September 10, 2018 By David Bisson < 1 min read

Well over half of targeted email attacks between April and June 2018 were aimed at individual contributors and low-level managers, according to a new report.

Proofpoint researchers discovered that individual contributors and low-level management together accounted for 60 percent of highly targeted attacks, which consisted primarily of malware and credential phishing. By comparison, upper management and executives received 23.5 percent and 5.2 percent of targeted attacks, respectively.

The enterprise security firm noted that those findings show how upper management and executives sustained “a disproportionately large share of attacks” given their smaller representation in the total workforce.

Email Attacks Are Surging Across Industries

These findings come amid an ongoing surge in malicious email messages: The researchers observed a 36 percent increase in email attacks between the first and second quarters of 2018. While companies of every size were targeted, some industries, such as retail, healthcare and government, experienced greater rates of growth for business email compromise (BEC) than other sectors.

The report revealed that most companies across all industries had been targeted by email fraudsters at least once. The number of attacks rose by 85 percent in the second quarter compared to the previous year. The growth rates were even larger for the automotive and education industries, at 400 percent and 250 percent, respectively.

How to Defend Against Targeted Attacks

Proofpoint advised security professionals to defend individual contributors, lower-level management and other staff members against targeted email attacks by partnering with a threat intelligence firm and leveraging a social media security solution to combat fake online accounts. Security teams should also consider creating a comprehensive security awareness program for the entire workforce.

Source: Proofpoint

More from

FYSA — VMware Critical Vulnerabilities Patched

< 1 min read - SummaryBroadcom has released a security bulletin, VMSA-2025-0004, addressing and remediating three vulnerabilities that, if exploited, could lead to system compromise. Products affected include vCenter Server, vRealize Operations Manager, and vCloud Director.Threat TopographyThreat Type: Critical VulnerabilitiesIndustry: VirtualizationGeolocation: GlobalOverviewX-Force Incident Command is monitoring activity surrounding Broadcom’s Security Bulletin (VMSA-2025-0004) for three potentially critical vulnerabilities in VMware products. These vulnerabilities, identified as CVE-2025-22224, CVE-2025-22225, and CVE-2025-22226, have reportedly been exploited in attacks. X-Force has not been able to validate those claims. The vulnerabilities…

SoaPy: Stealthy enumeration of Active Directory environments through ADWS

10 min read - Introduction Over time, both targeted and large-scale enumeration of Active Directory (AD) environments have become increasingly detected due to modern defensive solutions. During our internship at X-Force Red this past summer, we noticed FalconForce’s SOAPHound was becoming popular for enumerating Active Directory environments. This tool brought a new perspective to Active Directory enumeration by performing collection via Active Directory Web Services (ADWS) instead of directly through Lightweight Directory Access Protocol (LDAP) as other AD enumeration tools had in the past.…

Smoltalk: RCE in open source agents

26 min read - Big shoutout to Hugging Face and the smolagents team for their cooperation and quick turnaround for a fix! Introduction Recently, I have been working on a side project to automate some pentest reconnaissance with AI agents. Just after I started this project, Hugging Face announced the release of smolagents, a lightweight framework for building AI agents that implements the methodology described in the ReAct paper, emphasizing reasoning through iterative decision-making. Interestingly, smolagents enables agents to reason and act by generating…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today