In this month’s cloud security report, we focus on phishing. Since starting the series, COVID-19 has been a standout theme for phishing campaigns, however, recently, we’ve seen different tactics being used. We also looked at what time of day people are most likely to be phished.

On top of the above, we’ve got the usual iOS vs Android users, round up of security news from July, top leaky apps, and a segment from our Data Science team on risky app permissions.

Phishing (as always) is on the rise

In the last three months, we’ve observed an increase in phishing attacks. Despite such a large spike in the week commencing 28 June, it can’t be pinned against an individual phishing campaign. Phishing attacks typically focus on topics or brands that have a high chance of the end-user clicking on malicious links, for example, from March to June many campaigns used COVID-19 to get the reader’s attention. The broad range of tactics employed at the end of June suggests that the phishers are searching for a new topic to focus their activities on.

What time of day are you most likely to be phished?

Since starting our Cloud Security report series, we’ve uncovered a number of phishing trends, but what time of day are employees most likely to be phished?

Here we can see how the time of day of phishing attacks has changed between February and March 2020 and June and July. The general pattern remains relatively similar, but there is a noteworthy peak in the morning, around lunchtime, and a large spike in the evening between 20:00 and 22:00. 

These spikes correlate with employee leisure time, possibly meaning that employees are more susceptible to phishing attacks when in a more relaxed state of mind. It demonstrates a pitfall with security awareness training, if not applied 24/7, then it is ineffective. Additionally, during these periods it is likely that the usage is non-business, with the phishing attacks occurring over personal email, social media, or SMS. Although using personal accounts as a vector, any of these could be used to phish credentials or install malware on devices. Without legislating for non-business behavior on work devices, companies increase their risk of phishing attacks as well as other security threats.

iOS users are 3.57x more likely to not be on the latest operating system version available on that device model.

Top 5 apps leaking your location

1 | il Meteo
2 | Sports Tracker
3 | NewsHunt
4 | Radio App UK
5 | Living Earth – Clock & Weather

ICYMI: July's Security News Roundup

Data Science Monthly

This chart shows how applications from different app categories request certain permissions. Permissions are one of the key features we use when determining app risk, and it’s important to know which categories typically request which permissions, since for example an app like Instagram requesting use of the Camera is not unusual but a weather app requesting this would be risky.

We're here to help you

The world of work is being completely reshaped, and remote working has become critical for business continuity. If you need any assistance with your remote working challenges, please get in touch.

Get in Touch