trades by all the company's directors over t...

 PRESS RELEASE

Dangerous Blind Spots Costing Enterprises Time, Trust, and Agility Exp...

Dangerous Blind Spots Costing Enterprises Time, Trust, and Agility Exposed in Check Point’s 2025 Cloud Security Report Report finds 65% of organizations suffered a cloud-security incident in the past year — yet only 6% remediated it within an hour REDWOOD CITY, Calif., June 05, 2025 (GLOBE NEWSWIRE) -- (NASDAQ: CHKP), a pioneer and global leader of cyber security solutions, today released its 2025 Cloud Security Report. Based on a global survey of more than 900 CISOs and IT leaders, the report reveals systemic weaknesses, including alert fatigue, fragmented toolsets, and a widespread i...

 PRESS RELEASE

Check Point Software Technologies Recognized as a Best Company to Work...

Check Point Software Technologies Recognized as a Best Company to Work For by U.S. News & World Report REDWOOD CITY, Calif., June 02, 2025 (GLOBE NEWSWIRE) -- (NASDAQ: CHKP), a pioneer and global leader of cyber security solutions, today announced that U.S. News & World Report has named the company among its . In addition, Check Point was also recognized as a Best Company to Work For in the IT industry. This recognition highlights Check Point’s commitment to fostering a culture of innovation, inclusion, and continuous growth across its global workforce. The U.S. News rankings evaluate c...

 PRESS RELEASE

Check Point Accelerates Threat Detection and Response with AI-Powered ...

Check Point Accelerates Threat Detection and Response with AI-Powered Security Management for the Modern Enterprise Next-generation Smart-1 Management Appliances boost efficiency delivering 2X expansion in managed gateways and AI-powered tools for automation, policy insights, and orchestration REDWOOD CITY, Calif., May 28, 2025 (GLOBE NEWSWIRE) -- (NASDAQ: CHKP), a pioneer and global leader of cyber security solutions, today announced the launch of its next generation Smart-1 Management Appliances, delivering 2X increase in managed gateways and up to 70% higher log rate, with AI-powere...

 PRESS RELEASE

AI-Powered Defense at the Edge: Check Point Launches New Branch Office...

AI-Powered Defense at the Edge: Check Point Launches New Branch Office Security Gateways with 4x Faster Threat Prevention Performance Optimized for SD-WAN, New Quantum Force Branch Office Firewalls deliver protections against growing attacks on branch offices and superior end user experience REDWOOD CITY, Calif., May 28, 2025 (GLOBE NEWSWIRE) -- (NASDAQ: CHKP), a pioneer and global leader of cyber security solutions, today announced major advancements to its family of All Quantum Force Security Gateways for the data center and perimeter are receiving a 15%-25% performance boost in thr...

ResearchPool Subscriptions

Get the most out of your insights

Get in touch