Memcyco is now available on aws marketplace Сheck it out Memcyco is now available on aws marketplace Сheck it out 

Memcyco Blog

Get the latest insights and protect your business and your customers from website spoofing fraud.

Fraud Detection

The 5 Biggest Phishing Attacks of 2024

The 5 Biggest Phishing Attacks of 2024

Phishing attacks are a huge threat. They prey on human trust and manage to trick even the most tech-savvy users. A successful attack on a company’s customers can weaken it financially, create compliance issues, and cause long-lasting reputational damage. 

Scammers have stolen over $1 trillion globally in just the past year – a staggering figure that rivals the GDP of some nations. While organizations of all sizes have their customers targeted, high-profile companies often dominate the headlines – for good reason. With their extended user bases, the ripple effects of an attack can be catastrophic. 

In 2025 and beyond, it’s crucial to consider these real-life examples to understand how attackers conduct their intricate schemes and define the level of protection you need. 

Key Methods Used in Phishing Attacks

All phishing attacks involve tricking users into sharing sensitive information by pretending to be someone or something else. However, attackers use various methods and channels to conduct these attacks. 

Email Phishing

Email phishing involves sending mass emails to trick recipients into clicking malicious links or sharing personal details. While some scam attempts are evident due to spelling errors, poor grammar, or generic greetings, some emails are expertly crafted to mimic legitimate communications. 

Smishing

Smishing is like phishing but in the form of text messages. It often masquerades as urgent communications, tricking users into clicking on malicious links or sharing sensitive details. 

Spear Phishing and Whaling

Attackers use spear phishing to target specific individuals or groups, often utilizing details from prior breaches to craft personalized emails that trick recipients into complying with their demands. Whalers focus on company executives, mimicking legal or financial communications to extract critical corporate information.

Spear phishing vs phishing

Source

Vishing

Vishing scams involve attackers posing as trusted representatives over the phone. They may claim, for example, to fix a virus on your computer only to steal your payment information or install malware.

Web Spoofing

Attackers can create fake websites to lure victims into entering credentials and payment details. These authentic-looking sites mimic the designs of well-known sites, often using fake adverts and emails to entice visitors. 

Social Media Phishing

Hackers leverage social media platforms like Facebook or LinkedIn to impersonate trusted friends, colleagues, or brands. They send direct messages or comments containing malicious links or fake offers, luring users into sharing credentials or personal data.

SEO and Pharming Attacks

Unlike direct message scams, these methods are based on redirecting users to fake sites. SEO poisoning manipulates search rankings to direct users to fake websites resembling legitimate ones, and which rank above their genuine counterparts. Once on these fake websites, users are enticed to sensitive information. Pharming takes this further by compromising the DNS cache on a victim’s device, redirecting them to fraudulent sites even if they type the correct URL. 

Succession of a pharming attack

Source

Why Phishing Attacks are More Dangerous Than Ever

Phishing attacks have become more sophisticated, driven by easy access to phishing tools and AI’s ability to automate and scale attacks. For example, AI takes just a few seconds to generate emails that seem totally legit (as opposed to “traditional” phishing emails, with typos and weird syntax, which look suspicious up front). 

In addition, AI and machine learning (ML) power techniques like deepfake and synthetic identities, which blur the line between real and fake. These techniques make it harder to distinguish authentic communications from fraud, putting even cautious users at risk.

Lastly, tools for launching phishing attacks are so widely available that they have become a commodity, even propelling the creation of a new market segment: Phishing-as-a-Service (PhaaS). Dark web marketplaces now offer ready-made phishing kits with templates, tools, and step-by-step guides, allowing even novices to execute highly effective campaigns.

The 5 Biggest Phishing Attacks of 2024

1. Change Healthcare Attack

In February 2024, Change Healthcare fell victim to an attack that impacted over 100 million users of the company’s services. ALPHV/BlackCat carried out the breach by gaining access to Change Healthcare’s systems through compromised login details harvested by phishing. 

Once inside the system, bad actors launched an attack and then disrupted critical healthcare operations, including billing, insurance claims, and pharmacy services. This led to nationwide outages, severely impacting the healthcare sector. Despite UnitedHealth paying a $22 million ransom in March, the attackers disappeared without returning the stolen data.

The breach exposed medical data for approximately one-third of the U.S. population, causing significant financial and reputational damage to Change Healthcare. While the full economic impact is still under investigation, the attack has raised serious concerns about cybersecurity in the healthcare industry, particularly within clinics leveraging sensitive tools like embryo grading systems. Such systems rely on secure data storage and transfer; any compromise, like the one faced by Change Healthcare, could expose critical patient information. 

Unprecedented collateral damage

Source

2. Pepco Group Attack

In February 2024, Pepco Group lost around €15.5 million in a phishing attack that targeted the company’s Hungarian branch. Bad actors crafted and sent phishing emails designed to facilitate fraudulent money transfers. 

The attack is thought to have been executed using advanced AI tools to craft convincing messages without spelling errors and mirroring the tone of previous correspondence. The similarities with authentic communications made it difficult for victims to recognize the scam and reject money transfer requests. 

Pepco Group, which owns the Pepco, Dealz, and Poundland brands, operates 3,600 stores across 19 European countries, serving over 30 million customers each month. While the Pepco Group executives stated that no customer was affected, investigations are ongoing, and the lost funds may never be recovered. 

This potential case of Business Email Compromise (a highly targeted and sophisticated phishing attack where cybercriminals use hacked email accounts to trick employees) isn’t uncommon. According to the FBI, global BEC losses have totaled over $50 billion across nearly 278,000 incidents in the past decade.

Pepco Group said it had taken the necessary steps to investigate and respond to the incident. It conducts a group-wide review of all systems and processes to secure the business more robustly.

3. Fake Bank Payment Notification Scam

In March 2024, a phishing campaign sent out phishing emails disguised as bank payment notifications, which actually contained an archive file that activated a loader for the information stealer and keylogger Agent Tesla. 

The loader used obfuscation, polymorphic behavior, and advanced techniques to bypass antivirus defenses, including patching the Windows Antimalware Scan Interface (AMSI). It then deployed Agent Tesla to transfer sensitive data via SMTP using a compromised email account.

The loader was written in .NET and included two variants with distinct decryption routines. It dynamically retrieved and decoded a XOR-encoded Agent Tesla payload. The campaign leveraged stealth techniques to avoid detection and make tracing difficult.

4. StrelaStealer Campaign

Between June and August 2024, the StrelaStealer phishing campaign targeted over 100 U.S. and European organizations. It affected sectors ranging from finance and government to manufacturing. 

Attackers sent out phishing emails with ZIP attachments containing a JavaScript file that deployed the StrelaStealer. Once downloaded, this file extracts email credentials from popular email clients like Microsoft Outlook and Mozilla Thunderbird, posing significant risks to organizational security.

StrelaStealer has been active since 2022. Its main objective is to steal email login data, which can be exploited for further attacks. Email attachments are constantly updated to evade detection, using advanced obfuscation and anti-analysis techniques.

This ongoing campaign highlights the critical need for robust cybersecurity measures. User education on phishing threats, implementation of advanced email filtering solutions, and regular security training to mitigate the risks associated with such attacks are all vital.

5. Starbucks Phishing Email Campaign

In October 2024, coffee aficionados were warned about emails purporting to be from the retailer offering customers a free Starbucks Coffee Lovers box. Action Fraud, the UK’s national fraud and cyber reporting center, received over 900 reports about the scam in two weeks. The emails contained links to steal personal and financial information. 

A similar fake Starbucks Coffee Gift offer made the rounds earlier in the year. The email claimed that a friend had ordered coffee at the company and had selected the recipient for a special gift. In this case, the email contained the banking Trojan ZeuS, which would install itself and, if opened, run an instance of the hard-to-remove rootkit. 

Security analysts quickly reminded customers that organizations like Starbucks seldom request sensitive information via email and that a healthy level of skepticism towards offers that seem too good to be true is a good defense.

starbucks phishing email campaign

Source

Protecting Against the Next Wave of Phishing Attacks in 2025

Phishing attacks have become more sophisticated and pervasive, evolving from simple scams to highly targeted, large-scale campaigns. The incidents highlighted in 2024 show just how far-reaching and devastating these attacks can be, from healthcare and finance to global retail brands. As attackers increasingly leverage AI, automation, and new methods like web spoofing and PhaaS, and with the growing impact of new regulations focusing on protecting customers, companies must proactively look for more sophisticated solutions.

Memcyco uses AI and its proprietary nano-defender and device DNA technologies to detect when attackers impersonate your website. This helps prevent large-scale phishing scams that mislead users into visiting such sites, which can lead to further attacks like account takeover (ATO) scams. 

With real-time protection and complete visibility into the attacker, the device they are using, and any potential victim that has visited the fake site since it went live, Memcyco gives you the complete picture of the threat you are facing and empowers you to mitigate it quickly before it impacts more users. Prevent large-scale phishing attacks at the source. Learn more here. 

Kate Cox

Head of Business Development at Memcyco

This website uses cookies to ensure you get the best experience on our site. By continuing, you agree to our privacy policy.