New report details the brands that scammers like to impersonate most — and you'll definitely guess who's at the top

Hooded cybercriminal sitting with laptop surround by hooks
(Image credit: Getty Images)

Scammers and hackers love posing as your favorite brands as a way to draw you into their schemes as brand impersonation gives them an easy way into your inbox.

As reported by Cybernews, the cybersecurity company Check Point details the most impersonated brands in phishing schemes from Q4 of 2024 – and to no one’s surprise, Microsoft continues to top the list with a third, or 32%, of all attempts.

Tying for second and third places respectively were Apple and Google with 12% each, and LinkedIn, which is owned by Microsoft, came in fourth with 11%. The remainder of the list, with each entry getting 4% or less, were: Alibaba, WhatsApp, Amazon, Twitter, Facebook and Adobe.

While attackers often choose Microsoft because they’re specifically targeting Microsoft credentials as their goal, in its report, Check Point points out that it’s important to stay vigilant for the impersonation of other brands. The report details a number of fraudulent domains that popped up over the holiday season in attempts to mislead and confuse shoppers with look-alike URLs and fake discounts with the goal of stealing log-in credentials and personal information.

Some of the examples highlighted were nike-blazers[.]fr or adidasyeezy[.]ro which closely replicate official websites – including logos – and offer unrealistically low prices for limited times in order to pressure or lure victims into entering their personal information.

The hackers frequently localized fraudulent websites by using country-specific domains, for example, ralphlaurenmexico[.]com[.]mx. Other examples mentioned include a site that mimicked a copy of PayPal’s login page, or svfacebook[.]click which imitated the original Facebook login page.

In the report, Check Point states “the persistence of phishing attacks leveraging major brands underscores the critical need for user education and advanced security measures.”

How to stay safe from phishing scams

Fish hook on a keyboard

(Image credit: Shutterstock)

In its report, Check Point recommends many of the same security practices we do: verifying email sources, meaning making sure you know who sent an email, avoiding unfamiliar links or never clicking on anything unless you know where it came from, and enabling multi-factor authentication to protect against scammers.

Check Point also says users can reduce their risk by installing up-to-date security software, recognizing red flags in unsolicited communications and avoiding any interactions with suspicious links or websites.

We have recommendations for the best antivirus software programs that you can install right now to protect your computer, which often include a VPN or a password manager. For best security practices, make sure you know how to avoid common phishing scams – check that you're visiting legitimate websites by typing them into your browser yourself, instead of clicking on links, ask senders if they’ve emailed or messaged you instead of clicking links in messages or emails, and never, under no circumstances whatsoever, reuse passwords.

More from Tom's Guide

Network
Arrow
Intego
Norton
Contract Length
Arrow
Showing 2 of 2 deals
Filters
Arrow
TOPICS
Amber Bouman
Senior Editor Security

Amber Bouman is the senior security editor at Tom's Guide where she writes about antivirus software, home security, identity theft and more. She has long had an interest in personal security, both online and off, and also has an appreciation for martial arts and edged weapons. With over two decades of experience working in tech journalism, Amber has written for a number of publications including PC World, Maximum PC, Tech Hive, and Engadget covering everything from smartphones to smart breast pumps. 

Read more
A person typing on a computer while hackers use phishing to steal a file from their computer
Phishing: What is it, and how to avoid it
A hacker typing quickly on a keyboard
Hackers are posing as Apple and Google to infect Macs with malware — don’t fall for these fake browser updates
PayPal logo on iPhone
Watch out! Scammers are using this PayPal setting to take over your PC
Reddit logo and Reddit logo on phone
Hackers have created hundreds of fake Reddit sites to spread info-stealing malware
A hacker typing on a computer
FBI issues serious warning to iPhone and Android users — stop doing this ASAP
MacBook Pro 2023
New Mac attack is tricking users into thinking their computer is locked — how to stay safe
Latest in Online Security
23andME box
23andMe has declared bankruptcy — here's how to delete your data now
A magnifying glass on top of the Steam logo in a web browser
Valve just pulled a malicious game demo spreading info-stealing malware from Steam
A man filing his taxes electronically on a laptop
AI-powered tax scams are here - how to stay safe from deepfakes, phishing and more this tax season
MacBook Pro 2023
New Mac attack is tricking users into thinking their computer is locked — how to stay safe
Hacker using a stolen social security card
Your Social Security number is a literal gold mine for scammers and identity thieves — here’s how to keep it safe
An open lock depicting a data breach
Half a million teachers hit in major data breach with SSNs, financial data and more exposed — what to do now
Latest in News
Surface Laptop 7 from the front
Amazon just gave Surface Laptop 7 a 'frequently returned' label — here's what's going on
New emojis with iOS 18.4 beta release.
iOS 18.4 beta brings 8 new emoji to your iPhone — here's all the new options
23andME box
23andMe has declared bankruptcy — here's how to delete your data now
half-life alyx
Latest Half-Life 3 rumors point to a 2025 release — and maybe pigs will fly
NFL Sunday Ticket logo for YouTube
NFL Sunday Ticket 2025 pricing revealed — and it's bad news
Ben Mendelsohn in Andor season 2
'Welcome to the Rebellion' — new ‘Andor’ season 2 trailer teases a darker edge