Top 20 Words Cybercriminals Utilize in Fake Emails

FireEye®, Inc., the leader in stopping advanced cyber attacks, today announced the release of “Top Words Used in Spear Phishing Attacks to Successfully Compromise Enterprise Networks and Steal Data,” a report that identifies the social engineering techniques cybercriminals use in email-based advanced cyber attacks.

The full report, which includes lists of the words and file extensions used by cybercriminals in email-based advanced cyber attacks, is available for download here.

The top words cybercriminals use create a sense of urgency, to trick unsuspecting recipients into downloading malicious files. The top word category used to evade traditional IT security defenses in email-based attacks relates to express shipping, according to FireEye.

Urgent terms such as “notification” and “alert” are included in about 10 percent of attacks. An example of a malicious attachment is “”

“Cybercriminals continue to evolve and refine their attack tactics to evade detection and use techniques that work. Spearphishing emails are on the rise because they work.” said Ashar Aziz, founder and CEO, FireEye. “Signature-based detection is ineffective against these constantly changing advanced attacks, so IT security departments need to add a layer of advanced threat protection to their security defenses.”

Cybercriminals also tend to use finance-related words, such as the names of financial institutions and an associated transaction such as “Lloyds TSB – Login Form.html,” and tax-related words, such as “” Travel and billing words including “American Airlines Ticket” and “invoice” are also popular spear phishing email attachment key words.

Spear phishing emails are particularly effective as cybercriminals often use information from social networking sites to personalize emails and make them look mostly authentic. When unsuspecting users respond, they may inadvertently download malicious files or click on malicious links in the email, allowing criminal access to corporate networks and the potential exfiltration of intellectual property, customer information, and other valuable corporate assets.

FireEye highlights that cybercriminals primarily use zip files in order to hide malicious code, butalso ranks additional file types, including PDFs and executable files.

Top 20 Words Cybercriminals Utilize in Fake Emails 2011 and 2012

Top fake email words 2012

Top 20 words cybercriminals use in fake emails

); ga('send', 'pageview');