Hackers are using Google and Microsoft for their malicious activities. The technology is there to make things easier for people but the hackers are a hindrance to it. According to Proofpoint which is a cybersecurity company, hackers are using advanced technologies like cloud computing and virtual collaboration software. On one of the Proofpoint blogs, Ryan Kalember, head of EVP cybersecurity strategy, mentioned that in the past year, more than 59 million malicious emails were distributed on these trusted platforms.
This is a wise move because Google and Microsoft are the two most trusted platforms. And no one would suspect that they were the victims of such a misdemeanor. More than 90 million messages have been sent through Google services. What if I tell you that 27% of them are received via Gmail, which is one of the most popular email sites in the world? This is not limited to last year’s problem, because there were at least 7 million malicious messages through Office 365 in the first half of this year.
Because these websites have a large number of subscribers and are the most popular among subscribers, their reliability surpasses any botnet. It takes too long to detect these crimes and is very difficult on the most trusted platform. In fact, hackers are the worst, and of all the things they can destroy, the worst attempt is to steal email credentials. Don’t be surprised if I tell you that this is exactly what these bad guys do. This is one of the oldest and smartest techniques. In the past 12 months, criminals have tried various vulnerabilities, hacking approximately 95% of companies through their cloud accounts.
These criminals managed to make more than half of these organizations suffer from various adversities like Processing documents and sending e-mails. These planners once had an account, they sent emails to thousands of employees posing as executives. Unfortunately, Ryan Kemberley also freely shared the following details with us: Proofpoint analysis shows how attackers use Microsoft and Google as a cover and use their infrastructure to send malicious messages. These hackers have combined more and more ransomware to hacking into cloud accounts. In such cases, human-centered email security should be prioritized.
The technology is there to make things easier for people but the hackers are a hindrance to it. In fact, hackers are the worst, and of all the things they can destroy, the worst attempt is to steal email credentials. This is one of the oldest and smartest techniques.