With more businesses functioning online, exposure to computers and the Internet has increased manifold. Thus, you have cybercriminals growing in number as well. Hackers are becoming more intelligent than before. However, phishing is still the top threat among all breaches analyzed over the past one year. Therefore, it has become imperative for business organizations to know about phishing and phishing protection methods to apply to prevent them.
We shall now talk about some of the common types of phishing and see how organizations can defend themselves against them.
Emails appear to originate from a recognized sender.
Steals data by impersonating a genuine provider.
In this type of phishing, the cybercriminals impersonate a legitimate provider to steal personal information such as credit card details or login credentials of financial institutions. One example of such deceptive phishing is that of PayPal scammers.
Hackers send out emails to recipients to click on a link to ‘rectify specific discrepancy’ in their accounts. However, the link directs the recipients to a fake PayPal Login Page that the hacker uses to steal info. As a user, one should verify all the URLs carefully and look for spelling mistakes, grammatical errors, or generic salutations, and be vigilant to tackle such phishing attempts.
Spear Phishing
Characteristics of spear phishing:
Commonly observed on social media sites.
The email looks like it originates from a known sender.
Uses personalized info about the target.
As the name suggests, spear phishing is targeted-phishing. The hacker collects the target’s name, email id, organization details, work phone number, and other crucial information. The objective is to trick the target into believing that they have a connection with the sender. The hacker aims to trick the target into clicking on a spurious link or download a malicious attachment through which he/she attempts to steal personal information. One can observe such spear-phishing in social media sites like LinkedIn, where it is easy to collect information and craft a targeted attack email.
The best phishing protection methods to employ to guard against spear-phishing are:
Be careful when sharing sensitive private information with people
An automated email-analyzing solution to identify such phishing emails is the best investment to make.
CEO Fraud
Characteristics of CEO Frauds:
It usually targets top-level executives.
The objective is to authorize fraudulent financial transactions.
Obtain crucial tax info on all employees.
The modus operandi of the cybercriminals is simple in this type of phishing attack. They try to get hold of the login details of a top enterprise executive. In doing so, the hackers impersonate the CEO or high-ranking official to authorize the financial transactions of the business organization. The criminals also use the same email account to request the taxation or W-2 information of all employees. This information has a high demand on the dark web.
Usually, you do not see high-ranking officials or CEOs participating in the employee phishing awareness programs. Hence, it becomes easy for hackers to target this exclusive group. Here are some phishing protection methods to counter such threats.
Ensure that the top-ranked executives take part in phishing awareness training programs so that they do not become vulnerable targets.
Make sure that the business organization adopts multi-level authentication for authorizing financial transactions.
Pharming
As a result of business organizations adopting phishing awareness programs and the like, the awareness levels of the employees are now high. Hence, it has become challenging for cybercriminals to choose the traditional phishing scams. Therefore, they resort to a new type of phishing known as pharming.
Characteristics of pharming:
Redirect the victim to a malicious website.
Change the IP address associated with a specific website.
Leverage cache-poisoning against DNS servers.
The Internet uses the Domain Name System to convert alphabetical websites to a numerical form to locate and direct visitors easily. The DNS cache poisoning attack entails the hacker targeting a DNS server and changes the IP address associated with the alphabetical name of the website. Thus, the cybercriminal redirects users to a malicious website of their choice. The problem with pharming is that the victim experiences the same issue even when he/she enters the correct site name instead of clicking on the link.
Use only HTTPS-protected websites as far as possible.
Have an updated anti-virus software solution installed on your computer networks.
Ensure to update your security patches regularly.
We have discussed four innovative methods of phishing adopted by cybercriminals all over the world and examined the phishing protection methods that one should use to tackle such phishing attempts. Ultimately, it boils down to two aspects:
Have up to date security systems installed on your computers.
Increase your awareness levels and be vigilant at all times.
These are the most straightforward phishing protection methods you can employ at all times.
The real trick to any phishing scam is getting the victim to let their guard down. Every technique imaginable has been tried. But maybe the most effective one is the one that’s now being used in more phishing attacks: conversation hijacking.
If you want bona fide proof that someone is smart, what would you look for? A medical degree? A PhD? How about a Nobel Prize? Yes. If someone has won a Nobel Prize, it’s pretty safe to assume they’re smart. But, smart enough to avoid getting phished? Maybe not, because that’s exactly what happened recently.
According to Yahoo News, “Nobel laureate Paul Krugman said he likely fell for a phishing scam.” Yep, that Paul Krugman. “The Distinguished Professor of Economics at the Graduate Center of the City University of New York, and a columnist for The New York Times.” He knows economics. Email security not so much.
Nobody wants to get phished. And if you think about getting phished, you probably envision a worst case scenario. Maybe you see your credit rating taking a hit or perhaps even getting your bank account drained. All very bad outcomes. But, these are just consequences you see from a potential phishing attack. What can be much worse is the unseen ripple effect of a phishing attack.
If you fall for the latest phishing attack aimed at American Express cardholders, you may not have a home left to leave. According to Strategic Revenue, “This AMEX Email Phishing Scam Wants You Homeless & Poor, With A Zero FICO Score.” Yikes.
This latest phishing scam is hitting hundreds of thousands of inboxes just in time for Christmas. According to the article, “You receive an email which appears to be from American Express, but it isn’t, it’s from some unscrupulous hacker hiding somewhere behind a computer who is looking to steal your identity.”
Microsoft is a big target for hackers, and it seems that they have recently come up with two new and novel phishing attack methods to go after the company’s customers. And the thing that makes these phishing tactics so scary, is that they bypass traditional security measures.
The first of these phishing attacks, reported by Latest Hacking News, uses a local login form to bypass security. The attack starts with “an email notifying users about a ‘copy of payment notification’.” The email doesn’t say much, but does contain an HTML attachment.
If you don’t already know, phishing attacks are not a technology exploit, they are a human exploit. Phishing technology itself is usually not that clever. A fake email, a fake website, and you have all the makings of a phishing attack.
The real trick to successful phishing attacks is the way they exploit human weaknesses. And there’s no greater human weakness than greed. People have been known to make some really dumb decisions when they let greed get the better of them. Hackers know it, and they use it in social engineering, which is a precursor to most phishing attacks.
Hackers are always looking for ways to make their phishing attacks more effective. Afterall, phishing scams are big business. The last thing a hacker wants to do is to go through all that trouble of social engineering, putting up a fake website and crafting a clever phishing email only to send that email to a dead account. One without a live person on the other end opening the email.
People are getting wise to IRS phishing scams which happen during tax season. So, what do hackers do? Send out the same phishing emails out of season to catch unsuspecting victims off guard.
According to an article on ARS Technica, “Tax return scammers usually strike early in the year, when they can turn the personal information of victims into fraudulent tax refund claims. But members of Akamai’s threat research team found a recent surge in off-season phishing attacks masquerading as notices from the Internal Revenue Service, targeting over 100,000 individuals.”
It’s the most wonderful time of the year…for hackers. And while all indications are that hackers are actually getting started early this year with phishing emails, you can expect Black Friday and Cyber Monday to be the main events.
According to Global Security Mag, “Black Friday and Cyber Monday marks the traditional start to the holiday shopping season. Yet, with 39% of shoppers starting before then, cybercriminals have kicked off the season early too.” Their research indicates a 400% increase in pre-holiday phishing activity specifically targeted at “well-known online shopping sites.”
At its core, phishing is a pretty simple exploit. Send a malicious email, but make it look like it comes from some person or some company you know and trust.
One of the most frequently-used phishing tactics is domain name spoofing.Domain name spoofing occurs when an attacker appears to use a company’s domain to impersonate a company or one of its employees. This can be done by sending an email with a false domain name that looks like the correct domain name, or including a link in an email to what appears to be a trusted domain.
Well, according to Proofpoint’s Q3 2019 Threat Report, if you got phished, there’s an 88% chance it’s because you clicked on a malicious link. So, the correct answer is #1. And that’s just one of the findings in the latest quarterly report.
Phishing attacks are endless, escalating in numbers, frequency, and intensity with phishers launching hundreds of thousands of attacks every day. You may be wondering why authorities can’t keep check of this nefarious activity. Well, what makes it so challenging to prevent these attacks is the fact that the attackers are tech-savvy people who are professionals in what they do, and they keep on improving their techniques and modus operandi. However, one can adopt anti-spam measures and phishing protection strategies to protect oneself to a great extent, if not entirely, from these cyber threats.
By now you probably know what comes before a data breach: a phishing attack. Phishing is the attack vector the bad guys use most often to steal the credentials which lead to the data breach. Did you ever ask yourself what comes after a data breach? Well, if you’re a small business, the answer is not good.
From Stay Safe Online, “A new survey released by the National Cyber Security Alliance (NCSA) today found that an overwhelming majority of small businesses believe that they are a target of cybercriminals, highlighting the growing awareness among small businesses about the threat of a cyberattack.”
Say what you will about hackers, but they do their homework. They don’t just send out phishing emails willy nilly. The send them out and measure their effectiveness, including what day of the week is the most effective to send them on.
According to an article on NationalCybersecurity.com, research “has revealed more malicious emails are delivered on Monday mornings than any other day.” As if Mondays weren’t bad enough already. “More than 30 per cent of all cyber-attack emails sent by opportunistic hackers and scammers go out on the first day of the week, declining steadily with each passing weekday.”
When it comes to getting hit by ransomware, it doesn’t get much worse than the city of Baltimore. When the city got hit by ransomware earlier this year, apparently it had neither anti-phishing software protecting its email accounts nor cyberinsurance in the event that it did. And because the city has refused to pay the ransom ($76,000), it has spent in excess of $18 million restoring systems to date.
Most phishing attacks are pretty straight forward. They try to get the login credentials to your bank account, wipe you out and go on vacation. I’m not really sure about the vacation part, but the rest is pretty typical.
What else is typical is that the way to get your credentials is to send you an email with a link to a bogus website that captures your information and looks convincing enough so that you’ll provide it. Phishing attacks mostly come by email, but not always.
Phishing attempts are up 400% from January to July 2019, according to a new Webroot report. That’s not a shocking statistic. Afterall, phishing is a very profitable business and profitable businesses tend to reinvest in their business. The more successful phishing becomes, the more phishing attacks you’d expect to see.
Not if you believe the latest headlines. According to an article in Wired magazine, it’s not just the Russians anymore who are trying to affect the upcoming U.S. elections. Apparently, the Iranians are now trying to get in on the action too.
It’s a dubious honor. Apparently the people inAustralia are really bad when it comes to phishing attacks. How bad? “Over half of office workers have been victims of a phishing attack.” Half!
“Australians are among the most frequently targeted by hackers and cybercriminals, and the numbers back that up. Over 50 per cent of the office workforce have been victims of a hacking attack of some kind, according to recent research on the matter. The global-scale study was performed by online security firm Webroot, a company based in the United States of America.”
Could you spot a phishing email if one made it into your inbox? I’ll bet you think you could. Most people do, but they’re wrong.
According to a Webroot survey, “While a majority (79%) of people say they are able to distinguish a phishing message from a genuine one, nearly half (49%) also admit to having clicked on a link from an unknown sender while at work. Further, nearly half (48%) of respondents said their personal or financial data had been compromised by a phishing message.”