CHKP Check Point Software Technologies Ltd.

Social Now Among Top Three Sectors to be Imitated in Phishing Attempts in Q3 2021

Social Now Among Top Three Sectors to be Imitated in Phishing Attempts in Q3 2021

Check Point Research issues Q3 Brand Phishing Report, highlighting the leading brands that hackers imitated in attempts to lure people into giving up personal data

SAN CARLOS, Calif., Oct. 19, 2021 (GLOBE NEWSWIRE) -- Check Point Research (CPR), the Threat Intelligence arm of (NASDAQ: CHKP), a leading provider of cyber security solutions globally, has published its new Brand Phishing Report for Q3 2021. The report highlights the brands which were most frequently imitated by criminals in their attempts to steal individuals’ personal information or payment credentials during July, August and September.

In Q3, Microsoft continued its reign as the brand most frequently targeted by cybercriminals, albeit at a slightly lower rate. Twenty-nine percent of all brand phishing attempts were related to the technology giant, down from 45% in Q2 2021, as threat actors continue to target vulnerable, distributed workforces during the COVID-19 pandemic. Amazon has replaced DHL in second position, accounting for 13% of all phishing attempts versus 11% in the previous quarter, as criminals look to take advantage of online shopping in the run-up to the holiday season.

The report also reveals that, for the first time this year, social was among the top three sectors to be imitated in phishing attempts, with WhatsApp, LinkedIn and Facebook all appearing in the top ten list of most imitated brands.

“Threat actors are constantly trying to innovate their attempts to steal peoples’ personal data by impersonating leading brands. For the first time this year, social channels have become one of the top three categories exploited by cybercriminals, no doubt in an attempt to take advantage of the increasing number of people working and communicating remotely in the wake of the pandemic,” said Omer Dembinsky, Data Research Group Manager at Check Point Software. “Unfortunately, there’s only so much these brands can do to help combat phishing attempts. So often, it’s the human element that often fails to pick up on a misspelt domain, an incorrect date, or another suspicious detail in a text or email. As always, we encourage users to be cautious when divulging their data, and to think twice before opening email attachments or links, especially emails that claim to be from companies such as Amazon, Microsoft or DHL as they are the most likely to be imitated. Following the data from Q3, we’d also urge users to be vigilant when it comes to any emails or other communications that appear to be from social media channels such as Facebook or WhatsApp.”

In a brand phishing attack, criminals try to imitate the official website of a well-known brand by using a similar domain name or URL and web-page design to the genuine site. The link to the fake website can be sent to targeted individuals by email or text message, a user can be redirected during web browsing, or it may be triggered from a fraudulent mobile application. The fake website often contains a form intended to steal users’ credentials, payment details or other personal information.

Top phishing brands in Q3 2021

Below are the top brands ranked by their overall appearance in brand phishing attempts:

  1. Microsoft (related to 29% of all phishing attacks globally)
  2. Amazon (13%)
  3. DHL (9%)
  4. Bestbuy (8%)
  5. Google (6%)
  6. WhatsApp (3%)
  7. Netflix (2.6%)
  8. LinkedIn (2.5%)
  9. Paypal (2.3%)
  10. Facebook (2.2%)

Google Phishing Email - Credentials Theft Example

During this quarter, we witnessed a malicious phishing mail that was trying to steal access credentials to a Google account. The email, which was sent from the email address Google (no-reply@accounts[.]google[.]com), contained the subject “Help strengthen the security of your Google Account”. In the following fraudulent email we notice the year wasn’t changed (“2020 Google”). The attacker was trying to lure the victim to click on a malicious link (-ac1182f5-3c35-4648-99ab-275a82a80541[.]eastus[.]cloudapp[.]azure[.]com) which redirects the user to a fraudulent malicious login page that looks like the real Google login website. In the malicious link, the user needed to enter their Google account details.



LinkedIn Phishing Email - Account Theft Example

In this phishing email, we see an attempt to steal a user’s LinkedIn account information. The email which was sent from the email address Linkedln (linkedin@connect[.]com), contained the subject “You have a new Linkedln business invitation from *****”. The attacker was trying to lure the victim to click on a malicious link, which redirects the user to a fraudulent LinkedIn login page. In the malicious link ([.]coversforlife[.]com/wp-admin/oc/nb/LinkedinAUT/login[.]php), the user needed to enter their username and their password. On the fraudulent website we can see that the year wasn’t changed (“2020 LinkedIn”).

As always, we encourage users to be cautious when divulging personal data and credentials to business applications or websites, and to think twice before opening email attachments or links, especially emails that claim to be from companies such as Amazon, Microsoft or DHL, as they are the most likely to be impersonated.

Follow Check Point Research via:

Blog:

Twitter:

About Check Point Research

Check Point Research (CPR) provides leading cyber threat intelligence to Check Point Software customers and the greater intelligence community. The research team collects and analyzes global cyber-attack data stored on ThreatCloud to keep hackers at bay, while ensuring all Check Point solutions are updated with the latest protections. The research team consists of over 100 analysts and researchers cooperating with other security vendors, law enforcement and various CERTs.

About Check Point Software Technologies Ltd. 

Check Point Software Technologies Ltd. () is a leading provider of cyber security solutions to corporate enterprises and governments globally.  Check Point Infinity´s portfolio of solutions protects enterprises and public organisations from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware and other threats. Infinity comprises three core pillars delivering uncompromised security and generation V threat prevention across enterprise environments: Check Point Harmony, for remote users; Check Point CloudGuard, to automatically secure clouds; and Check Point Quantum, to protect network perimeters and datacenters, all controlled by the industry’s most comprehensive, intuitive unified security management. Check Point protects over 100,000 organizations of all sizes.

MEDIA CONTACT:INVESTOR CONTACT:
Laura Martinez HidalgoKip E. Meintzer
Check Point Software TechnologiesCheck Point Software Technologies


EN
19/10/2021

Underlying

To request access to management, click here to engage with our
partner Phoenix-IR's CorporateAccessNetwork.com

Reports on Check Point Software Technologies Ltd.

 PRESS RELEASE

Check Point Software Achieves the Highest Security Effectiveness at 99...

Check Point Software Achieves the Highest Security Effectiveness at 99.59% in NSS Labs Enterprise Firewall Test As AI transforms cyber threats, NSS Labs recognition affirms Check Point’s leadership in prevention-first security, outperforming the competition REDWOOD CITY, Calif., Nov. 05, 2025 (GLOBE NEWSWIRE) -- (NASDAQ: CHKP), a pioneer and global leader of cyber security solutions, today announced it has been named as a Recommended vendor in the NSS Labs 2025 Enterprise Firewall Comparative Report, with the highest security effectiveness score. Achieving an outstanding 99.59% overall...

 PRESS RELEASE

Check Point Redefines AI Security for Enterprises with AI Cloud Protec...

Check Point Redefines AI Security for Enterprises with AI Cloud Protect Powered by NVIDIA BlueField AI Cloud Protect safeguards AI models, workloads, and agentic AI applications from the latest cyber threats REDWOOD CITY, Calif., Oct. 28, 2025 (GLOBE NEWSWIRE) -- (NASDAQ: CHKP), a pioneer and global leader of cyber security solutions, today announced it is working with NVIDIA to deliver an integrated security solution built for AI factories. is now available for on-premises enterprise deployments to secure AI model development, agentic AI applications, and inference workloads with zer...

Anish Jog ... (+4)
  • Anish Jog
  • Daniel Ives
  • Sam Brandeis
  • Steven Wahrhaftig

Solid Results with Strength Across Portfolio; Pipeline Continues to Gr...

A Closer Look at FY3Q25 (September) ResultsRevenueTotal revenue of $677.5 million (up 7% y/y) was above the midpoint of the company’s guidance range of $657.0 million and $687.0 million and above the Street’s $673.3 million estimate driven by increased demand across the Hybrid-Mesh-Network portfoli

 PRESS RELEASE

Check Point Software Reports 2025 Third Quarter Financial Results

Check Point Software Reports 2025 Third Quarter Financial Results Strong Demand Drives 20 Percent Calculated Billings Growth Year Over Year TEL AVIV, Israel, Oct. 28, 2025 (GLOBE NEWSWIRE) -- . (NASDAQ: CHKP), today announced its financial results for the quarter ended September 30th, 2025. Third Quarter 2025 Financial Highlights: Calculated Billings*: $672 million, a 20 percent increase year over yearTotal Revenues: $678 million, a 7 percent increase year over yearSecurity Subscriptions Revenues: $305 million, a 10 percent increase year over yearGAAP Operating Income: $199 million, r...

ResearchPool Subscriptions

Get the most out of your insights

Get in touch