
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:media="http://search.yahoo.com/mrss/">
    <channel>
        <title><![CDATA[ The Cloudflare Blog ]]></title>
        <description><![CDATA[ Get the latest news on how products at Cloudflare are built, technologies used, and join the teams helping to build a better Internet. ]]></description>
        <link>https://blog.cloudflare.com</link>
        <atom:link href="https://blog.cloudflare.com/" rel="self" type="application/rss+xml"/>
        <language>en-us</language>
        <image>
            <url>https://blog.cloudflare.com/favicon.png</url>
            <title>The Cloudflare Blog</title>
            <link>https://blog.cloudflare.com</link>
        </image>
        <lastBuildDate>Thu, 09 Apr 2026 21:47:12 GMT</lastBuildDate>
        <item>
            <title><![CDATA[Area 1 Security Announces the Most Spoofed Brand of 2021: WHO is Back Again?]]></title>
            <link>https://blog.cloudflare.com/2022-march-hackness-who-phished-brand/</link>
            <pubDate>Thu, 31 Mar 2022 12:34:00 GMT</pubDate>
            <description><![CDATA[ From Jan. 2021 to Jan. 2022, more than 8.5 million (of 56 million in total) brand phishing emails blocked by Area 1 impersonated the World Health Organization ]]></description>
            <content:encoded><![CDATA[ <p><i>This blog originally appeared in March 2022 on the Area 1 Security website, and was issued in advance of Cloudflare's acquisition of Area 1 Security on April 1, 2022. </i><a href="/why-we-are-acquiring-area-1/"><i>Learn more</i></a><i>.</i></p><p>Dear America’s sports-loving, company-securing fans: Before you find yourself glued this weekend to (what some call) <b>THE biggest game</b> in college basketball history, we are here to crown the 2022 March Hackness winner!</p><p>Also known as: the organization most impersonated by attackers in phishing campaigns in 2021.</p><p>Despite the shiny crop of newcomers to the Top 64 impersonated organizations (which included <b>Notion.so</b>, <b>Binance</b>, and grocery stores from <b>Costco</b> to <b>Kwik Shop</b>), our March Hackness “Final Four” ended up mirroring the 2022’s NCAA Men’s Final Four: with the <a href="https://www.usatoday.com/story/sports/ncaab/2022/03/27/kansas-bill-self-fourth-final-four-winners-losers-miami/7185222001/">blue blood</a> brands, that is.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1W1YsrZ38ES3VfT9k690du/b048e2d457f4fe0b20b7b072e04cb705/March-Hackness_Final_2-1.png" />
            
            </figure><p>That’s right, folks: on the heels of passing enduring the second year of the COVID-19 pandemic, the <b>World Health Organization</b> beat out <b>Amazon, Microsoft</b> and <b>T-Mobile</b> to become the back-to-back <b>winner of Area 1’s “ophishal” March Hackness title</b>!</p><p>From Jan. 2021 to Jan. 2022, a whopping <b>15% (over 8.5 million) of the 56 million brand phishing emails</b> blocked by Area 1 impersonated the WHO.</p><p>This timeframe (not coincidentally) matches the WHO remaining top of mind for global businesses closely monitoring the rollout of new vaccines and booster shots, as well as the rise of the Delta and Omicron variants.</p>
    <div>
      <h3>There’s Always Next Year’s Tournament…</h3>
      <a href="#theres-always-next-years-tournament">
        
      </a>
    </div>
    <p>The pandemic also influenced brand phishing in other ways. The “blue blood” of online retail and the cloud — and our March Hackness runner-up — <b>Amazon</b>, was impersonated in <b>over 3.2 million phishing</b> emails blocked by Area 1.</p><p>The focus of <a href="https://www.rd.com/article/amazon-email-scam/">Amazon scams</a> vary. However, as Area 1’s principal threat researcher, Juliette Cash, explains, common ones include phishing emails claiming that accounts have been ‘placed on hold,’ payments have been declined or that Prime memberships have ‘expired.’</p><p>These types of attacks utilize Amazon branding to impersonate official emails and entice victims to click links to update their credit card information. Once the link is clicked, the user’s browser will upload malicious content and direct them to verify their identity and input their payment details.</p><p>While these messages can be sent at any time, we’ve found that they are commonly tied to events, such as Amazon Prime Day, that trigger individuals to take action in fear of missing out.</p><p>By the way, although Amazon vs. the WHO isn’t exactly the epic and storied rivalry of Duke vs. UNC, Amazon has been in our list of top 64 most impersonated brands ever since March Hackness’ inception … so, we’ll count this matchup as an important piece of cybersecurity history!</p><p>Now, we have no idea what it’s like pretending to be a Blue Devil or Tar Heel (or Jayhawk or Wildcat) for a basketball season, but we do know some things about bad actors’ impersonation tactics.</p><p><b>Identity deception</b> using tactics like spoofing, domain impersonation and display name impersonation showcase the ease at which people can deceive the user through brand phishing to gain access to their goals.</p><p>In many cases, it’s as simple as a display name change. However, there are (of course) much more complex phishing techniques that will evade standard defenses.</p><p>For example, in <a href="https://www.area1security.com/blog/pfizer-vaccine-phishing-campaign/">this 2021 vaccine phishing campaign</a> (which originally bypassed Microsoft Office 365’s native defenses before it was blocked by Area 1), attackers pretending to be the CDC:</p><ul><li><p>Used Display Name Spoofing to fake the visible FROM header</p></li><li><p>Inserted an SMTP HELO command to spoof the Envelope From domain</p></li><li><p>Chose to spoof a domain that did not have email authentication protocols configured and that no longer resolved to an IP address</p></li><li><p>Compromised a legitimate host with a benign IP, and used it to launch their phishing attack</p></li></ul><p><i>That’s</i> what you call a playbook.</p><p>And speaking of <b>Microsoft</b>, it made our “Final Four” of most-phished brands for the fourth consecutive year.</p><p>Attackers not only frequently impersonate individual Microsoft tools, they also often use Microsoft’s own tools and branding to bypass legacy defenses and email authentication. (Just one example: this credential harvesting campaign specifically leveraged Microsoft SharePoint and Microsoft Planner).</p>
    <div>
      <h3>So, How Do <i>You</i> Guard Your Inbox?</h3>
      <a href="#so-how-do-you-guard-your-inbox">
        
      </a>
    </div>
    <p>The bottom line is this: Attackers know how to deliver brand phishing campaigns with techniques that evade native email defenses, email authentication and sender reputation tools (i.e., DMARC, SPF and DKIM).</p><p>But – they’re not particularly clever or unique about whom they impersonate. As you can see from our March Hackness findings, <b>just 25 organizations were used in the majority (57%) of these phishing emails.</b></p><p>There are three main reasons brand phishing continues to reach many organizations’ inboxes, year after year:</p><ul><li><p><b>It’s easy</b> for attackers to establish <a href="https://www.cloudflare.com/learning/ssl/what-is-domain-spoofing/">new phishing domains</a> that exploit trusted infrastructure.</p></li><li><p><b>It’s fast</b> for attackers to set up DMARC, SPF and DKIM policies for new phishing domains to reach inboxes.</p></li><li><p><b>People trust</b> emails from known organizations, business partners and internal employee accounts – accounts that they won’t identify as compromised unless they have more [advanced email security](more advanced email security in place) in place.</p></li></ul><p>You can learn more about what the common email authentication standards (SPF, DKIM and DMARC) can and cannot do when it comes to correctly verifying the origins of emails (and who they claim to be from), here.</p><p>But what does work better than email authentication for <a href="https://www.cloudflare.com/learning/email-security/how-to-prevent-phishing/">preventing these kinds of phishing attacks</a>? <b>Advanced detection techniques.</b></p><p>For example, Area 1’s preemptive technology uses massive-scale web crawling to reveal emergent campaign infrastructure. Our small pattern analytics also identify phishing attack infrastructure, patterns of attack formation and threats within datasets that help us spot cyber campaigns as they’re being built.</p><p>To <b>see which brand phishing emails are landing in your organization’s inbox</b> (whether it’s from one of the March Hackness ‘players,’ or one of the 800-plus other brands hackers spoof), request a <b>free Phishing Risk Assessment</b> <a href="https://www.cloudflare.com/lp/emailsecurity/"><b>here</b></a><b>.</b></p><p>And, in the  meantime, we hope you all enjoy the last of 2022 March Madness. We know we at Area 1 will!</p> ]]></content:encoded>
            <category><![CDATA[Email Security]]></category>
            <category><![CDATA[Phishing]]></category>
            <category><![CDATA[Spoofing]]></category>
            <category><![CDATA[Cloud Email Security]]></category>
            <guid isPermaLink="false">7zeIWQjLftRpiY3wTtnxk</guid>
            <dc:creator>Elaine Dzuba</dc:creator>
        </item>
        <item>
            <title><![CDATA[2022 March Hackness: The Return of the Phishing Bracket - What 56 Million Emails Reveal about the Most Impersonated Brands]]></title>
            <link>https://blog.cloudflare.com/2022-march-hackness-phishing-bracket/</link>
            <pubDate>Sat, 26 Mar 2022 15:44:00 GMT</pubDate>
            <description><![CDATA[ Learn who made the list of the top brands that attackers use in phishing lures. This bracket is based on an analysis of more than 56 million phishing emails blocked by Area 1’s solution in the preceding 12 months since Feb 2022.  ]]></description>
            <content:encoded><![CDATA[ <p><i>This blog originally appeared in March 2022 on the Area 1 Security website, and was issued in advance of Cloudflare's acquisition of Area 1 Security on April 1, 2022. </i><a href="/why-we-are-acquiring-area-1/"><i>Learn more</i></a><i>.</i></p><p><i>Area 1 Security’s </i><b><i>Sixth Annual March Hackness: The Perfect Phishing Bracket</i></b><i> is here!</i></p><p><i>Learn who made the list of the top brands that attackers use in phishing lures. This bracket is based on an analysis of more than 56 million phishing emails blocked by Area 1’s solution in the preceding 12 months since Feb 2022. Like with the real tournament, there are some surprising Cinderella-like newcomers, well-known MVPs, and 800-plus spoofed organizations in between — but overall, 77% of all phishing attacks exploited just the Top 64 brands in our bracket, below.</i></p><p>Well, it’s that time of the year when NCAA basketball fans find themselves bemoaning broken brackets** and pondering life’s biggest questions, such as:</p><ul><li><p>How did the Wildcat men and women both lose in the first rounds?</p></li><li><p>Was Baylor’s exit scientific proof that all good things really must come to an end?</p></li><li><p>DID ALL THAT JUST REALLY HAPPEN?!</p></li><li><p>What if the referees didn’t [insert your adjectives of choice here]?</p></li></ul><p>**A heartbroken RIP to my unsuccessful pick-to-win-it-all, Gonzaga. Goodbye, Bulldogs, we barely knew you.</p><p>Now, the Area 1 Security folks can only offer some unscientific opinions to the questions above. After all, our job is to prevent breaches, not prognosticate about bad <a href="https://www.sbnation.com/college-basketball/2022/3/19/22986648/north-carolina-vs-baylor-march-madness-refs-video-brady-manek-ejection">perfectly fine</a> officiating.</p><p>Which means that, unlike the “sometimes it’s just luck” nature of college basketball in March, we prefer to look at cold, hard data to answer threat trend questions.</p><p>And that brings us to — DRUM ROLL PLEASE — the introduction of our <b>Sixth Annual March Hackness: The Perfect Phishing Bracket!</b></p><p>This is the time of year we conclusively answer: <b>Which organizations do attackers impersonate most in phishing campaigns?</b></p><p>For 2022, our analysis is based on <b>more than 56 million phishing emails</b> that we intercepted from January 2021 – January 2022. And although attackers pretended to be <b>over 800 different organizations</b>, ultimately, just <b>64 organizations were the go-to lures in a whopping 77%</b> of these brand phishing attempts:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3r90T4rUd0iN28GKqtttps/323e8c273a16e2747df5bc1267b81b7d/image1-25.png" />
            
            </figure>
    <div>
      <h3>Breaking Down the Bracket</h3>
      <a href="#breaking-down-the-bracket">
        
      </a>
    </div>
    <p>Now, we’ll reveal soon who was MOST impersonated, but let’s break down our Top 64 (and other initial findings from the overall data), below.</p><p>As always, attackers continued to take advantage of the following two, basic concepts when it comes to brand phishing campaigns (which, PS: easily evade DMARC and other email authentication standards):</p><p><b>1) Which technologies do people use most?</b>In Area 1’s first-ever March Hackness, we found hackers often exploited “traditional” banks and financial institutions, and loved to spoof the likes of AOL, Yahoo!, and Craigslist. But that was in 2016, when AOL’s AIM was still around (!!), before Facebook Marketplace launched as ‘the new’ Craigslist … and before something mysterious called Crypto.com rebranded the Staples Center.</p><p>Flash forward to today, and:</p><ul><li><p>In a sign of the times, and acknowledgement of how much <b>‘the Cloud’</b> is a part of all of our lives**, more than 22%** of brand phishing attacks exploited commonly <b>cloud services</b>, such as <b>Amazon, Box, DocuSign, Google, Intuit, Microsoft</b> and many others.</p></li><li><p>But, it isn’t just well-entrenched cloud companies on the list: <a href="https://www.theverge.com/2021/1/5/22215782/tiktok-notion-enterprise-software-teen-studyblr">viral-because-of-TikTok</a> <b>Notion.so,</b> the productivity tool that’s won over high schoolers and The Wall Street Journal, appeared for the first time in our Top 64!</p></li><li><p>Hackers are seeing dollar signs in cryptocurrency: <b>Binance</b> is a March Hackness newcomer (perhaps the Saint Peter’s of surprising suspect emails??!) this year. And although they didn’t crack the Top 64, <b>Coinbase</b>, <b>Metamask</b>, <b>Kraken</b>, <b>Gemini</b> and multiple crypto exchanges were also spoofed in thousands of phishing emails.</p></li><li><p>By the way, <b>Bitcoin</b>, which doesn’t technically qualify as an organization for our bracket, still deserves its own special shot-out: hackers referenced Bitcoin in <b>over 600,000</b> phishing emails last year. Actually, let’s just assume now that <a href="https://www.protocol.com/bulletins/circle-blockfi-pantera-hacked?">the crypto phishing trend</a> has only one direction to go.</p></li></ul><p><b>2) Which brands do people trust?</b>Attackers know users are more inclined to open and click messages from organizations that they interact with, whether it’s for information, work or play.</p><p>In addition to leveraging the <a href="https://www.cloudflare.com/products/zero-trust/remote-workforces/">hybrid/remote workforce</a> trend to phish users using popular cloud services, attackers also pretended to be:</p><ul><li><p><b>Healthcare &amp; Social Services:</b> With the Covid pandemic lingering on yet another year, the <b>World Health Organization</b> (last year’s “ophishal champion”) and Humana both reappear in the top 64. Area 1 also blocked thousands of phishing emails pretending to be from organizations like <b>UNICEF</b> and the <b>Centers for Medicare &amp; Medicaid Services</b> … proving that hackers are more than willing to exploit society’s most vulnerable.</p></li><li><p><b>Grocery Stores/Food &amp; Beverage Retailers:</b> Like <a href="https://www.supermarketnews.com/online-retail/online-channel-builds-share-us-grocery-market-2021">70% of U.S. households</a> last year, my family did a LOT of online grocery shopping. In fact, over half of all shoppers (51%) <a href="https://progressivegrocer.com/new-digital-grocery-shopper">started online grocery shopping</a> after the pandemic began — and our data shows bad actors have also been happy to jump onto this bandwagon shopping cart. Area 1 intercepted millions of phishing emails spoofing grocers of all sizes, across all regions: from <b>Fred Meyer</b> to <b>Amazon Fresh</b>, to <b>Kwik Shop</b> to <b>Costco</b>, and many, many more.  [Insert bad pun about ordering ‘fish’, not ‘phish,’ here].</p></li></ul>
    <div>
      <h3>Who Will Cut Down the (Phishing) Nets?</h3>
      <a href="#who-will-cut-down-the-phishing-nets">
        
      </a>
    </div>
    <p>We’ll reveal the March Hackness champion — the No. 1 brand used for phishing (the organization used in a whopping <b>15% of the overall attacks</b>) — soon!</p><p>And, in the meantime, you might be wondering: “Why should I care? My organization has email authentication and other tools to block emails from fake senders!”</p><p>Well (unless you’re using Area 1), chances are good that brand phishing is still fouling up your organization’s inboxes.</p><p>Email authentication standards (i.e., SPF, DKIM and DMARC) can serve useful security functions such as validating server and tenant origins, protecting message integrity, and providing policy enforcement.</p><p>However, email authentication is <a href="https://gateway.on24.com/wcc/eh/2153307/lp/3955867/how-bad-actors-get-past-dmarc-in-60-minutes-or-less">largely ineffective</a> against brand phishing (especially when in the form of payload-less Business Email Compromise).</p><p>We’ll dive deeper into the reasons why, after we unveil the winner of the 2022 March Hackness: The Phishing Tournament. Stay tuned here.</p><p>PS: We can’t promise our findings will be less stressful than the NCAA championship game on April 4th. But, they should be more useful than wondering what “<a href="https://www.si.com/extra-mustard/2022/03/20/only-one-perfect-march-madness-bracket-remains">GO VOLS! GBO!</a>” is like in real life.</p> ]]></content:encoded>
            <category><![CDATA[Email Security]]></category>
            <category><![CDATA[Cloud Email Security]]></category>
            <category><![CDATA[Phishing]]></category>
            <category><![CDATA[Spoofing]]></category>
            <guid isPermaLink="false">3FfQgyG9AErA8zhbOfAfse</guid>
            <dc:creator>Elaine Dzuba</dc:creator>
        </item>
        <item>
            <title><![CDATA[Area 1 Security Announces the Most Spoofed Brand of 2020]]></title>
            <link>https://blog.cloudflare.com/2021-march-hackness-phishing-champion/</link>
            <pubDate>Fri, 02 Apr 2021 15:15:00 GMT</pubDate>
            <description><![CDATA[ The COVID-19 pandemic’s influence on phishing and cyberattack lures is clear. Area 1 Security identified over 2 million phishing spoofs that exploited the World Health Organization between May 2020 and February 2021. ]]></description>
            <content:encoded><![CDATA[ <p><i>This blog originally appeared in April 2021 on the Area 1 Security website, and was issued in advance of Cloudflare's acquisition of Area 1 Security on April 1, 2022. </i><a href="/why-we-are-acquiring-area-1/"><i>Learn more</i></a><i>.</i></p><p>AMERICA! WE HAVE A 2021 MARCH HACKNESS CHAMPION! (Granted, it’s a phishy title that no organization really wants to win).</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5OP9kMN0ogbyWKw3NGGbzY/73cbb05ce10aed1cf311b1ead7133232/image2-2.jpg" />
            
            </figure><p>A Cinderella story. The underdog. The New Kid on the Block is … the <b>World Health Organization</b>!</p><p>Although the WHO won’t want you to get fooled (with phishing) again, they are the undisputed March Hackness Champion of 2021!</p><p>Truly, what a difference a year makes. The COVID-19 pandemic changed the world, including the world of Phishing and cyberattack lures. Our researchers identified <b>over 2 million Phishing spoofs (out of more than 22 million)</b> that specifically exploited the WHO brand between May 2020 to February 2021.</p><p>For example, in this phishing message from last year, the attacker lures victims by posing as the WHO, claiming to offer safety measures on how to stop the spread of the virus. We see Display Name Spoofing, where the <i>true</i> sender is actually this alansariornan[.]com domain.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6lBRIYNkaBnS8r8VibzByK/b4402a8809d643ad17eace65466d57b8/image1-30.png" />
            
            </figure><p>In an attempt to add legitimacy to the phishing example above:</p><ul><li><p>The attacker added the logo for the WHO in the body of their message. This is a common tactic, which Area 1 uses to help detect malicious messages (more specifically, our advanced computer vision algorithms and statistical models essentially train computers to interpret and understand digital images).</p></li><li><p>The attacker also used a fairly sophisticated technique to avoid detection by abusing the legitimate service, Appspot.com, to host their phishing site. Appspot is a cloud computing platform for developing and hosting web apps in Google-managed data centers, so naturally, those domains are commonly whitelisted — and the corresponding links are <i>not</i> typically evaluated.</p></li><li><p>Campaigns like this use well-designed login pages in an attempt to capture login credentials, which are then sent to a remote server controlled by the attacker.</p></li></ul><p>Attackers cleverly and maliciously pivoted to exploit other COVID-19 trends, such as <a href="https://www.nytimes.com/2020/03/22/business/coronavirus-emails.html">businesses sending more sales emails</a>, <a href="https://www.cnbc.com/2020/12/15/coronavirus-pandemic-has-pushed-shoppers-to-e-commerce-sites.html">consumers shopping online more</a>, <a href="https://magazine.realtor/news-and-commentary/feature/covid-19-s-impact-on-real-estate">the real estate surge</a>, and the <a href="https://www.nielsen.com/us/en/insights/article/2020/covid-19-tracking-the-impact-on-media-consumption/">growth of online news content consumption</a>.</p><p>Aside from the likes of the WHO (#1), Moderna (#25) and CDC (#48), these companies (whether they like it or not!) also made our annual phishing bracket for the first time this year:</p><ul><li><p><b><b><b>#7 — Marketo</b></b></b></p></li><li><p><b><b><b>#20 — Columbia Sportswear</b></b></b></p></li><li><p><b><b><b>#24 — UPS</b></b></b></p></li><li><p><b><b><b>#38 — CNN</b></b></b></p></li><li><p><b><b><b>#50 — Zoom</b></b></b></p></li><li><p><b><b><b>#51 — Adidas</b></b></b></p></li><li><p><b><b><b>#53 — Nike</b></b></b></p></li><li><p><b><b><b>#63 — Zillow</b></b></b></p></li></ul><p>Much like in the real tournament, there were several upsets in the Phishing brackets as well. Former 2017 and 2019 March Hackness bracket champion, <b>PayPal</b>, didn’t even crack the Sweet 16 round this time.</p><p><b>With the world on edge in 2020, hackers took every advantage they could to find a way into organizations.</b> Their weapon of choice is trust. Who wouldn’t want information from the WHO about a virus that is affecting every aspect of their lives? Hackers know this, so they use it.</p><p>And as I shared in our prior Not-so-Sweet 16 post, email authentication and sender reputation standards (such as SPF, DKIM and DMARC) aren’t enough to <a href="https://www.cloudflare.com/learning/email-security/how-to-prevent-phishing/">prevent phishing attacks</a> from reaching inboxes.</p><p>Email authentication and sender reputation were designed to help brands deliver their email messages properly — not to help defend your organization from the most sophisticated phish.</p><p>In fact, our co-founder/CSO, Blake Darché, and our principal security researcher, Javier Castro, <a href="https://gateway.on24.com/wcc/eh/2153307/lp/3955867/how-bad-actors-get-past-dmarc-in-60-minutes-or-less">demonstrated</a> through the creation of a real-time, DMARC-passing attack, just how fast and easy it is for attackers to get phishing emails into your inbox.</p><p>Remember, even when you deploy DMARC for your domain:</p><ul><li><p>It’s easy it is to establish a new phishing domain that exploits trusted infrastructure</p></li><li><p>It’s fast to set up DMARC, SPF and DKIM policies for new phishing domains in order to reach inboxes</p></li><li><p>You need to detect phish beyond email authentication via comprehensive message analysis, computer vision, domain registration checks, and other techniques beyond email authentication.</p></li></ul>
    <div>
      <h3>Takeaways from the 2021 March Hackness Tournament</h3>
      <a href="#takeaways-from-the-2021-march-hackness-tournament">
        
      </a>
    </div>
    <p>Here are some other key insights on the past year’s contenders:</p><ul><li><p>The Top 4 “seeds” were seen in over 6 million phishing attacks.</p></li><li><p>The Top 10 accounted for over 56% of ALL spoof- and impersonation-based phishing attacks.</p></li><li><p>Our 64-brand bracket included 15 different industries. The most well-represented were Technology and Financial Services/Banking.</p></li><li><p>Attackers will use what is in the headlines to make attacks land. COVID-19 and a Presidential Election heavily influenced the attack patterns of phishing attacks in the U.S. last year.</p></li></ul><p>Well America, I had a great time with you for the 2021 March Hackness tournament. Will our Cinderella return to the ball next year? You’ll have to join us again to find out!</p><p>Until next time… <i>(Dick Vitale one last time)</i></p><p><b>GOODNIGHT BABY! WE’LL BE DANCING AGAIN NEXT YEAR!</b></p> ]]></content:encoded>
            <category><![CDATA[Email Security]]></category>
            <category><![CDATA[Cloud Email Security]]></category>
            <category><![CDATA[Cloudflare Zero Trust]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Spoofing]]></category>
            <guid isPermaLink="false">2MnR0ZE77vjdtm4uMlhKWa</guid>
            <dc:creator>Shalabh Mohan</dc:creator>
        </item>
        <item>
            <title><![CDATA[Annual March Hackness 2021: The Not-So-Sweet 16 —The Pandemic’s Phishing Influence]]></title>
            <link>https://blog.cloudflare.com/2021-march-hackness-not-sweet-16/</link>
            <pubDate>Wed, 31 Mar 2021 15:22:00 GMT</pubDate>
            <description><![CDATA[ The COVID-19 pandemic influenced which brands attackers exploited for phishing campaigns in 2021. For example, the World Health Organization and DocuSign made Area 1 Security’s 2021 March Hackness “Not-so-Sweet 16.” ]]></description>
            <content:encoded><![CDATA[ <p><i>This blog originally appeared in March 2021 on the Area 1 Security website, and was issued in advance of Cloudflare's acquisition of Area 1 Security on April 1, 2022. </i><a href="/why-we-are-acquiring-area-1/"><i>Learn more</i></a><i>.</i></p><p>Dick Vitale impression returning in:</p><p><i>3…</i></p><p><i>2…</i></p><p><i>1…</i></p><p>OH MY, WHAT A TOURNAMENT IT HAS BEEN! SOME STUNNING UPSETS! MILLIONS OF BRACKETS BUSTED! IT’S AWESOME (and sometimes awful), BABY!</p><p>Whew… Got that out of the way.</p><p>So, what have we learned from the first two rounds of the Annual March Hackness phishing tournament?</p><p>The COVID-19 pandemic has definitely played into what attackers are using in their business.</p><p>The proof? Cinderella runs thus far for some of our (not-so-Sweet) 16 of top-impersonated newcomers: the <b>World Health Organization</b> (which we’ve seen daily in the news); <b>Target</b> (whose online sales surged by $10 billion last year); and <b>DocuSign</b> (whose revenue exploded by nearly 50%, thanks to post-COVID remote business). Reminiscent of Marquette’s 2013 run, in my opinion!</p><p>That said, our major players of <b>Microsoft</b> and <b>Google</b> are still accounted for — they remain attackers’ favorite brands year after year. (Case in point: our security research team <a href="https://threatpost.com/office-365-phishing-attack-financial-execs/164925/">recently uncovered</a> a highly sophisticated Microsoft 365 phishing campaign targeting financial departments and unsuspecting assistants and CEOs).</p><p>But … who honestly could have predicted <b>PayPal</b> getting knocked out in the first round? Our 2019 March Hackness Champion goes home early! Congratulations to them for being Most Improved (aka, less spoofed)!</p><p>Remember folks, in our phishing bracket, a first round knockout is actually a badge of honor!</p><p>Which brings us into the Not-So-Sweet 16. Can the WHO continue its historic run? Can Twitter upset the Duke-esque status of Microsoft? Will Facebook survive a matchup against Amazon? Only time will tell!</p><p>The Madness is setting in!</p><p><b><i>Let’s check back with Dicky V for analysis of the perfect phishing bracket:</i></b></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3luci9yL7tWMhI5sHzkAwh/8ceda12d77b67aec8f71fd65ef85486c/image1-1.jpg" />
            
            </figure>
    <div>
      <h3>Some takeaways for the Sweet 16?</h3>
      <a href="#some-takeaways-for-the-sweet-16">
        
      </a>
    </div>
    <ul><li><p>OH BABY! We’ve got quite a few Juggernaut matchups! Microsoft has that champion pedigree but Twitter is a strong contender!</p></li><li><p>Facebook vs Amazon! That’s a championship matchup in its own right … expect a lot of fireworks there!</p></li><li><p>I like Apple’s odds of making it to the finals!</p></li><li><p>I think our Cinderella, the WHO, might be making it to the ball!</p></li></ul><p><b>Tune in on April 5th to see who will be crowned our OPHISHAL Champion for 2021! IT’S AWESOME BABY!</b></p>
    <div>
      <h3>And Now Some Additional Analysis</h3>
      <a href="#and-now-some-additional-analysis">
        
      </a>
    </div>
    <p>By the way, in case you’re wondering: <i>is email authentication (SPF, DKIM, DMARC) THE winning way to stop brand spoofing and impersonation-based phishing attacks from ever reaching inboxes?</i></p><p>The answer is: <b>No.</b> Over the past year, we’ve blocked 22 million of these types of phishing attacks — <b>and while we know all three standards can help with preventing</b> <b><i>some</i></b> <b>forms of phishing, attackers can</b> <a href="https://gateway.on24.com/wcc/eh/2153307/lp/3955867/how-bad-actors-get-past-dmarc-in-60-minutes-or-less"><b>easily bypass email authentication</b></a><b>.</b></p><p>The SPF, DKIM and DMARC standards are certainly useful for validating server and tenant origins, <a href="https://www.cloudflare.com/learning/dns/dns-records/protect-domains-without-email/">protecting message integrity</a> and providing policy enforcement. However, security professionals should know that:</p><ol><li><p><i>Anyone can set up emails that pass email authentication.</i></p></li><li><p><i>Email authentication does not inspect content.</i></p></li><li><p><i>Email authentication does not protect against look-alike domains</i>.</p></li><li><p><i>Email authentication does not protect against compromised domains</i>.</p></li><li><p><i>The vast majority of organizations and domains do not use email authentication</i>.</p></li><li><p><i>Email authentication can be difficult to set up properly.</i></p></li></ol><p>Below is a brief description of what each standard does, what types of threats it can protect against and what types of threats it <i>cannot</i> protect against.</p><table>
<thead>
  <tr>
    <th>DMARC <br />(Domain-based Message Authentication, Reporting and Conformance)</th>
  </tr>
</thead>
<tbody>
  <tr>
    <td>Purpose</td>
    <td>Providing policy enforcement and reporting for SPF and DKIM<br />Stipulating what policy to follow if an email doesn’t pass SPF or DKIM authentication (e.g. reject/delete, quarantine, no policy/send)<br />Reporting function allows domain owners to who is sending email on their behalf </td>
  </tr>
  <tr>
    <td>Best for:</td>
    <td>Protecting against spoofing of your own domain and brand abuse<br />(Does not prevent spoofing of another brand’s domain.)</td>
  </tr>
  <tr>
    <td>Limitations</td>
    <td>Does not prevent spoofing of another brand’s domain<br />Does not prevent look-alike email, domain or display name spoofing<br />Domain owners specify what percentage of mail DMARC policies applies to; application percentages of less than 100% are virtually meaningless<br />Does not protect against attacks using “validated” emails with embedded URLs, malicious payloads or attachments</td>
  </tr>
</tbody>
</table> ]]></content:encoded>
            <category><![CDATA[Email Security]]></category>
            <category><![CDATA[Cloud Email Security]]></category>
            <category><![CDATA[Cloudflare Zero Trust]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Spoofing]]></category>
            <guid isPermaLink="false">77snTm9iI8gSS8PZ5JOqkD</guid>
            <dc:creator>Shalabh Mohan</dc:creator>
        </item>
        <item>
            <title><![CDATA[Annual March Hackness: The Opener — What a Difference a Year Makes in the World of Phishing Attacks]]></title>
            <link>https://blog.cloudflare.com/2021-march-hackness-phishing-opener/</link>
            <pubDate>Mon, 22 Mar 2021 16:33:00 GMT</pubDate>
            <description><![CDATA[ Area 1 has been doing our own Phishing brackets over the past five years. We took a hiatus in 2020 (as did the NCAA), so today, we proudly introduce the 5th Annual March Hackness: The Phishing Tournament. ]]></description>
            <content:encoded><![CDATA[ <p><i>This blog originally appeared in March 2021 on the Area 1 Security website, and was issued in advance of Cloudflare's acquisition of Area 1 Security on April 1, 2022. </i><a href="/why-we-are-acquiring-area-1/"><i>Learn more</i></a><i>.</i></p><p>Well America, it’s back! That glorious time of year that has everyone asking, <i>“Is Gonzaga actually for real this time? Have we learned nothing?!”</i> Yes that’s right, March Madness is back!</p><p>After a LONG and hard 2020, it’s beginning to look a little more normal these days. Nothing signals normal like the return of March Madness! We can finally have the thrill and gut punching heartbreak of busted brackets, 15-seed upsets, and those weird bragging rights of <i>“I called that upset, I just didn’t put it down on my bracket…”</i></p><p>We at Area 1 have been doing our own Phishing brackets over the past five years. We took a hiatus in 2020 (as did the NCAA), so today, we proudly introduce the <b>5th Annual March Hackness: The Phishing Tournament</b>.</p><p>In creating their Phishing campaigns, attackers take advantage of a simple idea - Trust. Nothing speaks to that more than the brands that everyone knows and loves and interacts with in their everyday lives or see in the headlines.</p><p>We’ve analyzed over 500 different organizations — across multiple divisions (aka industries) — that have been spoofed in more than 22 million Phishing messages over the past year. From there, we’ve identified <i>the</i> Top 64 companies whose brands have become <i>the</i> go-to lures for Phishing campaigns.</p><p>Although March Madness took last year off due to the COVID-19 pandemic, attackers sure didn’t. (Just see some proof here, and here, and here…)</p><p>And now…</p><p><i>(Prepares best Dick Vitale voice possible)</i> …</p><p>WE’RE BACK AT IT  BABY! OH AMERICA, ARE YOU SERIOUS? IT’S AWESOME BABY!</p><p>Wow, that takes a ton of energy to pull off!</p><p>With Area 1’s March Hackness tournament, you’ll get to see who is the latest Cinderella story to come out of nowhere and disrupt the typical “Power 5” technology brands that typically dominate the Phishing world. (Here’s looking at you PayPal, <a href="https://www.area1security.com/blog/the-fourth-annual-march-hackness/">our previous 2019 champion</a>).</p><p>Let’s see what a difference a year makes in the world of Phishing.</p><p>I’m excited, you get excited!</p><p>EVERYONE ON THEIR FEET!</p><p>LET’S SEE THAT BRACKET BABY!</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1Vd7W7CRXsN4cKJ8S2qScm/1723449adc3e33bcf32399de4d254f96/image1-3.jpg" />
            
            </figure>
    <div>
      <h3>Some fast break takeaways for this year’s March Hackness?</h3>
      <a href="#some-fast-break-takeaways-for-this-years-march-hackness">
        
      </a>
    </div>
    <ul><li><p>We see some (unfortunate) new players in the space this year: themes around COVID-19 made a strong impact on our Top 64 bracket.</p></li><li><p>For example, newcomers like the World Health Organization and Centers for Disease Control make appearances for the first time, as well as pharmaceutical sweethearts, Moderna.</p></li><li><p>Our typical heavy hitters are still accounted for, like Microsoft, Google, Facebook, and PayPal. However, how well will they survive the tournament? Can they make it to the championship?</p></li></ul><p>Tune in soon to find out who cuts down the nets to evade detection in this year’s tournament!</p> ]]></content:encoded>
            <category><![CDATA[Email Security]]></category>
            <category><![CDATA[Cloud Email Security]]></category>
            <category><![CDATA[Cloudflare Zero Trust]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Spoofing]]></category>
            <guid isPermaLink="false">3EjpM3dZIra3S7NPEPSJtq</guid>
            <dc:creator>Shalabh Mohan</dc:creator>
        </item>
    </channel>
</rss>