1
http://www.proofpoint.com/office365 Hiding in plain sight You can train people to be skeptical before they click, but sophisticated social engineering techniques can snare even savvy users. URLs in emails are easily masked, and the sites they link to can change over time. Here’s what make URLs so hard to unmask: 42% of clicks on malicious URLs come from mobile devices, where the full URL can be hard to make out. URL shorteners such as bit.ly makes unmasking the URL even trickier. URLs may be hiding in encrypted attachments. URLs to pages often contain malware, sometimes after delivery. 1 The clicks keep on coming The longer a malicious URL sits in the inbox, the more likely it will be clicked. Document-sharing lures are consistently effective. URLs often link to malicious files in Google Drive, Adobe Creative Cloud, and Dropbox. Top click rates include: OneDrive Phishing: Microsoft Excel Online Phishing: Microsoft OWA Phishing: of clicks happen within 25% 50% of clicks happen within 90% of clicks happen within Human Nature: How Attackers Target People Through Microsoft Office 365 Today’s attacks target people, not just infrastructure. As organizations migrate to the cloud, attackers are finding new ways to target them. Malicious URLs sent to Office 365 users have become an increasingly effective method of attack. 14% click-thru rate click-thru rate 2.8% 0 100 10 minutes 60 MINUTES 24 hours click-thru rate 13% Sharing is scaring Connect with confidence Take a proactive, real-time, multilayered approach to unveil and stop attacks before they reach your Office 365 users. Respond effectively with actionable insight. Proofpoint protects across email, OneDrive for Business, Sharepoint Online, Skype, Yammer, and even SaaS applications beyond Office 365. To learn more, visit www.proofpoint.com/office365 1 Proofpoint. “Magnitude Actor Adds a Social Engineering Scheme for Windows 10.” March, 2017.

Human Nature: How Attackers Target People Through Microsoft Office 365

Embed Size (px)

Citation preview

Page 1: Human Nature: How Attackers Target People Through Microsoft Office 365

http://www.proofpoint.com/o�ce365

Hiding in plain sightYou can train people to be skeptical before they click, but sophisticated

social engineering techniques can snare even savvy users. URLs in emails are easily masked, and the sites they link to can change over

time. Here’s what make URLs so hard to unmask:

42%of clicks on malicious

URLs come from mobile devices, where the full

URL can be hard to make out.

URL shorteners such as bit.ly makes unmasking the URL even trickier.

URLs may be hiding in encrypted

attachments.

URLs to pages often contain malware, sometimes after delivery.1

The clicks keep on comingThe longer a malicious URL sits in the inbox,

the more likely it will be clicked.

Document-sharing lures are consistently effective. URLs often link to malicious files in Google Drive,

Adobe Creative Cloud, and Dropbox. Top click rates include:

OneDrivePhishing:

Microsoft Excel Online Phishing:

Microsoft OWA Phishing:

of clicks happen within

25% 50%of clicks happen within

90%of clicks happen within

Human Nature:

How AttackersTarget People ThroughMicrosoft Office 365

Today’s attacks target people, not just infrastructure. As organizations migrate to the cloud, attackers are finding new ways to target them.

Malicious URLs sent to Office 365 users have become an increasingly effective method of attack.

14%click-thru rate click-thru rate

2.8%

0

100

10minutes

60 MINUTES

24hours

click-thru rate13%

Sharing is scaring

Connect with confidenceTake a proactive, real-time, multilayered approach to unveil and stop

attacks before they reach your Office 365 users. Respond effectively with actionable insight. Proofpoint protects across email, OneDrive for

Business, Sharepoint Online, Skype, Yammer, and even SaaS applications beyond Office 365.

To learn more, visit www.proofpoint.com/office365

1 Proofpoint. “Magnitude Actor Adds a Social Engineering Scheme for Windows 10.” March, 2017.