Phishing attacks are an increasingly frequent problem and a grave threat that can cripple businesses and ruin lives. These attacks can come in a variety of forms but always have the same malevolent intent; to steal your personal details or your money. As you can imagine, victims of a phishing attack typically suffer from financial loss and identity theft and in the case of company employees, may even lose their jobs. As we currently live in an age where technology is always developing and most people are online, the risk of phishing attacks happening and succeeding is higher than ever. Therefore, to combat this growing threat, we must come prepared to safeguard ourselves and our information from any would-be attacker. In this blog, we will be exploring the more common types of phishing and the many ways in which we can protect ourselves from a phishing attack.
When it comes to cyber attacks, one of the first types you may think of is phishing. But what exactly is meant by a phishing attack? Well, a phishing attack is typically in the form of an email or text message, containing a link to a website that contains malware. Malware is a dangerous piece of software, used to steal data or damage your computer system. As you can imagine, for a company this could result in a lot of harm. A common type of malware used in phishing attacks is ransomware, that is designed to stop you from accessing your computer system by encrypting your data. This leads to threats of the data remaining inaccessible until the company targeted sends a ransom. For businesses, this may cause even more issues than just the original financial loss. Their reputation may also take a hit, leading to broken trust between them and their customers. Worse yet, they may lose even more money due to lost business and maybe even legal fees.
The aim of a phishing attack isn’t always to obtain money though, although that is one of the main reasons. The attack may also be with the intention of obtaining personal information from the victim such as passwords, bank details, usernames, etc. Attackers will then use or sell this information for their personal gain. Some phishing attacks can become quite personal with the attackers utilising social engineering techniques to strike fear into their targets and create a sense of urgency to ensure that they obtain the information or money they were aiming for.
Every company is susceptible to phishing attacks so we must remain vigilant to keep us and our data protected. To help keep you aware of the ways phishing can target you, here is an in depth list of the many common forms phishing may take.
Typically, phishing attacks occur via email, often containing a link to a fake website or an attachment that contains malware. The email will usually be disguised to appear as if it is from a legitimate organisation such as Amazon or Netflix however, on closer inspection their domain will not match the company’s domain that they are mimicking. Clicking on the link or downloading the file may result in either money loss or your personal information being stolen so watch out! The link/attachment will also be accompanied with a generic request, urging you to download the file or click the link by warning you to act before it’s too late or by enticing you with an offer before it’s no longer available. Usually, the text within the email is vague as it will most likely have been sent to as many people as possible in an attempt for the attacker to get as much information or money as they can. A prevalent example of phishing is ones claiming to be from social media sites. They’ll send a link to a malicious website, asking you to tell them your account details before your account gets deactivated.
Spear phishing is a more sophisticated version of email phishing with the goal being the same but with the email being a lot more personal to you. Whilst they may be less common than your average phishing attack, they are considerably more successful and harder to detect as they disguise themselves as someone you know and trust. You can tell the attacker has done their research as they will most likely know your name, place of work and other information regarding your job role as well. This is done to reduce the amount of suspicion and increase the chances of you clicking on that malicious link, allowing the hacker to access the desired information and install a backdoor to allow further entry to more of the company’s systems. If a spear phishing attack is successful, more of the company may be at risk as spear phishing may set up the first stage of an APT (advanced persistent threat), allowing hackers access to even more information.
Whaling and spear phishing are extremely similar as they utilise the same tactic of impersonating someone you trust and making sure the email is tailored specifically to you. There is a key difference, however. A whaling phishing attack (which may also be known as CEO fraud) targets higher-ranking members of an organisation, like an executive, by pretending to be a senior member. In some cases, they may even masquerade as the CEO. This adds another layer to their social engineering tactics as staff will be pressured to give in to the request of the hacker as they won’t want to go against the wishes of their superiors.
Now phishing doesn’t always come in the form of an email. Smishing or SMS phishing is designed to attack people through the use of text messages. The means is still the same; hackers will send malicious links to you and once clicked, your information will be taken. The reason why these hackers have switched up the form of their attacks is because, with email phishing, success may be harder to achieve with new and upgraded spam filters. Alongside that, in an age where the majority of people use a phone on the daily, SMS phishing will become more commonplace. An example of this type of phishing attack you may have seen is when you are told that there has been an issue with a delivery and that you must pay a fee.
Another type of phishing attack using the phone is vishing or voice phishing. During a vishing attack, the attacker will pretend to be an employee from a certain organisation e.g. the bank. The strategy is much like the other forms of phishing, with the attacker utilising social engineering to make the target feel like they are doing the right thing by complying. The attacker will keep on persuading and threatening you until you give them your information.
After reading all of that you may be wondering “How do I protect myself from phishing attacks?” Well don’t worry, we’re here to help. Here’s a list of some red flags to look out for:
It is also worth noting, the National Cyber Security Centre encourages people to report phishing attacks when they see them, even if you do not fall foul of the attack itself.
Ideally, we want to avoid phishing attacks as much as possible. This is a hard task, however, as attacks are constantly changing and evolving and, chances are, it’s inevitable that you will receive one. But, there is no harm in taking some precautions and reducing how open you are to them. So, here are some ways you can prevent phishing attacks:
From emails to phone calls, cyber criminals are employing increasingly sophisticated and manipulative tactics to deceive people and organisations alike. Protecting our data is a continuous and hard battle but we must remain vigilant against these practices if we want to remain safe.
Always remember that by educating yourself on what to look out for and implementing the above precautions, you will be helping yourself and your organisation to avoid the theft of your personal data. Stay alert and stay safe!
The post How to Protect Against Phishing Attacks appeared first on Sencode.
*** This is a Security Bloggers Network syndicated blog from Blog - Sencode authored by Leah Hopper. Read the original post at: https://sencode.co.uk/how-to-protect-against-phishing-attacks/