According to a recent report by Check Point, Microsoft ranks as the most frequently impersonated brand in phishing attacks. In 2024, 32% of all phishing attempts targeted Microsoft. Apple and Google shared the second and third positions, each accounting for 12%, while LinkedIn—also owned by Microsoft—secured the fourth spot with 11%.
Following these were brands like Alibaba, WhatsApp, Amazon, Twitter, Facebook, and Adobe, which appeared in no more than 4% of cases. Microsoft’s popularity among cybercriminals is attributed to the high level of trust users place in the brand and its widespread usage, making Microsoft accounts a prime target for attacks.
However, Check Point experts caution that the threat extends beyond Microsoft impersonations. During the holiday season, numerous phishing campaigns exploited well-known clothing brands. For instance, scammers created counterfeit domains such as “nike-blazers[.]fr” and “adidasyeezy[.]ro,” which mimicked official designs and offered fake discounts. These tactics enabled attackers to steal login credentials, passwords, and personal data from unsuspecting shoppers.
Fake websites often leverage brand logos, advertise unrealistically low prices for limited periods, and persuade victims to provide sensitive information. Examples include domains like “ralphlaurenmexico[.]com[.]mx,” “guess-india[.]in,” and “hugoboss-turkiye[.]com[.]tr,” tailored specifically to local markets.
Other notable phishing examples from the past year include “wallet-paypal[.]com,” which mimicked PayPal’s login page, and “svfacebook[.]click,” imitating Facebook. Both were used to harvest users’ credentials.
Check Point emphasizes the importance of raising user awareness and adopting advanced security measures. To defend against phishing, it is crucial to verify email sources, avoid suspicious links, enable multi-factor authentication (MFA), use reliable antivirus software, and exercise caution with unexpected messages. These measures can significantly reduce the risk of interacting with fraudulent resources.