Anzeige
Mehr »
Mittwoch, 04.02.2026 - Börsentäglich über 12.000 News
Revolutionäre Entwicklung im Megatrend - Der KI-Durchbruch für Pflege und Sicherheit!
Anzeige

Indizes

Kurs

%
News
24 h / 7 T
Aufrufe
7 Tage

Aktien

Kurs

%
News
24 h / 7 T
Aufrufe
7 Tage

Xetra-Orderbuch

Fonds

Kurs

%

Devisen

Kurs

%

Rohstoffe

Kurs

%

Themen

Kurs

%

Erweiterte Suche
PR Newswire
233 Leser
Artikel bewerten:
(1)

VIPRE Security Group: Cybercriminals' Key Attack Vector is 'Trust', VIPRE's Q4 2025 Email Threat Report Reveals

Callback phishing jumps 500%, cybercriminals turn trust and legitimacy against organizations

LONDON, Feb. 4, 2026 /PRNewswire/ -- VIPRE Security Group, a global leader and award-winning cybersecurity, privacy, and data protection company, releases its Q4 2025 Email Threat Trends Report. Processing and analyzing 1.5 billion emails and half a million spam messages, this report spotlights the major email security threats that surfaced in Q4 2025. Predicting the threat trends that will be dominant in 2026, the report's findings intend to assist organizations in fortifying their email defenses against the ever-evolving techniques used by cybercriminals to bypass conventional security systems.

Callback phishing jumps 500%

During Q4 2025, callback phishing scams experienced a resurgence, rising from just 3% to a substantial 18% of all phishing incidents. This represents a remarkable 500% spike and underscores a notable shift back toward leveraging direct human interaction as a key tool for manipulation.

Work fraud delivers success

Business Email Compromise (BEC) consistently remains a powerhouse for cybercriminals across the broader phishing threat landscape. Accounting for 51% of all email fraud cases, BEC's ongoing prevalence highlights that corporate environments often lack robust protection.

Security measures backfire

Cyber attackers are weaponizing the very security features designed to protect organizations. Q4 2025 saw a noticeable uptick in the use of tools like CAPTCHAs and 'I am not a robot' checks to block automated security scanners. Cybercriminals are pairing these tactics with sophisticated fake login screens to steal credentials, evade detection, and trick users into believing they're interacting with secure, legitimate sites.

Trusted brands becoming a risk factor

Attackers are playing the trust game strategically. In Q4 2025, compromised accounts were the number one source of spam emails. Cyber criminals take over legitimate sites, such as Microsoft, to distribute malicious emails under the guise of trusted domains. Likewise, in Q4 2025, attackers increasingly relied on trusted cloud and developer platforms, including Dropbox, Amazon Web Services, and Bitbucket, to host and deliver malicious files.

Well-known brands don't arouse suspicions, but maybe they should.

Impersonation is the dominant BEC email type

Impersonation continues to be the leading form of BEC emails, making up 82% of all BEC incidents for yet another quarter. The remaining 18% are attributed to diversion tactics, such as fraudulent invoices or fake payroll requests.

In Q4 2025, CEOs and senior executives were the top targets for impersonation in BEC attacks, accounting for 50% of impersonation-based BEC emails, or 41% of total BEC incidents. These scams target smaller companies that have flat, close-knit organizational structures. In such environments, it is not uncommon for a senior executive, like the CEO, to directly request an action such as a fund transfer.

Legitimate file naming conventions, urgency-driven subject lines

Threat actors commonly used file naming conventions that resembled legitimate business and personal documents, such as salary and payroll files, invoice-related documents, employee appraisals, incentive and bonus documents, and so on.

Similarly, BEC email subject lines were crafted to convey a sense of urgency, encourage immediate replies, and enable financial exploitation, such as "make this a priority", "paycheck updated", "account information change required", and so forth.

"The Q4 2025 data reveals a troubling evolution in the strategy being adopted by cybercriminals - the systematic weaponization of trust,"Usman Choudhary, General Manager, VIPRE Security Group, says. "Criminals are undoubtedly exploiting technical vulnerabilities, but they are also exploiting human confidence in the familiar - be that impersonating a trusted supervisor or executive, mimicking reputable companies and household brands, or hiding behind enterprise security protocols. They are targeting 'trust'. Their approach demands that we rethink how we identify and authenticate interactions and security strategies across every communication and business channel."

Email security threats and techniques to watch out for in 2026

Expect more personalised and AI-driven BEC attacks, with finance and HR as top targets. Threat actors will leverage social engineering based on recent transactions, HR communications, and payroll updates.

Financial officers or employees with direct access to C-level executives should remain especially vigilant, as their proximity to such individuals makes them prime targets for these sophisticated impersonation schemes.

PDF and Office files will continue to dominate in attachment-based phishing attacks. Tactics will evolve through cloud-based and hybrid delivery of attachments. Hybrid attacks combining images and scripts to evade sandbox detection will increase, while cloud-hosted file links from trusted platforms like OneDrive and Google Drive will replace traditional attachments to bypass email scanners.

Link-based phishing with short-lived or AI-generated landing pages will increase. Organizations will see an increased use of AI-generated phishing pages for credential theft, a rise in multi-step phishing campaigns where initial phishing emails collect data to trigger later high-value attacks, and trusted domains being used and exploited.

Deepfake technology and AI-assisted threats will significantly increase the realism of phishing campaigns, while supply chain exploitation through fraudulent invoices and payment notifications from compromised vendor accounts is expected to surge. Malicious actors will increasingly manipulate or obscure email metadata, including spoofed sender identities, envelope sender information, and routing headers, to evade security controls. While legacy headers such as X-Origin-IP and custom routing headers may appear in some messages, attackers more commonly exploit weaknesses in sender authentication, header consistency, and trust relationships to sidestep detection and increase campaign credibility.

Anticipate a rise in visual deception tactics such as the use of fake login windows to steal user credentials - alongside the exploitation of CAPTCHA-based verification - to evade automated security checks to reach users.

To read the full report, click here: VIPRE Email Threat Trends Report: Q4 2025

VIPRE leverages its vast understanding of email security to equip businesses with the information they need to protect themselves. This report is based on proprietary intelligence gleaned from round-the-clock assessment of the cybersecurity landscape.

About VIPRE Security Group

VIPRE Security Group, part of Ziff Davis, Inc., is a leading provider of internet security solutions purpose-built to protect businesses, solution providers, and home users from costly and malicious cyber threats. With over 25 years of industry expertise, VIPRE is one of the world's largest threat intelligence clouds, delivering exceptional protection against today's most aggressive online threats. Our award-winning software portfolio includes next-generation antivirus endpoint cloud solutions, advanced email security products, along with threat intelligence for real-time malware analysis, and high-quality security awareness training for compliance and risk management. VIPRE solutions deliver an easy-to-use, comprehensive layered defense through cloud-based and server security, with mobile interfaces that enable instant threat response. VIPRE is a proud Advanced Technology Partner of Amazon Web Services, operating globally across North America and Europe.

The group operates under various brands, including VIPRE, StrongVPN, IPVanish, Inspired eLearning, Livedrive, and SugarSync. www.VIPRE.com

Cision View original content:https://www.prnewswire.co.uk/news-releases/cybercriminals-key-attack-vector-is-trust-vipres-q4-2025-email-threat-report-reveals-302678821.html

© 2026 PR Newswire
Vorsicht, geheim!
2026 startet mit einem Paukenschlag: Der DAX outperformt den US-Markt, Nachzügler holen auf. Ein erstes Signal, dass der Bullenmarkt an Breite gewinnt. Während viele Anleger weiter auf die großen Tech-Namen setzen, hat sich im Hintergrund längst ein Umschwung vollzogen. Der Fokus verschiebt sich weg von überteuerten KI-Highflyern hin zu soliden Qualitätswerten aus der zweiten Reihe.

Anleger, die jetzt clever agieren, setzen nicht auf das, was war, sondern auf das, was kommt. Unternehmen mit gesunder Bilanz, unterschätztem Potenzial und begrenztem Abwärtsrisiko könnten 2026 zu den großen Gewinnern zählen. Die Gefahr einer schärferen Korrektur bleibt real, gerade für passiv aufgestellte Investoren.

In unserem neuen Spezialreport stellen wir fünf Aktien vor, die genau jetzt das Potenzial für überdurchschnittliche Renditen bieten. Stark, günstig und bislang kaum im Fokus.

Jetzt kostenlosen Report herunterladen – bevor es andere tun!

Dieses exklusive PDF ist nur für kurze Zeit gratis verfügbar.
Werbehinweise: Die Billigung des Basisprospekts durch die BaFin ist nicht als ihre Befürwortung der angebotenen Wertpapiere zu verstehen. Wir empfehlen Interessenten und potenziellen Anlegern den Basisprospekt und die Endgültigen Bedingungen zu lesen, bevor sie eine Anlageentscheidung treffen, um sich möglichst umfassend zu informieren, insbesondere über die potenziellen Risiken und Chancen des Wertpapiers. Sie sind im Begriff, ein Produkt zu erwerben, das nicht einfach ist und schwer zu verstehen sein kann.