{"componentChunkName":"component---src-templates-blog-post-tsx","path":"/most-imitated-brand-in-phishing-attacks-for-q3-2024","result":{"data":{"site":{"siteMetadata":{"siteUrl":"https://guard.io","title":"Browser Protection | Data & Privacy Security | Guardio Personal Blog"},"pathPrefix":"/blog"},"contentfulBlogPost":{"slug":"most-imitated-brand-in-phishing-attacks-for-q3-2024","title":"Microsoft tops the list as the most imitated brand in phishing attacks | Q3 2024","metaTitle":"Guardio reports: Most Imitated Brands in Phishing Q3 2024","showExitPop":false,"descriptionMeta":{"childMarkdownRemark":{"rawMarkdownBody":"Discover the most imitated brands in phishing attacks for Q3 2024. Guardio's report highlights Microsoft, Met, and Steam as top targets. Stay informed and vigilant."}},"description":{"childMarkdownRemark":{"rawMarkdownBody":"Guardio's Q3 2024 Brand Phishing Report highlights Meta, Microsoft, and Steam as the most impersonated brands in phishing scams. Discover the latest scam trends and see which states are most affected."}},"author":null,"coverImage":{"fixed":{"width":810,"height":477,"src":"//images.ctfassets.net/tdnn4v0n6ild/7rOss5SPjCqZfwxdvpHYmO/3631fc3163fe5d8610d8da1506bb307c/Cover_Hero__1_-min.png?w=810&h=477&q=50&fit=fill"}},"tags":null,"publishDate":"2024-10-29T11:30+02:00","publishDateFormatted":"October 29th","body":{"childMarkdownRemark":{"tableOfContents":"","timeToRead":4,"htmlAst":{"type":"root","children":[{"type":"element","tagName":"p","properties":{},"children":[{"type":"element","tagName":"em","properties":{},"children":[{"type":"text","value":"Guardio’s Brand Phishing Report is back, highlighting the top impersonated brands in phishing scams for Q3 2024. This quarter, Microsoft has overtaken Meta to claim the top spot, followed by Steam and Meta. The report also brings attention to the increasing number of election-related scams, the impact of a massive SSN leak, and a sharp rise in cryptocurrency scams."}]}]},{"type":"text","value":"\n"},{"type":"element","tagName":"h2","properties":{"id":"top-phishing-brands-in-q3-2024","style":"position:relative;"},"children":[{"type":"element","tagName":"a","properties":{"href":"#top-phishing-brands-in-q3-2024","ariaLabel":"top phishing brands in q3 2024 permalink","className":["anchor","before"]},"children":[{"type":"element","tagName":"svg","properties":{"ariaHidden":"true","focusable":"false","height":"16","version":"1.1","viewBox":"0 0 16 16","width":"16"},"children":[{"type":"element","tagName":"path","properties":{"fillRule":"evenodd","d":"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z"},"children":[]}]}]},{"type":"text","value":"Top phishing brands in Q3 2024"}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"In Q3 2024, scammers continued leveraging major brand names to trick people into giving up their personal information or breaking into personal accounts. Here are the top 10 most-imitated brands, with Microsoft taking the lead for the first time this year."}]},{"type":"text","value":"\n"},{"type":"element","tagName":"ol","properties":{},"children":[{"type":"text","value":"\n"},{"type":"element","tagName":"li","properties":{},"children":[{"type":"text","value":"Microsoft (9.3%)"}]},{"type":"text","value":"\n"},{"type":"element","tagName":"li","properties":{},"children":[{"type":"text","value":"Steam (8.9%)"}]},{"type":"text","value":"\n"},{"type":"element","tagName":"li","properties":{},"children":[{"type":"text","value":"Meta (7.5%)"}]},{"type":"text","value":"\n"},{"type":"element","tagName":"li","properties":{},"children":[{"type":"text","value":"USPS (7%)"}]},{"type":"text","value":"\n"},{"type":"element","tagName":"li","properties":{},"children":[{"type":"text","value":"Google (3.8%)"}]},{"type":"text","value":"\n"},{"type":"element","tagName":"li","properties":{},"children":[{"type":"text","value":"Roblox (3.2%)"}]},{"type":"text","value":"\n"},{"type":"element","tagName":"li","properties":{},"children":[{"type":"text","value":"AT&T (3%)"}]},{"type":"text","value":"\n"},{"type":"element","tagName":"li","properties":{},"children":[{"type":"text","value":"Coinbase (2.9%)"}]},{"type":"text","value":"\n"},{"type":"element","tagName":"li","properties":{},"children":[{"type":"text","value":"Netflix (2%)"}]},{"type":"text","value":"\n"},{"type":"element","tagName":"li","properties":{},"children":[{"type":"text","value":"DHL (2%)"}]},{"type":"text","value":"\n"}]},{"type":"text","value":"\n"},{"type":"element","tagName":"h3","properties":{},"children":[{"type":"text","value":"New entrants in the top 10:"}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"This quarter, Coinbase, Netflix, and Google made the list, reflecting the rise in crypto scams and entertainment-related phishing attempts."}]},{"type":"text","value":"\n"},{"type":"element","tagName":"h2","properties":{"id":"scam-spotlight-lets-dive-into-the-top-four-most-imitated-brands","style":"position:relative;"},"children":[{"type":"element","tagName":"a","properties":{"href":"#scam-spotlight-lets-dive-into-the-top-four-most-imitated-brands","ariaLabel":"scam spotlight lets dive into the top four most imitated brands permalink","className":["anchor","before"]},"children":[{"type":"element","tagName":"svg","properties":{"ariaHidden":"true","focusable":"false","height":"16","version":"1.1","viewBox":"0 0 16 16","width":"16"},"children":[{"type":"element","tagName":"path","properties":{"fillRule":"evenodd","d":"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z"},"children":[]}]}]},{"type":"text","value":"Scam spotlight: Let’s dive into the top four most imitated brands"}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"1. Microsoft (9.3%)"}]},{"type":"text","value":"\nMicrosoft phishing scams frequently involve fake login pages, Office 365 credentials, and fake security alerts. These scams aim to steal login details, providing attackers with access to sensitive information such as emails and documents, potentially leading to identity theft and financial fraud."}]},{"type":"text","value":"\n"},{"type":"element","tagName":"div","properties":{},"children":[{"type":"element","tagName":"span","properties":{"className":["gatsby-resp-image-wrapper"],"style":"position: relative; display: block; ; max-width: 900px; margin-left: auto; margin-right: auto;"},"children":[{"type":"text","value":"\n "},{"type":"element","tagName":"span","properties":{"className":["gatsby-resp-image-background-image"],"style":"padding-bottom: 67%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;"},"children":[{"type":"text","value":"\n "},{"type":"element","tagName":"img","properties":{"className":["gatsby-resp-image-image"],"style":"width: 100%; height: 100%; margin: 0; vertical-align: middle; position: absolute; top: 0; left: 0; box-shadow: inset 0px 0px 0px 400px white;","alt":"Fake Microsoft Login Page","title":"","src":"https://images.ctfassets.net/tdnn4v0n6ild/28yrwmDGe6oPXOciueOOSS/5d5a2cb96d9affcf2b0240f7ef9f946b/Blog_Fake_Microsoft_login_page.png","srcSet":["https://images.ctfassets.net/tdnn4v0n6ild/28yrwmDGe6oPXOciueOOSS/5d5a2cb96d9affcf2b0240f7ef9f946b/Blog_Fake_Microsoft_login_page.png?w=250 250w","https://images.ctfassets.net/tdnn4v0n6ild/28yrwmDGe6oPXOciueOOSS/5d5a2cb96d9affcf2b0240f7ef9f946b/Blog_Fake_Microsoft_login_page.png?w=500 500w","https://images.ctfassets.net/tdnn4v0n6ild/28yrwmDGe6oPXOciueOOSS/5d5a2cb96d9affcf2b0240f7ef9f946b/Blog_Fake_Microsoft_login_page.png?w=1000 1000w"],"sizes":"(max-width: 900px) 100vw, 900px","loading":"lazy"},"children":[]},{"type":"text","value":"\n "}]},{"type":"text","value":"\n "}]}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"2. Steam (8.9%)"}]},{"type":"text","value":"\nSteam continues to be a target due to its large user base among gamers. Scammers use fake giveaways or phishing links through chat messages, often tricking users into handing over account credentials or personal information. Once scammers access an account, they can steal in-game items and payment details."}]},{"type":"text","value":"\n"},{"type":"element","tagName":"div","properties":{},"children":[{"type":"element","tagName":"span","properties":{"className":["gatsby-resp-image-wrapper"],"style":"position: relative; display: block; ; max-width: 900px; margin-left: auto; margin-right: auto;"},"children":[{"type":"text","value":"\n "},{"type":"element","tagName":"span","properties":{"className":["gatsby-resp-image-background-image"],"style":"padding-bottom: 67%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAACgAAAAbCAIAAACBclo5AAAHr0lEQVRIx7VWW48cRxU+demu7p6envvMzsyuvc56bceJHUhIiESEAlKEeOSBJyQeED+AJ34I8AfCO095IaDAC4gQkRjbiTf2ZnfjvczuXHqmp6/VXV1VPEyyNlnzgJQcqUuq7tL5zvnOd041WgYBACCE4FmmtT5fv16jAKCUEkIopTDG56vWGiFkmiYhBL4Bo6uEyrLknFNKhRCUUgAoyxIhRAj5hoDRiuoV21prBABP0a61/kaIBqArtys8jPFTISEAQF8rqNZaKfWE6pWyLMsyTBMAOOdhGK5OYExM0/wfyvuKV1jFiL54AACkVNWqaxjGalNqnSbJKgK6OoExvnvv3icPdgxKRVkWea4BADQzmf7S4CmPK5BVdVY7w8RODUspsxCURAiBUlprZZqmYVAplRRi+9r27Vu3lFIIIVgGwTIIkjj+/dtvX0zj5z/76Q/efPXylYtftgDA9P4/qn/z29/FUbRCpOdvHa/Tf+UXP27hWKqxsYbstgJ3JEzVkTeHv/z2GzIuqWcIZpQacJQRKbRjo3FoBjkpNVhUv9gu17pTL/1z9yTKIuwpKeV8TuBMmWMf/nH/UcNi58o9B9ZVVv3VtwY32/kOq5+VdpEi7a7V3Q2LMcfGfmEMWb7diBCSEtCjqTuNmGPwR9NKx8JtR2lKN9sZtnevHu5d9vyl6GieiPz9UVE5y8nEgM59qGH0X328KhJTknvTOxt5iU7bJkw+bSTpfP1S3KsOMBjPUXOjGiOqosSWJb7WTbba2SRx6g5/fW1elupoXi6y+SR7L1FFo4qq0/1xtPhEu5jhK27ZxRKZgJ/qzPOMUVZyUwX1UIQEpdQ1OmXNXLzwwloN14/2Rs2KhRBKUguXyFAskqaJ8pZV1D1RaLjz8OGjo928UY8nim8az1c1FinGcBlDv11Aye8dZ3EBJWh0ARgMkXX301tWNQF25KJxLy9Ncfj4fVqsf3RyzHi7J4njkMv9FmINg9SbTCKQHsve/eDjPz58jHXJ5/yNm9cW6d19W3Eb9WUxMAwbFdNU7h7GpwDXNcBFYK3F/ju7Te97w+d4ay1MlN0cY7cjfB0OW26vcNqZUdRAlUESHPn4CuvVe46oG6UMD0RyYmgV+dGpd4MymFe9q5UEgTgJnGyWhok6C1kMsXpqHD0BtojS7NP7u1vh9brhaJ7wRd2TfaM9T1jcAq9kNF5X6jM/jrTeUSzLl4FbnPbcaQzvzfJff/8lmYmcOubhZAPmrZY/DpOHx9H4JAlSKivDRtM32RcDAACo/nIqGAh1roHhHvv+emsD0Y4ax7STL9fmgMhyXi8OLL67Q6tJccUTIRrGsjItkkdjtVNepR7dP/i8YeMEmc1e68F8fx4eH56yGWrZtrdxc9q5XsoEWlXQF1SNTKyHbegMDz46+25+b40OlgutZ+EyqudLBWZKlz5n7EaOKjHn3ExNxGwhEFebMtrMY6tSe/H5dadW8+eLP+y9W+81vE5luL798qWoS8M0ihADitGTjM9LjAG3a8CLjIuYZ4Pex6HTMPY2XmeGrKt/uuHy9qJrEGJgNfHYvsuqTpLEXBWIzx5UH/1pWXllz4XqIhidjDxiYXlSMrVVm2z39nQeySjEFXCq+nzoPmknj0qjBvu5W5CyCmGKmSNrQcD6PgzQYBsbuTAXIvQa5vEWsbFmSnSzxWHegusvvdnffnD88cnpxLGjUpF1trnubqf470yNi2RBLeoH7Pg0f7kPVy6KyxfobAJnxGr1qimlcTNiOdsgM+7aDGwkqhJH4I0e1jtHelAK3i+zl/l0LfGFvVWavXSWFDINInEyW/xw69VbDRzKO6CWpxMjLvDurhEf5TffQs/oY6Fg7MOlbWNZQX+z6q6zl2fjJh6leccJopDmEY1lTG2IaLqvS4tBNkqBIX/IynHDvK0vnYVEaNL20m7vrDX40MvdRIe1LikORcWQdhsIekYfa8cEuw/IvNQJ7tzqpAMPWzj1i+WgGpzm5dBmzFJFBO5e0sd8QsjjdvTOgT20xXdujJYmutEf3HDpQVx/bjCtkw+E+BcibhHXueBhtDQIoQKoesbIBIIQJutnCchkHix3gN3AsZWI/nZFIZoeJHhd1T8PptM4vzyAgQzsjPtN+f7dkkChG8GQdc1wsYEez6azcTCSemiR2cznV3tkOa+Acg1/l4tnXRImhq3W8ZTX/cKwvbWotL2a2a9VnR7r1Oy0HDkJ3ez127nXopzALE/xa5TzaOaPKltCGN4UCdhynZ2kG8FASlmEHwr/aJnaV5utCadxvMvVk9/oJ8AtA7Vrw81GN6ksOFnMXIdd7xFnLlCRCttGG65dazUt5BiAEqAtUZQqTdvDge9rW5AKBaSjAuJbayyIiNCyM7+s6vxoxljX9Wa8MQSCja+KCwEoDSI7MZ3Nql0xqEjGn41aj1EnLbQBmDWJzI6NemujiS8pXJM5IWVkIdf1dNtWaQ6GLYoCeMIhJRp0WuoZqXTs17rm7J4f9vKsbkIslb4IfD9Sf/0L4LVDU9mcwmLG/fvgba5jy4yLxxL9OzsuurX1VnXThiuKYglLRxPDwgEXKSftGkM45rmKA0NRJJRaFnmWF0aYfD6dN0Fan8KPflKe1/g/z8tVdNnBTzgAAAAASUVORK5CYII='); background-size: cover; display: block;"},"children":[{"type":"text","value":"\n "},{"type":"element","tagName":"img","properties":{"className":["gatsby-resp-image-image"],"style":"width: 100%; height: 100%; margin: 0; vertical-align: middle; position: absolute; top: 0; left: 0; box-shadow: inset 0px 0px 0px 400px white;","alt":"Fake Steam Website","title":"","src":"https://images.ctfassets.net/tdnn4v0n6ild/6pZBs1uav666gMSVYsgmwl/19ce298a8a5b987ccf29ad4466b098ec/Blog_Fake_Steam_website.png","srcSet":["https://images.ctfassets.net/tdnn4v0n6ild/6pZBs1uav666gMSVYsgmwl/19ce298a8a5b987ccf29ad4466b098ec/Blog_Fake_Steam_website.png?w=250 250w","https://images.ctfassets.net/tdnn4v0n6ild/6pZBs1uav666gMSVYsgmwl/19ce298a8a5b987ccf29ad4466b098ec/Blog_Fake_Steam_website.png?w=500 500w","https://images.ctfassets.net/tdnn4v0n6ild/6pZBs1uav666gMSVYsgmwl/19ce298a8a5b987ccf29ad4466b098ec/Blog_Fake_Steam_website.png?w=1000 1000w"],"sizes":"(max-width: 900px) 100vw, 900px","loading":"lazy"},"children":[]},{"type":"text","value":"\n "}]},{"type":"text","value":"\n "}]}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"3. Meta (7.5%)"}]},{"type":"text","value":"\nMeta remains a popular platform for phishing attacks, with scammers often using fake login notifications to steal personal credentials. Many phishing messages trick users into thinking their account is at risk, which prompts them to click on malicious links and give away login information."}]},{"type":"text","value":"\n"},{"type":"element","tagName":"div","properties":{},"children":[{"type":"element","tagName":"span","properties":{"className":["gatsby-resp-image-wrapper"],"style":"position: relative; display: block; ; max-width: 900px; margin-left: auto; margin-right: auto;"},"children":[{"type":"text","value":"\n "},{"type":"element","tagName":"span","properties":{"className":["gatsby-resp-image-background-image"],"style":"padding-bottom: 67%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;"},"children":[{"type":"text","value":"\n "},{"type":"element","tagName":"img","properties":{"className":["gatsby-resp-image-image"],"style":"width: 100%; height: 100%; margin: 0; vertical-align: middle; position: absolute; top: 0; left: 0; box-shadow: inset 0px 0px 0px 400px white;","alt":"A scam site imitating Meta","title":"","src":"https://images.ctfassets.net/tdnn4v0n6ild/6nYFAWEx0GWxRwuK51yMH5/bb09f5b18973cd4b13aaeb72983d7914/Blog_Meta_scam_fake_website.png","srcSet":["https://images.ctfassets.net/tdnn4v0n6ild/6nYFAWEx0GWxRwuK51yMH5/bb09f5b18973cd4b13aaeb72983d7914/Blog_Meta_scam_fake_website.png?w=250 250w","https://images.ctfassets.net/tdnn4v0n6ild/6nYFAWEx0GWxRwuK51yMH5/bb09f5b18973cd4b13aaeb72983d7914/Blog_Meta_scam_fake_website.png?w=500 500w","https://images.ctfassets.net/tdnn4v0n6ild/6nYFAWEx0GWxRwuK51yMH5/bb09f5b18973cd4b13aaeb72983d7914/Blog_Meta_scam_fake_website.png?w=1000 1000w"],"sizes":"(max-width: 900px) 100vw, 900px","loading":"lazy"},"children":[]},{"type":"text","value":"\n "}]},{"type":"text","value":"\n "}]}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"4. USPS (7%)"}]},{"type":"text","value":"\nUSPS scams often appear as fake delivery notifications, asking for personal details to track a package or pay unexpected fees. Victims are tricked into sharing information that can lead to identity theft or financial loss."}]},{"type":"text","value":"\n"},{"type":"element","tagName":"div","properties":{},"children":[{"type":"element","tagName":"span","properties":{"className":["gatsby-resp-image-wrapper"],"style":"position: relative; display: block; ; max-width: 900px; margin-left: auto; margin-right: auto;"},"children":[{"type":"text","value":"\n "},{"type":"element","tagName":"span","properties":{"className":["gatsby-resp-image-background-image"],"style":"padding-bottom: 67%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;"},"children":[{"type":"text","value":"\n "},{"type":"element","tagName":"img","properties":{"className":["gatsby-resp-image-image"],"style":"width: 100%; height: 100%; margin: 0; vertical-align: middle; position: absolute; top: 0; left: 0; box-shadow: inset 0px 0px 0px 400px white;","alt":"USPS Fake Website","title":"","src":"https://images.ctfassets.net/tdnn4v0n6ild/7wZxSsWgkNjUmGAlH3BCjp/51163ad7f8e6a3f23a3bdbad15dc04b6/Blog_USPS_scam_Txt_msg_and_fake_website.png","srcSet":["https://images.ctfassets.net/tdnn4v0n6ild/7wZxSsWgkNjUmGAlH3BCjp/51163ad7f8e6a3f23a3bdbad15dc04b6/Blog_USPS_scam_Txt_msg_and_fake_website.png?w=250 250w","https://images.ctfassets.net/tdnn4v0n6ild/7wZxSsWgkNjUmGAlH3BCjp/51163ad7f8e6a3f23a3bdbad15dc04b6/Blog_USPS_scam_Txt_msg_and_fake_website.png?w=500 500w","https://images.ctfassets.net/tdnn4v0n6ild/7wZxSsWgkNjUmGAlH3BCjp/51163ad7f8e6a3f23a3bdbad15dc04b6/Blog_USPS_scam_Txt_msg_and_fake_website.png?w=1000 1000w"],"sizes":"(max-width: 900px) 100vw, 900px","loading":"lazy"},"children":[]},{"type":"text","value":"\n "}]},{"type":"text","value":"\n "}]}]},{"type":"text","value":"\n"},{"type":"element","tagName":"h2","properties":{"id":"rising-scams-in-q3-2024","style":"position:relative;"},"children":[{"type":"element","tagName":"a","properties":{"href":"#rising-scams-in-q3-2024","ariaLabel":"rising scams in q3 2024 permalink","className":["anchor","before"]},"children":[{"type":"element","tagName":"svg","properties":{"ariaHidden":"true","focusable":"false","height":"16","version":"1.1","viewBox":"0 0 16 16","width":"16"},"children":[{"type":"element","tagName":"path","properties":{"fillRule":"evenodd","d":"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z"},"children":[]}]}]},{"type":"text","value":"Rising scams in Q3 2024"}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"Election scams"}]},{"type":"text","value":"\nDuring Q3 2024, election-related scams surged by 223.3%, primarily in the form of ‘junk’ SMS messages. Scammers capitalized on the election season by sending messages that looked official, often impersonating political campaigns or donation platforms. These messages urged people to donate quickly or claim free merchandise in exchange for shipping fees, with hidden recurring charges in the fine print."}]},{"type":"text","value":"\n"},{"type":"element","tagName":"div","properties":{},"children":[{"type":"element","tagName":"span","properties":{"className":["gatsby-resp-image-wrapper"],"style":"position: relative; display: block; ; max-width: 900px; margin-left: auto; margin-right: auto;"},"children":[{"type":"text","value":"\n "},{"type":"element","tagName":"span","properties":{"className":["gatsby-resp-image-background-image"],"style":"padding-bottom: 67%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;"},"children":[{"type":"text","value":"\n "},{"type":"element","tagName":"img","properties":{"className":["gatsby-resp-image-image"],"style":"width: 100%; height: 100%; margin: 0; vertical-align: middle; position: absolute; top: 0; left: 0; box-shadow: inset 0px 0px 0px 400px white;","alt":"Election Spam Text Messages","title":"","src":"https://images.ctfassets.net/tdnn4v0n6ild/61QQT7wkAchGNUE2d0N3tP/e2d36cefa8ce0b33d32ec842d8d90036/Blog_FB_msngr_scam_msgs.png","srcSet":["https://images.ctfassets.net/tdnn4v0n6ild/61QQT7wkAchGNUE2d0N3tP/e2d36cefa8ce0b33d32ec842d8d90036/Blog_FB_msngr_scam_msgs.png?w=250 250w","https://images.ctfassets.net/tdnn4v0n6ild/61QQT7wkAchGNUE2d0N3tP/e2d36cefa8ce0b33d32ec842d8d90036/Blog_FB_msngr_scam_msgs.png?w=500 500w","https://images.ctfassets.net/tdnn4v0n6ild/61QQT7wkAchGNUE2d0N3tP/e2d36cefa8ce0b33d32ec842d8d90036/Blog_FB_msngr_scam_msgs.png?w=1000 1000w"],"sizes":"(max-width: 900px) 100vw, 900px","loading":"lazy"},"children":[]},{"type":"text","value":"\n "}]},{"type":"text","value":"\n "}]}]},{"type":"text","value":"\n"},{"type":"element","tagName":"h3","properties":{},"children":[{"type":"text","value":"SSN leak impact"}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"A massive breach in Q3 exposed over 4.2 billion records, including Social Security numbers, names, and phone numbers. This 416.1% rise in leaked records has led to a significant increase in targeted phishing attacks, particularly those aimed at identity theft. With so much personal information now available, scammers are launching highly personalized phishing campaigns. "},{"type":"element","tagName":"a","properties":{"href":"https://guard.io/blog/protect-social-security-number-data-breach","target":"_blank","rel":["nofollow"]},"children":[{"type":"text","value":"Read more"}]},{"type":"text","value":"."}]},{"type":"text","value":"\n"},{"type":"element","tagName":"div","properties":{},"children":[{"type":"element","tagName":"span","properties":{"className":["gatsby-resp-image-wrapper"],"style":"position: relative; display: block; ; max-width: 900px; margin-left: auto; margin-right: auto;"},"children":[{"type":"text","value":"\n "},{"type":"element","tagName":"span","properties":{"className":["gatsby-resp-image-background-image"],"style":"padding-bottom: 67%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;"},"children":[{"type":"text","value":"\n "},{"type":"element","tagName":"img","properties":{"className":["gatsby-resp-image-image"],"style":"width: 100%; height: 100%; margin: 0; vertical-align: middle; position: absolute; top: 0; left: 0; box-shadow: inset 0px 0px 0px 400px white;","alt":"Increase in Leaked Records During Q3 2024 (in Millions)","title":"","src":"https://images.ctfassets.net/tdnn4v0n6ild/3ueRTs6EdwJQwOYchhawp8/4812b7339fc4956325b6d4444a59560a/Blog_USA_security_events_graph.png","srcSet":["https://images.ctfassets.net/tdnn4v0n6ild/3ueRTs6EdwJQwOYchhawp8/4812b7339fc4956325b6d4444a59560a/Blog_USA_security_events_graph.png?w=250 250w","https://images.ctfassets.net/tdnn4v0n6ild/3ueRTs6EdwJQwOYchhawp8/4812b7339fc4956325b6d4444a59560a/Blog_USA_security_events_graph.png?w=500 500w","https://images.ctfassets.net/tdnn4v0n6ild/3ueRTs6EdwJQwOYchhawp8/4812b7339fc4956325b6d4444a59560a/Blog_USA_security_events_graph.png?w=1000 1000w"],"sizes":"(max-width: 900px) 100vw, 900px","loading":"lazy"},"children":[]},{"type":"text","value":"\n "}]},{"type":"text","value":"\n "}]}]},{"type":"text","value":"\n"},{"type":"element","tagName":"h3","properties":{},"children":[{"type":"text","value":"Rise in crypto scams (including QR code scams)"}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"Crypto-related scams, particularly those involving QR codes, have spiked. Scammers are increasingly using deepfakes, hijacked YouTube channels, and fake QR codes to direct users to phishing sites or fraudulent crypto wallets. For example, scammers hijacked streams during major events like the Apple event, leading people to fraudulent crypto schemes. "},{"type":"element","tagName":"a","properties":{"href":"https://guard.io/blog/what-are-qr-code-scams-and-how-can-you-avoid-them","target":"_blank","rel":["nofollow"]},"children":[{"type":"text","value":"Read more"}]},{"type":"text","value":"."}]},{"type":"text","value":"\n"},{"type":"element","tagName":"blockquote","properties":{"className":["twitter-tweet"]},"children":[{"type":"element","tagName":"p","properties":{"lang":"en","dir":"ltr"},"children":[{"type":"text","value":"Scammers exploited the excitement around Apple’s event by launching several YouTube live streams featuring a deepfake of Tim Cook promoting a “crypto giveaway.†🧵"},{"type":"element","tagName":"br","properties":{},"children":[]},{"type":"element","tagName":"br","properties":{},"children":[]},{"type":"text","value":" "},{"type":"element","tagName":"a","properties":{"href":"https://twitter.com/hashtag/iPhone16?src=hash&ref_src=twsrc%5Etfw"},"children":[{"type":"text","value":"#iPhone16"}]},{"type":"text","value":" "},{"type":"element","tagName":"a","properties":{"href":"https://twitter.com/hashtag/AppleEvent?src=hash&ref_src=twsrc%5Etfw"},"children":[{"type":"text","value":"#AppleEvent"}]},{"type":"text","value":" "},{"type":"element","tagName":"a","properties":{"href":"https://twitter.com/tim_cook?ref_src=twsrc%5Etfw"},"children":[{"type":"text","value":"@tim_cook"}]},{"type":"text","value":" "},{"type":"element","tagName":"a","properties":{"href":"https://t.co/FXxFKlNlBJ"},"children":[{"type":"text","value":"pic.twitter.com/FXxFKlNlBJ"}]}]},{"type":"text","value":"— Guardio (@GuardioSecurity) "},{"type":"element","tagName":"a","properties":{"href":"https://twitter.com/GuardioSecurity/status/1833468348081864717?ref_src=twsrc%5Etfw"},"children":[{"type":"text","value":"September 10, 2024"}]}]},{"type":"text","value":" "},{"type":"element","tagName":"script","properties":{"async":true,"src":"https://platform.twitter.com/widgets.js","charSet":"utf-8"},"children":[]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"Stay safe online"}]},{"type":"text","value":"\nWith phishing scams becoming more sophisticated, brand impersonation is on the rise. The top targets in Q3 2024 include Microsoft, Steam, and Meta. Staying aware of these trends helps individuals stay vigilant, and solutions like Guardio offer protection from phishing, malware, and identity theft."}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"About Guardio"}]},{"type":"text","value":"\nGuardio offers comprehensive online security solutions to individuals and small businesses. With tools to block phishing scams, malware, and more, Guardio keeps your online presence safe and secure across all devices. Trusted by over 1.5 million users, Guardio continues to provide leading-edge protection for the modern internet user."}]}],"data":{"quirksMode":false}}}},"exitPop":null},"allContentfulBlogPost":{"edges":[{"node":{"title":"Google Chrome Not Opening: Reasons & Fixes","slug":"google-chrome-not-opening","coverImage":{"gatsbyImageData":{"images":{"sources":[{"srcSet":"//images.ctfassets.net/tdnn4v0n6ild/6JwMt4WF9ylabUphAGxz8w/4bf932a73dd3fed6259c27c3383f2089/google-chrome-not-opening.png?w=110&h=50&q=50&fm=webp 110w,\n//images.ctfassets.net/tdnn4v0n6ild/6JwMt4WF9ylabUphAGxz8w/4bf932a73dd3fed6259c27c3383f2089/google-chrome-not-opening.png?w=220&h=100&q=50&fm=webp 220w,\n//images.ctfassets.net/tdnn4v0n6ild/6JwMt4WF9ylabUphAGxz8w/4bf932a73dd3fed6259c27c3383f2089/google-chrome-not-opening.png?w=440&h=200&q=50&fm=webp 440w,\n//images.ctfassets.net/tdnn4v0n6ild/6JwMt4WF9ylabUphAGxz8w/4bf932a73dd3fed6259c27c3383f2089/google-chrome-not-opening.png?w=880&h=400&q=50&fm=webp 880w","sizes":"(min-width: 440px) 440px, 100vw","type":"image/webp"}],"fallback":{"src":"//images.ctfassets.net/tdnn4v0n6ild/6JwMt4WF9ylabUphAGxz8w/4bf932a73dd3fed6259c27c3383f2089/google-chrome-not-opening.png?w=440&h=200&q=50&fm=png","srcSet":"//images.ctfassets.net/tdnn4v0n6ild/6JwMt4WF9ylabUphAGxz8w/4bf932a73dd3fed6259c27c3383f2089/google-chrome-not-opening.png?w=110&h=50&q=50&fm=png 110w,\n//images.ctfassets.net/tdnn4v0n6ild/6JwMt4WF9ylabUphAGxz8w/4bf932a73dd3fed6259c27c3383f2089/google-chrome-not-opening.png?w=220&h=100&q=50&fm=png 220w,\n//images.ctfassets.net/tdnn4v0n6ild/6JwMt4WF9ylabUphAGxz8w/4bf932a73dd3fed6259c27c3383f2089/google-chrome-not-opening.png?w=440&h=200&q=50&fm=png 440w,\n//images.ctfassets.net/tdnn4v0n6ild/6JwMt4WF9ylabUphAGxz8w/4bf932a73dd3fed6259c27c3383f2089/google-chrome-not-opening.png?w=880&h=400&q=50&fm=png 880w","sizes":"(min-width: 440px) 440px, 100vw"}},"layout":"constrained","backgroundColor":"#088858","width":440,"height":199.99999999999997}},"tags":null,"publishDate":"March 12th","body":{"childMarkdownRemark":{"timeToRead":13}},"description":{"childMarkdownRemark":{"excerpt":"Google Chrome not opening? Discover the most common reasons behind this frustrating issue, including corrupted files, outdated versions, and software conflicts. Follow our step-by-step…"}}}},{"node":{"title":"8 Facebook Scams: How to Spot and Prevent Them in 2025","slug":"facebook-scams","coverImage":{"gatsbyImageData":{"images":{"sources":[{"srcSet":"//images.ctfassets.net/tdnn4v0n6ild/6b95IgPMV1vzJX5NC3Dnbc/73dcf25e5ced423f2a4c4f4ad8cedd34/facebook-scams.jpg?w=110&h=50&q=50&fm=webp 110w,\n//images.ctfassets.net/tdnn4v0n6ild/6b95IgPMV1vzJX5NC3Dnbc/73dcf25e5ced423f2a4c4f4ad8cedd34/facebook-scams.jpg?w=220&h=100&q=50&fm=webp 220w,\n//images.ctfassets.net/tdnn4v0n6ild/6b95IgPMV1vzJX5NC3Dnbc/73dcf25e5ced423f2a4c4f4ad8cedd34/facebook-scams.jpg?w=440&h=200&q=50&fm=webp 440w,\n//images.ctfassets.net/tdnn4v0n6ild/6b95IgPMV1vzJX5NC3Dnbc/73dcf25e5ced423f2a4c4f4ad8cedd34/facebook-scams.jpg?w=880&h=400&q=50&fm=webp 880w","sizes":"(min-width: 440px) 440px, 100vw","type":"image/webp"}],"fallback":{"src":"//images.ctfassets.net/tdnn4v0n6ild/6b95IgPMV1vzJX5NC3Dnbc/73dcf25e5ced423f2a4c4f4ad8cedd34/facebook-scams.jpg?w=440&h=200&fl=progressive&q=50&fm=jpg","srcSet":"//images.ctfassets.net/tdnn4v0n6ild/6b95IgPMV1vzJX5NC3Dnbc/73dcf25e5ced423f2a4c4f4ad8cedd34/facebook-scams.jpg?w=110&h=50&fl=progressive&q=50&fm=jpg 110w,\n//images.ctfassets.net/tdnn4v0n6ild/6b95IgPMV1vzJX5NC3Dnbc/73dcf25e5ced423f2a4c4f4ad8cedd34/facebook-scams.jpg?w=220&h=100&fl=progressive&q=50&fm=jpg 220w,\n//images.ctfassets.net/tdnn4v0n6ild/6b95IgPMV1vzJX5NC3Dnbc/73dcf25e5ced423f2a4c4f4ad8cedd34/facebook-scams.jpg?w=440&h=200&fl=progressive&q=50&fm=jpg 440w,\n//images.ctfassets.net/tdnn4v0n6ild/6b95IgPMV1vzJX5NC3Dnbc/73dcf25e5ced423f2a4c4f4ad8cedd34/facebook-scams.jpg?w=880&h=400&fl=progressive&q=50&fm=jpg 880w","sizes":"(min-width: 440px) 440px, 100vw"}},"layout":"constrained","backgroundColor":"#98b8e8","width":440,"height":199.99999999999997}},"tags":null,"publishDate":"March 4th","body":{"childMarkdownRemark":{"timeToRead":14}},"description":{"childMarkdownRemark":{"excerpt":"Discover the latest Facebook scams in 2025 and how to protect yourself. Learn to identify phishing attacks, fake giveaways, impersonation scams, and marketplace fraud. Get expert tips…"}}}},{"node":{"title":"Can You Get Hacked by Responding to a Text? Prevention Tips","slug":"can-you-get-hacked-by-responding-to-a-text","coverImage":{"gatsbyImageData":{"images":{"sources":[{"srcSet":"//images.ctfassets.net/tdnn4v0n6ild/6fiDLeqe0yjbmPkF7YB9f6/c43a8f61f0e3d8a81a2162f653d05213/can-you-get-hacked-responding-to-a-text.jpg?w=110&h=50&q=50&fm=webp 110w,\n//images.ctfassets.net/tdnn4v0n6ild/6fiDLeqe0yjbmPkF7YB9f6/c43a8f61f0e3d8a81a2162f653d05213/can-you-get-hacked-responding-to-a-text.jpg?w=220&h=100&q=50&fm=webp 220w,\n//images.ctfassets.net/tdnn4v0n6ild/6fiDLeqe0yjbmPkF7YB9f6/c43a8f61f0e3d8a81a2162f653d05213/can-you-get-hacked-responding-to-a-text.jpg?w=440&h=200&q=50&fm=webp 440w,\n//images.ctfassets.net/tdnn4v0n6ild/6fiDLeqe0yjbmPkF7YB9f6/c43a8f61f0e3d8a81a2162f653d05213/can-you-get-hacked-responding-to-a-text.jpg?w=880&h=400&q=50&fm=webp 880w","sizes":"(min-width: 440px) 440px, 100vw","type":"image/webp"}],"fallback":{"src":"//images.ctfassets.net/tdnn4v0n6ild/6fiDLeqe0yjbmPkF7YB9f6/c43a8f61f0e3d8a81a2162f653d05213/can-you-get-hacked-responding-to-a-text.jpg?w=440&h=200&fl=progressive&q=50&fm=jpg","srcSet":"//images.ctfassets.net/tdnn4v0n6ild/6fiDLeqe0yjbmPkF7YB9f6/c43a8f61f0e3d8a81a2162f653d05213/can-you-get-hacked-responding-to-a-text.jpg?w=110&h=50&fl=progressive&q=50&fm=jpg 110w,\n//images.ctfassets.net/tdnn4v0n6ild/6fiDLeqe0yjbmPkF7YB9f6/c43a8f61f0e3d8a81a2162f653d05213/can-you-get-hacked-responding-to-a-text.jpg?w=220&h=100&fl=progressive&q=50&fm=jpg 220w,\n//images.ctfassets.net/tdnn4v0n6ild/6fiDLeqe0yjbmPkF7YB9f6/c43a8f61f0e3d8a81a2162f653d05213/can-you-get-hacked-responding-to-a-text.jpg?w=440&h=200&fl=progressive&q=50&fm=jpg 440w,\n//images.ctfassets.net/tdnn4v0n6ild/6fiDLeqe0yjbmPkF7YB9f6/c43a8f61f0e3d8a81a2162f653d05213/can-you-get-hacked-responding-to-a-text.jpg?w=880&h=400&fl=progressive&q=50&fm=jpg 880w","sizes":"(min-width: 440px) 440px, 100vw"}},"layout":"constrained","backgroundColor":"#686868","width":440,"height":199.99999999999997}},"tags":null,"publishDate":"February 26th","body":{"childMarkdownRemark":{"timeToRead":10}},"description":{"childMarkdownRemark":{"excerpt":"Text messaging scams are on the rise, making it essential to stay vigilant. This article explores the risks of responding to suspicious texts, common scam techniques, and effective…"}}}}]}},"pageContext":{"slug":"most-imitated-brand-in-phishing-attacks-for-q3-2024","breadcrumb":{"location":"/most-imitated-brand-in-phishing-attacks-for-q3-2024","crumbs":[{"pathname":"/","crumbLabel":"Blog"},{"pathname":"/most-imitated-brand-in-phishing-attacks-for-q3-2024","crumbLabel":"most-imitated-brand-in-phishing-attacks-for-q3-2024"}]}}},"staticQueryHashes":["1614255152"]}