Employees Are Top Targets of Phishing Emails
09 Oktober 2012
Download the infographic: Covert Arrivals: Targeted Attacks via Employee Inboxes
Spear phishing emails usually come posing as legitimate and basic messages employees see day after day. If sent to tired or unknowing recipients who give in to their lure, these messages can easily be the bearers of sophisticated malware designed to lay in stealth while eventually siphoning off sensitive company information.
Notably, most work emails sent daily revolve around sensitive compensation issues, merger and acquisition activities, potential layoffs and reorganizations, product road maps, and budget plans. Attackers can simply draft a message in any of these common contexts and easily gain the attention of its recipient.
It’s also common for malware in spear phishing emails to exploit a vulnerability, drop a file, download a file, or communicate with a remote server—any which way, it can then start to gather information about a company and scour the network for available information for sabotage, espionage, or monetary purposes.
See how email threats work for targeted attack campaigns on this infographic.
HIDE
Like it? Add this infographic to your site:
1. Click on the box below. 2. Press Ctrl+A to select all. 3. Press Ctrl+C to copy. 4. Paste the code into your page (Ctrl+V).
Image will appear the same size as you see above.
- Update on Exposed MCP Servers: The Threat Widens to the Cloud
- From Stealers to Systems: The New Model of Credential Theft
- Edge Under Siege: How State-Sponsored Actors Exploit Your Perimeter
- 2025 APT Report: Staying Ahead of the Modern Threat Landscape
- Sockpuppeting: How a Single Line Can Bypass LLM Safety Guardrails
Fault Lines in the AI Ecosystem: TrendAI™ State of AI Security Report
It’s By Design: The Use-After-Free of Azure Cloud
Ransomware Spotlight: Agenda
Guarding LLMs With a Layered Prompt Injection Representation