Microsoft and Google are top brands misused to scam users


Online users are increasingly becoming targets of phishing attacks, with hackers exploiting the names of leading technology companies to lure unsuspecting victims into scams that result in financial loss or malware infections. According to research from Check Point technology, scammers are prominently using the names of Microsoft and Google to orchestrate phishing attacks. By creating fake websites resembling those of reputable brands, cybercriminals trick users into divulging sensitive information such as passwords and credentials.

The top 10 most imitated brands in phishing attacks are as follows:

Microsoft, used in approximately 38% of scams
Google, utilized in about 11% of scams
LinkedIn – 11%
Apple Inc. – 5%
DHL – 5%
Amazon – 3%
Facebook – 2%
Wells Fargo – 2%
Airbnb – 1%
Roblox – 1%

This tactic plays on psychological manipulation, enticing victims to click on fake URLs resembling legitimate websites. To avoid falling victim to such scams, users should scrutinize website URLs, ensuring they are protected by HTTPS before proceeding with any activity online. Additionally, it’s crucial to employ security software that receives regular updates, enhancing protection against phishing attempts.

Implementing multifactor authentication adds an extra layer of security to online accounts, making it more challenging for hackers to compromise them. Regularly backing up data is another essential measure to mitigate the impact of successful phishing attacks.

For individuals who have unfortunately fallen prey to phishing scams, resources such as offer guidance on steps to take to minimize damage and further safeguard personal information. Reporting phishing attempts to reputable organizations like the Anti-Phishing Working Group (APWG) or the Federal Trade Commission (FTC) is vital in combating cyber threats and protecting others from similar scams.

Naveen Goud is a writer at Cybersecurity Insiders covering topics such as Mergers & Acquisitions, Startups, Cyber Attacks, Cloud Security and Mobile Security

No posts to display