Malicious HTML attachments double in the last year
Last May, 21 percent of all HTML attachments scanned were malicious. Ten months on, that figure has more than doubled with 45.7 percent of scanned HTML files found to be malicious in March 2023.
This finding comes from the latest Threat Spotlight report from Barracuda Networks, which shows that not only is the overall volume of malicious HTML attachments increasing, they remain the file type most likely to be used for malicious purposes.
Attackers can successfully leverage HTML as an attack technique by using well-crafted messages and/or compromised websites and malicious HTML file attachments to trick users.
Comparing the total number of malicious HTML detections with how many unique files were detected, it becomes clear that the growing volume of malicious files is not simply the result of a limited number of mass attacks, but that of many different attacks each using specially crafted files.
"The security industry has been highlighting the cybercriminal weaponizing of HTML for years -- and evidence suggests it remains a successful and popular attack tool," says Fleming Shi, chief technology officer at Barracuda. "Getting the right security in place is as important now as it has ever been. This means having effective, AI-powered email protection in place that can evaluate the content and context of an email beyond scanning links and attachments. Other important elements include implementing robust multi-factor authentication or -- ideally -- Zero Trust Access controls; having automated tools to respond to and remediate the impact of any attack; and training people to spot and report suspicious messages."