Skip to content

Most Popular Phishing Scams Posing as Human Resources and IT Departments

Deceptive entities persistently utilize phishing emails, often disguising themselves as internal correspondence for maximum effectiveness.

most popular phishing attacks pose as Human Resources and IT departments
most popular phishing attacks pose as Human Resources and IT departments

In the ever-evolving digital landscape, organizations are facing an escalating fraud problem, with phishing attacks becoming increasingly sophisticated. A recent breach at the U.S. Office of the Comptroller of the Currency, where criminals gained access to thousands of highly sensitive emails for over a year due to a single administrator's account compromise, underscores the urgency for a robust defense strategy [1].

The latest report on phishing trends reveals that business email compromise, often stemming from spoofed internal communications, is the most common tactic identified [2]. Another tactic used by cybercriminals is the use of QR codes, with the top three QR codes scanned by users linked to an HR drug and alcohol policy, a DocuSign document for review, and a birthday message sent through Workday [3].

Employees are less likely to question messages from HR or management and often feel pressured to respond quickly, making them a prime target for cybercriminals. This is further highlighted in a KnowBe4 study, which found that 60% of phishing failures involved emails referencing internal teams, with nearly half specifically mentioning HR [4].

To combat these threats, organizations can enhance their fraud defenses by adopting a comprehensive multi-layered security strategy. Key measures include:

  1. Email Authentication and Domain Protection: Implement and enforce strong email authentication protocols, such as Domain-based Message Authentication, Reporting & Conformance (DMARC), DomainKeys Identified Mail (DKIM), and Sender Policy Framework (SPF), to help block spoofed emails impersonating trusted vendors [2][3].
  2. Real-time Domain and Brand Monitoring: Use brand protection and domain monitoring solutions powered by AI and security experts to detect phishing domains, fraudulent QR codes, and impersonation attempts across email, SMS, and web channels [1][2].
  3. Advanced Phishing Detection with AI and Behavioral Analytics: Deploy AI-driven security tools that analyze email content, user behavior, login patterns, and network activity to identify phishing, business email compromise (BEC), and account takeover attempts [3][4].
  4. Endpoint Protection and Network Security Monitoring: Extend protection beyond email by monitoring endpoints and network traffic for signs of compromise following phishing attacks [3].
  5. Employee Awareness and Training: Conduct regular security awareness training emphasizing phishing risks—including new tactics like QR code phishing and AI-powered social engineering—and simulation exercises [3].
  6. Verification Protocols for Vendor Communications: Confirm requests involving sensitive information or financial transactions through out-of-band methods (phone calls, known contact channels) [3].

As the Association for Financial Professionals reported, 79% of organizations surveyed had experienced attempted or actual payments fraud over the past year [5]. Organizations must think outside the box to stay ahead of this spiraling problem. By leveraging these layers together, they can reduce risk exposure and enhance their organizational resilience against evolving phishing threats [1][2][3][4].

  1. In light of escalating fraud problems and the sophistication of phishing attacks, it's crucial for organizations to adopt a comprehensive multi-layered security strategy, which includes measures like email authentication and domain protection to block spoofed emails.
  2. As phishing tactics are becoming more deceiving, such as the use of QR codes and impersonation attempts, organizations should also prioritize real-time domain and brand monitoring, advanced phishing detection with AI, employee awareness and training, verification protocols for vendor communications, and endpoint protection and network security monitoring.

Read also:

    Latest