Monday, February 10, 2025
HomeCyber Security NewsGoogle Published a Research Blog About who are the People Prone to...

Google Published a Research Blog About who are the People Prone to cyber-attacks via Email

Published on

SIEM as a Service

Follow Us on Google News

Earlier this week, Google had published a research blog about who are the people and regions most prone to cyber-attacks via email. The blog states that Google stops more than 100 million harmful mails (spam), from reaching Gmail users.

There were several malicious attackers who sought to profit from the pandemic, as more than 18 million malware and phishing related emails were tracked by Google’s robust servers.

Google’s researchers had teamed up with researchers at Stanford University to study and analyze who were the preferred targets of these phishing emails and malwares. It was not surprising to note that the major factors at play were place of residence, type of device being used and whether ones’ data had previously appeared in a breach.

After having aggregated the data over a five-month period, the below conclusions were drawn:

  1. 42% of the attacks were targeted at residents of the USA, 10% at residents of the UK, and 5% towards the residents of Japan.
  2. Most attackers tend to use a “one-size fits all” strategy and do not make the effort to localize their efforts. The same email template is used in several countries
  3. However, there are some countries where regional attackers thrive. For instance, 78% of attacks targeting users in Japan were in Japanese. Similarly, 66% of attacks targeting Brazilian users were in Portuguese.

Attackers’ patterns

It was noticed that the attackers do not plan random attacks. The attacks were pre-planned and aimed at topics that would garner maximum attention. The campaigns lasted for a maximum of 3 days on average. Though the targets changed very often, the method of attack used by the attackers was largely the same.

Who was at a higher risk of the attacks?

As is generally the case, not all users were at a high risk of being a victim of a cyber-attack. It was found that users in the age group of 55 to 64 years old were at the highest risk, whereas those in the age group of 18 to 24 years old were low-risk users.

Users in Australia faced twice the risk of being a victim of cybercrime compared to the United States. Mobile-only users were at a lower risk of being attacked as compared to multi-device users.

Tips to stay safe

  1. Complete a Security Checkup for personalized and actionable security advice.
  2. If appropriate, consider enrolling in Google’s Advanced Protection program, which provides Google’s strongest security to users at increased risk of targeted online attacks. 
  3. Enable Enhanced Safe Browsing Protection in Google Chrome to substantially increase your defenses against dangerous websites and downloads on the web.
  4. Browse these additional tips to manage your online security and choose the right level of protection for yourself.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

SHA256 Hash Calculation from Data Chunks

The SHA256 algorithm, a cryptographic hash function, is widely used for securing data integrity...

New Report of of 1M+ Malware Samples Show Application Layer Abused for Stealthy C2

A recent analysis of over one million malware samples by Picus Security has revealed...

Seven-Year-Old Linux Kernel Bug Opens Door to Remote Code Execution

Researchers have uncovered a critical vulnerability in the Linux kernel, dating back seven years,...

Ransomware Payments Plunge 35% as More Victims Refuse to Pay

In a significant shift within the ransomware landscape, global ransom payments plummeted by 35%...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

SHA256 Hash Calculation from Data Chunks

The SHA256 algorithm, a cryptographic hash function, is widely used for securing data integrity...

New Report of of 1M+ Malware Samples Show Application Layer Abused for Stealthy C2

A recent analysis of over one million malware samples by Picus Security has revealed...

Seven-Year-Old Linux Kernel Bug Opens Door to Remote Code Execution

Researchers have uncovered a critical vulnerability in the Linux kernel, dating back seven years,...