TOP WORDS USED IN SPEAR PHISHING ATTACKS: Successfully Compromise Enterprise Networks and Steal Data
Aided by their targets’ porous defenses and unwitting end users, today’s cybercriminals are able to deliver advanced malware that exploits systems and enables a range of malicious activities. Much of this advanced malware is being delivered via emails with malicious file attachments. This research analysis provides a look at the nature of the files cybercriminals are distributing, specifically those that are effectively bypassing traditional security defenses such as firewalls, next-generation firewalls, intrusion prevention systems (IPS), anti-virus (AV), and secure gateways.
This report describes the common words used in file names and file types that characterize this advanced malware, providing key insights for users and security teams looking to guard against advanced threats.