Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behaviour or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
Cookie Policy Privacy Policy {title}
Skip to content

CloudTech is part of the TechForge Publications series

  • View All
  • AI News
  • The Block
  • Developer
  • Edge Computing News
  • IoT News
  • Marketing Tech
  • TechHQ
  • Tech Wire Asia
  • Sustainability News
  • Telecoms
  • View All
  • AI News
  • The Block
  • Developer
  • Edge Computing News
  • IoT News
  • Marketing Tech
  • TechHQ
  • Tech Wire Asia
  • Sustainability News
  • Telecoms

TechForge

  • Search
  • News
  • Categories
    • Applications
      • Blockchain
      • Containers
      • Data Centres
      • Infrastructure as a Service
      • Platform as a Service
      • Software as a Service
      • Virtualisation
    • Companies
      • Alibaba Cloud
      • AWS
      • Google Cloud
      • Microsoft
    • Data & Analytics
    • Enterprise
      • Cloud Migration
      • Collaboration
      • Digital Transformation
      • Future Work
      • Hybrid Cloud
      • Private Cloud
      • Public Cloud
    • Industries
      • Banking & Finance
      • Healthcare
      • Public Sector
      • Retail & Consumer
      • Telecoms
    • Infrastructure
    • Interviews
    • IoT
    • Platforms
    • Privacy
    • Regulation & Government
    • Security
    • Sponsored Content
  • Events
  • Resources
    • All Resources
    • On-demand Webinars
    • Exclusive Videos
  • More
    • Advertise
    • Contact Us
    • About Us
  • Search
  • News
  • Categories
    • Applications
      • Blockchain
      • Containers
      • Data Centres
      • Infrastructure as a Service
      • Platform as a Service
      • Software as a Service
      • Virtualisation
    • Companies
      • Alibaba Cloud
      • AWS
      • Google Cloud
      • Microsoft
    • Data & Analytics
    • Enterprise
      • Cloud Migration
      • Collaboration
      • Digital Transformation
      • Future Work
      • Hybrid Cloud
      • Private Cloud
      • Public Cloud
    • Industries
      • Banking & Finance
      • Healthcare
      • Public Sector
      • Retail & Consumer
      • Telecoms
    • Infrastructure
    • Interviews
    • IoT
    • Platforms
    • Privacy
    • Regulation & Government
    • Security
    • Sponsored Content
  • Events
  • Resources
    • All Resources
    • On-demand Webinars
    • Exclusive Videos
  • More
    • Advertise
    • Contact Us
    • About Us
Subscribe
Subscribe
  • Search
  • News
  • Categories
    • Applications
      • Blockchain
      • Containers
      • Data Centres
      • Infrastructure as a Service
      • Platform as a Service
      • Software as a Service
      • Virtualisation
    • Companies
      • Alibaba Cloud
      • AWS
      • Google Cloud
      • Microsoft
    • Data & Analytics
    • Enterprise
      • Cloud Migration
      • Collaboration
      • Digital Transformation
      • Future Work
      • Hybrid Cloud
      • Private Cloud
      • Public Cloud
    • Industries
      • Banking & Finance
      • Healthcare
      • Public Sector
      • Retail & Consumer
      • Telecoms
    • Infrastructure
    • Interviews
    • IoT
    • Platforms
    • Privacy
    • Regulation & Government
    • Security
    • Sponsored Content
  • Events
  • Resources
    • All Resources
    • On-demand Webinars
    • Exclusive Videos
  • More
    • Advertise
    • Contact Us
    • About Us

Applications

Next generation of phishing attacks uses unexpected delivery methods to steal data

Duncan MacRae

3rd November 2022

A man fishing at a lake.

Share this story:

Tags:

apps
data
Privacy
Security

Categories::

Applications
Cloud Computing
Privacy
Security

Netskope, a specialist in secure access service edge (SASE), has unveiled new research that shows how the prevalence of cloud applications is changing the way threat actors are using phishing attack delivery methods to steal data. 

The Netskope Cloud and Threat Report: Phishing details trends in phishing delivery methods such as fake login pages and fake third-party cloud applications designed to mimic legitimate apps, the targets of phishing attacks, where the fraudulent content is hosted, and more.

Although email is still a primary mechanism for delivering phishing links to fake login pages to capture usernames, passwords, MFA codes and more, the report reveals that users are more frequently clicking phishing links arriving through other channels, including personal websites and blogs, social media, and search engine results. The report also details the rise in fake third-party cloud apps designed to trick users into authorizing access to their cloud data and resources.

Phishing Comes From All Directions

Traditionally considered the top phishing threat, 11% of the phishing alerts were referred from webmail services, such as Gmail, Microsoft Live, and Yahoo. Personal websites and blogs, particularly those hosted on free hosting services, were the most common referrers to phishing content, claiming the top spot at 26%. The report identified two primary phishing referral methods: the use of malicious links through spam on legitimate websites and blogs, and the use of websites and blogs created specifically to promote phishing content.

Search engine referrals to phishing pages have also become common, as attackers are weaponising data voids by creating pages centred around uncommon search terms where they can readily establish themselves as one of the top results for those terms. Examples identified by Netskope Threat Labs include how to use specific features in popular software, quiz answers for online courses, user manuals for a variety of business and personal products, and more.

Ray Canzanese, threat research director, Netskope Threat Labs, said: “Business employees have been trained to spot phishing messages in email and text messages, so threat actors have adjusted their methods and are luring users into clicking on phishing links in other, less expected places.

“While we might not be thinking about the possibility of a phishing attack while surfing the internet or favourite search engine, we all must use the same level of vigilance and skepticism as we do with inbound email, and never enter credentials or sensitive information into any page after clicking a link. Always browse directly to login pages.” 

The Rise of Fake Third-Party Cloud Apps

Netskope’s report discloses another key phishing method: tricking users into granting access to their cloud data and resources through fake third-party cloud applications. This early trend is particularly concerning because access to third-party applications is ubiquitous and poses a large attack surface. On average, end-users in organisations granted more than 440 third-party applications access to their Google data and applications, with one organisation having as many as 12,300 different plugins accessing data – an average of 16 plugins per user. Equally as alarming, over 44% of all third-party applications accessing Google Drive have access to either sensitive data or all data on a user’s Google Drive – further incentivising criminals to create fake third-party cloud apps.  

“The next generation of phishing attacks is upon us. With the prevalence of cloud applications and the changing nature of how they are used, from Chrome extensions or app add-ons, users are being asked to authorise access in what has become an overlooked attack vector,” added Canzanese. “This new trend of fake third-party apps is something we’re closely monitoring and tracking for our customers. We expect these types of attacks to increase over time, so organisations need to ensure that new attack paths such as OAuth authorisations are restricted or locked down. Employees should also be aware of these attacks and scrutinise authorisation requests the same way they scrutinise emails and text messages.” 

Within the report, Netskope Threat Labs includes actionable steps organisations can take to identify and control access to phishing sites or applications, such as deploying a security service edge (SSE) cloud platform with a secure web gateway (SWG), enabling zero trust principles for least privilege access to data and continuous monitoring, and using Remote Browser Isolation (RBI) to reduce browsing risk for newly-registered domains.      

Additional key findings from the report include: 

  • Employees continue to click, fall victim to malicious links. It is widely understood that it takes just one click to severely compromise an organisation. While enterprise phishing awareness and training continues to be more prevalent, the report reveals that an average of eight out of every 1,000 end-users in the enterprise clicked on a phishing link or otherwise attempted to access phishing content.
  • Users are being lured by fake websites designed to mimic legitimate login pages. Attackers primarily host these websites on content servers (22%) followed by newly registered domains (17%). Once users put personal information into a fake site, or grant it access to their data, attackers are able to capture usernames, passwords, and multi-factor authentication (MFA) codes. 
  • Geographic location plays a role in the access rate of phishing. Africa and the Middle East were the two regions with the highest percentages of users accessing phishing content. In Africa, the percentage of users accessing phishing content is more than 33% above average, and in the Middle East, it is more than twice the average. Attackers frequently use fear, uncertainty, and doubt (FUD) to design phishing lures and also try to capitalise on major news items. Especially in the Middle East, attackers appear to be having success designing lures that capitalise on political, social, and economic issues affecting the region.

About the Author

Duncan MacRae

Editor-in-Chief

Duncan is an award-winning technology industry analyst, specialising in cloud computing, blockchain, martech and edge computing.

Related

CISA issues guidance amid unconfirmed Oracle Cloud breach

21st April 2025

Trade tensions prompt European firms to rethink cloud strategies

21st April 2025

$100M IFC investment in sub-Saharan Africa data centres

11th April 2025

Dr Mary Aiken, University of East London: The Intersection of technology and human behaviour in cybersecurity

11th April 2025

Join our Community

Subscribe now to get all our premium content and latest tech news delivered straight to your inbox

Click here

Popular

Cloud Computing

Oracle Cloud denies breach as hacker offers 6 million records for sale

4305 view(s)

Applications

Netflix countersues Broadcom over VMware patents

3086 view(s)

Cloud Computing

5 of the best: cloud technology training platforms

3057 view(s)

Infrastructure

Microsoft’s palm-sized chip brings practical quantum computing within reach

2467 view(s)
See all

Latest

View All Latest

Interviews

11th April 2025

Dr Mary Aiken, University of East London: The Intersection of technology and human behaviour in cybersecurity

Google unveils Cloud WAN and Gemini Tools to simplify app development Google Cloud Next 2025

Applications

10th April 2025

Google Cloud Next 25: AI, cloud, and WAN

Deutsche Telekom extends Google Cloud partnership through 2030

Cloud Computing

10th April 2025

Deutsche Telekom extends Google Cloud partnership through 2030

Subscribe

All our premium content and latest tech news delivered straight to your inbox

Subscribe

Explore

  • About Us
  • Contact Us
  • Newsletter
  • Privacy Policy
  • Cookie Policy
  • About Us
  • Contact Us
  • Newsletter
  • Privacy Policy
  • Cookie Policy

Reach Our Audience

  • Advertise
  • Post a Press Release
  • Contact Us
  • Advertise
  • Post a Press Release
  • Contact Us

Categories

  • Applications
  • Companies
  • Data & Analytics
  • Enterprise
  • Industries
  • IoT
  • Infrastructure
  • Platforms
  • Sponsored Content
  • Applications
  • Companies
  • Data & Analytics
  • Enterprise
  • Industries
  • IoT
  • Infrastructure
  • Platforms
  • Sponsored Content

Other Publications

  • Explore All
  • AI News
  • Developer
  • IoT News
  • Edge Computing News
  • Marketing Tech
  • TechHQ
  • Tech Wire Asia
  • Telecoms
  • The Block
  • Sustainability News
  • Explore All
  • AI News
  • Developer
  • IoT News
  • Edge Computing News
  • Marketing Tech
  • TechHQ
  • Tech Wire Asia
  • Telecoms
  • The Block
  • Sustainability News

CloudTech News is part of TechForge 

Subscribe

All our premium content and latest tech news delivered straight to your inbox

Permissions(Required)
This field is for validation purposes and should be left unchanged.

Notifications