Cofense Email Security

Cofense has you covered as Office attachment attacks grow.

At Cofense, we’ve known for some time that phishing attacks using MS Office attachments were a big problem. That’s why our solutions help you combat these attacks in important ways.

Recently, Kaspersky Labs released a report showing a four-fold increase in Office attachment-based attacks in Q1 2018. Their share of exploits used grew to 50%. While the report focuses on attacks used to exploit Office bugs or vulnerabilities, threat actors also use Office attachments to steal credentials and other critical data.

Here’s how we help.

Cofense PhishMeTM conditions users to recognize Office attachment attacks. Not only do we use these scenarios in phishing simulations, we are the only provider with accurate and clear reporting of end users who take the bait, even those on mobile devices. This helps determine your company’s overall risk to these attacks.

Good thing. According to Kaspersky, the first quarter of 2018 experienced a massive inflow of these exploits, targeting popular Microsoft Office software. Attacks based on exploits are very dangerous. Not requiring additional user interaction, they can deliver their code discreetly. No wonder they’re so widely used, both by cybercriminals looking for profit and sophisticated nation-state actors.

Once attackers learn of a vulnerability they prepare a ready-to-go exploit. They frequently use spear-phishing as the infection vector, compromising users and companies through emails with malicious attachments.

Besides helping to reduce susceptibility, Cofense equips you with our Cofense ReporterTM button, the one-click way for users to report suspicious emails from laptops, mobile phones, and desktops, so your incident responders can take swift action.

It’s one more way we’ve got you covered, against Office attachment attacks and countless other threats.

Share This Article
Facebook
Twitter
LinkedIn

Search

We use our own and third-party cookies to enhance your experience. Read more about our cookie policy. By clicking ‘Accept,’ you acknowledge and consent to our use of all cookies on our website.