TALKING
business
‘‘
n knowledge that
f cyberthreats start
he current working
e true than ever – with
ng a 30,000% increase
nd malware targeting
mail security tools
ats they encounter
ckers know this and
echniques to take
damental flaw. This
o mutate common
ng in a massive
hreats. Another
e the focus of this
widespread creation
er to evade reputation
based detection.
n domain creation
have to rely on
and patterns across
blish whether or not
yber AI technology
ing emails into
w they don’t belong.
fore, to actively track
urity researchers, it’s
ds.
outbreak, we have
omains registered
ncrease by 130,000. In
pear phishing threats
a Email were related
te work. Another
ed that 10,000
omains are created
ly 10 of these either
ng to generate sales
attackers also taking
g online behaviours
emic, another trend
feration of the keyword
unpopular domains
nal tools, as attackers
ferencing platform’s
post on the idea of
s so successful. Right
rate for information
is. Cybercriminals
nty and doubt (FUD)
echanisms and we
ty of imaginative
cipients. These emails
Dan Fein, Director of Email Security
Products, Americas, Darktrace
“
SINCE THE
CORONAVIRUS
OUTBREAK,
WE HAVE SEEN
THE NUMBER
OF DOMAINS
REGISTERED
RELATED TO
COVID-19
INCREASE BY
130,000.
range from fake ‘virus trackers’, to sending
emails purporting to be from Amazon,
claiming an unmanageable rise in newly
registered accounts and demanding ‘reregistration’
of the recipient’s credit card
details should they wish to keep their account.
Domain name purchasing:
A vicious cycle
Purchasing thousands of new domains and
sending malicious emails en masse is a tried
and tested technique that cybercriminals
have been leveraging for decades. Now with
automation, they’re doing it faster than
ever before.
INTELLIGENTCIO
39