Close Menu
Alan C. Moore
    What's Hot

    Trump says National Guard will be ‘everywhere’ in LA amid ICE protests

    June 8, 2025

    Who was Issac Paul Olakkengil, the Indian engineer who died in scuba diving incident in Dubai

    June 8, 2025

    ‘Ensures financial independence’: Vietnam bride gets unusual dowry; gift includes 100 civet cats

    June 8, 2025
    Facebook X (Twitter) Instagram
    Trending
    • Trump says National Guard will be ‘everywhere’ in LA amid ICE protests
    • Who was Issac Paul Olakkengil, the Indian engineer who died in scuba diving incident in Dubai
    • ‘Ensures financial independence’: Vietnam bride gets unusual dowry; gift includes 100 civet cats
    • Jessie J has early breast cancer, will have surgery soon
    • ‘Trump was pissed’: Ted Cruz on Musk’s ‘venting’; says he ‘felt like kids of divorce wishing mommy and daddy would stop screaming’
    • ‘Active situation’: Plane crashes in Tennessee with at least 16 onboard; several airlifted to hospitals
    • ABC News’s Terry Moran suspended after online rant on ‘world-class hater’ Stephen Miller
    • ‘Sever relations’: Bioterror arrests spark alarm; US CCP expert warns China planning ‘something worse than Covid’
    Alan C. MooreAlan C. Moore
    Subscribe
    Sunday, June 8
    • Home
    • US News
    • Politics
    • Business & Economy
    • Video
    • About Alan
    • Newsletter Sign-up
    Alan C. Moore
    Home » Blog » Darktrace: 96% of Phishing Attacks in 2024 Exploited Trusted Domains Including SharePoint & Zoom Docs

    Darktrace: 96% of Phishing Attacks in 2024 Exploited Trusted Domains Including SharePoint & Zoom Docs

    February 19, 2025Updated:February 19, 2025 Tech No Comments
    darktrace threat report jpg
    darktrace threat report jpg
    Share
    Facebook Twitter LinkedIn Pinterest Email

    In their phishing email campaigns and using reputable domains to pass security measures, threat actors are increasingly using trusted organization platforms like Dropbox, SharePoint, and QuickBooks, according to a new report released today. By hiding sender addresses or cargo links within reasonable domains, hackers evade conventional detection techniques and deceive innocent users.

    According to Darktrace’s Annual Threat Report 2024, the writers detected more than 30.4 million hacking emails, reinforcing hacking as the desired assault method.

    Reputable business services were used in the majority of phishing schemes in 2024.

    Darktrace noted fraudsters are exploiting third-party business services, including Zoom Docs, HelloSign, Adobe, and Microsoft SharePoint. In 2024, phishing emails were largely untraceable because 96 % of them were created by existing regions rather than by registering new ones.

    Intruders were observed using redirect via genuine services, such as Google, to deliver destructive payloads. The email that contained the Dropbox attack had a link that led to a destructive URL embedded in the embedded PDF.

    Notice:   How commercial email compromise attempts imitate legitimate websites to entice clicks

    Additionally, threat actors abused seized email addresses, including those from Amazon Simple Email Service, belonging to business associates, vendors, and other trusted third-parties. This “highlights” is a “highlight ( s ) that identity continues to be an expensive problem across the estate and a persistent source of pain across enterprise and business networks,” according to the report’s authors.

    Phishing attacks wave with AI-generated methods

    Among the hacking emails that Darktrace discovered:

    • 2.7 million contained stage harmful loads.
    • More than 940, 000 contained destructive QR code.

    The sophistication of phishing attempts continues to rise, with&nbsp, spear phishing&nbsp, — highly-targeted email attacks — making up 38 % of cases. However, 32 % employ novel social engineering techniques for as&nbsp, AI-generated text&nbsp, with verbal difficulty. This complexity may express as increased word volume, punctuation, or word length.

    Darktrace collated insight from its more than 10, 000 worldwide customers for its&nbsp, Annual Threat Report 2024, leveraging self-learning AI, anomaly-based recognition, and thorough analysis from its threat research group.

    Must-read safety cover

    Living-off-the-land methods: A growing security risk

    Another attack process involves first community breaches via vulnerabilities in border, perimeter or internet-facing devices, followed by living-off-the-land techniques or LOTL. This strategy exploits pre-installed, legitimate enterprise tools to execute malicious activities while avoiding detection.

    Darktrace found that 40 % of identified campaign activity in early 2024 involved the exploitation of internet-facing devices, including from Ivanti Connect Secure, Ivanti Policy Secure, Palo Alto Network, and Fortinet. Attackers favor LOTL strategies because they cut down on the need for proprietary malware and lower the chance of triggering traditional security alerts.

    Threat actors are increasingly using stolen credentials to log into remote network access solutions like VPNs for initial network access before utilizing LOTL techniques to exploit vulnerabilities in these edge devices.

    Ransomware organizations use secret techniques on enterprise tools.

    Ransomware groups — including Akira, RansomHub, &nbsp, Black Basta, Fog, and Qilin, along with emerging actors Lynx — have increasingly been using legitimate enterprise software. Using: Darktrace, Darktrace has observed these groups:

    • AnyDesk and Atera to mask command-and-control communications.
    • Data exfiltration to cloud storage services.
    • File-transfer technology for rapid exploitation and double extortion.

    SEE: &nbsp, Most Ransomware Attacks Occur When Security Staff Are Asleep, Study Finds

    These groups are also frequently recruited for Ransomware-as-a-Service or Malware-as-a-Service, with the use of MaaS tools increasing by 17 % from the first to the second half of 2024. The use of Remote Access Trojans, a malicious program that enables an attacker to control an infected device remotely, increased by 34 % over the same time.

    Source credit

    Keep Reading

    New OpenAI Sora & Google Veo Competitor Focuses on Storytelling With Its Text-to-Video Tool

    Trump/Musk Feud: Possible Impact on AI Regulation, Budget Bill, Government Contracts

    Mistral’s New AI Tool Offers ‘Best-in-Class Coding Models’ to Enterprise Developers

    Mistral’s New AI Tool Offers ‘Best-in-Class Coding Models’ to Enterprise Developers

    Mistral’s New AI Tool Offers ‘Best-in-Class Coding Models’ to Enterprise Developers

    Mistral’s New AI Tool Offers ‘Best-in-Class Coding Models’ to Enterprise Developers

    Editors Picks

    Trump says National Guard will be ‘everywhere’ in LA amid ICE protests

    June 8, 2025

    Who was Issac Paul Olakkengil, the Indian engineer who died in scuba diving incident in Dubai

    June 8, 2025

    ‘Ensures financial independence’: Vietnam bride gets unusual dowry; gift includes 100 civet cats

    June 8, 2025

    Jessie J has early breast cancer, will have surgery soon

    June 8, 2025

    ‘Trump was pissed’: Ted Cruz on Musk’s ‘venting’; says he ‘felt like kids of divorce wishing mommy and daddy would stop screaming’

    June 8, 2025

    ‘Active situation’: Plane crashes in Tennessee with at least 16 onboard; several airlifted to hospitals

    June 8, 2025

    ABC News’s Terry Moran suspended after online rant on ‘world-class hater’ Stephen Miller

    June 8, 2025

    ‘Sever relations’: Bioterror arrests spark alarm; US CCP expert warns China planning ‘something worse than Covid’

    June 8, 2025

    Republicans urge Trump to extinguish Los Angeles protests ASAP: ‘Put down the mob’

    June 8, 2025

    The ‘Procession of Life’: A Pentecost Reflection

    June 8, 2025
    • Home
    • US News
    • Politics
    • Business & Economy
    • About Alan
    • Contact

    Sign up for the Conservative Insider Newsletter.

    Get the latest conservative news from alancmoore.com [aweber listid="5891409" formid="902172699" formtype="webform"]
    Facebook X (Twitter) YouTube Instagram TikTok
    © 2025 alancmoore.com
    • Privacy Policy
    • Terms
    • Accessibility

    Type above and press Enter to search. Press Esc to cancel.