Monday, June 16, 2025
HomeCyber Security NewsGoogle Published a Research Blog About who are the People Prone to...

Google Published a Research Blog About who are the People Prone to cyber-attacks via Email

Published on

SIEM as a Service

Follow Us on Google News

Earlier this week, Google had published a research blog about who are the people and regions most prone to cyber-attacks via email. The blog states that Google stops more than 100 million harmful mails (spam), from reaching Gmail users.

There were several malicious attackers who sought to profit from the pandemic, as more than 18 million malware and phishing related emails were tracked by Google’s robust servers.

Google’s researchers had teamed up with researchers at Stanford University to study and analyze who were the preferred targets of these phishing emails and malwares. It was not surprising to note that the major factors at play were place of residence, type of device being used and whether ones’ data had previously appeared in a breach.

- Advertisement - Google News

After having aggregated the data over a five-month period, the below conclusions were drawn:

  1. 42% of the attacks were targeted at residents of the USA, 10% at residents of the UK, and 5% towards the residents of Japan.
  2. Most attackers tend to use a “one-size fits all” strategy and do not make the effort to localize their efforts. The same email template is used in several countries
  3. However, there are some countries where regional attackers thrive. For instance, 78% of attacks targeting users in Japan were in Japanese. Similarly, 66% of attacks targeting Brazilian users were in Portuguese.

Attackers’ patterns

It was noticed that the attackers do not plan random attacks. The attacks were pre-planned and aimed at topics that would garner maximum attention. The campaigns lasted for a maximum of 3 days on average. Though the targets changed very often, the method of attack used by the attackers was largely the same.

Who was at a higher risk of the attacks?

As is generally the case, not all users were at a high risk of being a victim of a cyber-attack. It was found that users in the age group of 55 to 64 years old were at the highest risk, whereas those in the age group of 18 to 24 years old were low-risk users.

Users in Australia faced twice the risk of being a victim of cybercrime compared to the United States. Mobile-only users were at a lower risk of being attacked as compared to multi-device users.

Tips to stay safe

  1. Complete a Security Checkup for personalized and actionable security advice.
  2. If appropriate, consider enrolling in Google’s Advanced Protection program, which provides Google’s strongest security to users at increased risk of targeted online attacks. 
  3. Enable Enhanced Safe Browsing Protection in Google Chrome to substantially increase your defenses against dangerous websites and downloads on the web.
  4. Browse these additional tips to manage your online security and choose the right level of protection for yourself.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Kali Linux 2025.2 Released: New Tools, Smartwatch and Car Hacking Added

Kali Linux, the preferred distribution for security professionals, has launched its second major release...

Arsen Launches AI-Powered Vishing Simulation to Help Organizations Combat Voice Phishing at Scale

Arsen, the cybersecurity startup known for defending organizations against social engineering threats, has announced...

NIST Releases New Guide – 19 Strategies for Building Zero Trust Architectures

The National Institute of Standards and Technology (NIST) has released groundbreaking guidance to help...

Spring Framework Flaw Enables Remote File Disclosure via “Content‑Disposition” Header

A medium-severity reflected file download (RFD) vulnerability (CVE-2025-41234) in VMware's Spring Framework has been...

Credential Abuse: 15-Min Attack Simulation

Credential Abuse Unmasked

Credential abuse is #1 attack vector in web and API breaches today (Verizon DBIR 2025). Join our live, 15-min attack simulation with Karthik Krishnamoorthy (CTO - Indusface) and Phani Deepak Akella (VP of Marketing - Indusface) to see hackers move from first probe to full account takeover.

Discussion points


Username & email enumeration – how a stray status-code reveals valid accounts.
Password spraying – low-and-slow guesses that evade basic lockouts.
Credential stuffing – lightning-fast reuse of breach combos at scale.
MFA / session-token bypass – sliding past second factors with stolen cookies.

More like this

Kali Linux 2025.2 Released: New Tools, Smartwatch and Car Hacking Added

Kali Linux, the preferred distribution for security professionals, has launched its second major release...

NIST Releases New Guide – 19 Strategies for Building Zero Trust Architectures

The National Institute of Standards and Technology (NIST) has released groundbreaking guidance to help...

Spring Framework Flaw Enables Remote File Disclosure via “Content‑Disposition” Header

A medium-severity reflected file download (RFD) vulnerability (CVE-2025-41234) in VMware's Spring Framework has been...