How to Recognize Common Phishing Attacks

Security-Left.png
How to Recognize Common Phishing Attackscommon-
security-right.png

 
May 02, 2018

What is Phishing?

Phishing, not to be confused with the outdoor activity, fishing, is a cybercrime that targets people by way of email, phone call, or text message posing as a representative of a legitimate company the target is familiar with to gain sensitive information like passwords, credit card numbers, or personal ID information. With this information, the phishers use it to access personal accounts, resulting in identity theft and financial losses.

 

Check it out: What Is Phishing? (Video)

 
 

 

What to Look Out For In a Phishing Email:

  • IT'S TOO GOOD TO BE TRUE! – If you open an email telling you that you’ve won some expensive prize, like an iPhone, or a large cash prize, that’s automatically a red flag. Phishing emails will use attention-grabbing sentences like these, so you open them because you’ve “won” something great. Don’t fall for it!

 

  • IMMEDIATE ATTENTION – It’s common for these emails to make you act fast on a deal they are offering. Of course, the deal is only a limited time offer and you shouldn’t pass it up, right? Wrong! Avoid these offers by ignoring the email.

 

  • HYPERLINKS – When you hover over a link, you will see the actual URL of where you will be directed after opening the link. Pay attention, because if there are any misspellings in the URL, this is not a safe or legitimate hyperlink.

 

  • ATTATCHMENTS – If you open an email to see an attachment you weren’t expecting, don’t open it. Those attachments often contain ransomware or other viruses. The only safe file type to open is a .txt file.

 

  • ABNORMAL SENDER – Whether the sender seems like someone you know or don’t know, if something seems unusual about it, leave it alone and don’t even click on it!

 

Check it out: Signs Your Smartphone Has Been Hacked

 

6 Common Phishing Attacks:

1. DECEPTIVE PHISHING

This is the most common type of phishing out there. Deceptive Phishing refers to an attack where the target (you), receives an email that resembles a company you are all too familiar with and even trust, and are asked to enter some sensitive information such as a login password. From there, that information is used to deliver the target to cyber attackers. Deceptive Phishing is just that, deceptive. When an email has a sense of urgency to its message, usually having to do with the account in question, the target is deceived into thinking they need to act fast and follow the instructions.

Deceptive Phishing only succeeds when the attack email closely resembles a legitimate company’s official appearance and tone. Most often, these emails will never be completely perfect, and the receiver of the email can look for discrepancies in the grammar, spelling, and URL address.

 

How to avoid these:

Look out for generic greetings or requests for information that the company should have already known.

 

Check it out: Infographic: What Is Attacking My Computer?

 

 2. SPEAR PHISHING

This type of phishing is a more sophisticated type of attack because unlike Deceptive Phishing, Spear Phishing using loads of personalization to attract targets. A Spear Phishing email will often include the target’s name, company, work phone number, etc. in order to trick the target into thinking they can trust the sender. The goal is the same as Deceptive Phishing; to get the target to click on dangerous URL links or attachments to enter personal information.

Spear Phishing is common on social media platforms, such as LinkedIn, where attackers are able to obtain multiple sources of a target’s information to design a personalized email.

 

How to avoid these:

Look out for typos and threats. Conduct employee security awareness training and invest in analyzing software for inbound emails that check for malicious links or attachments.

 

3. CEO FRAUD

This type of phishing is often partnered with Spear Phishing. While Spear Phishing targets anyone in a company, CEO Fraud is the second phase. Attackers will impersonate an executive and abuse their email to authorize illicit wire transfers to a financial institution.

These are also called “Whaling” attacks because they target the higher-ups in a company to steal their information. These types of attacks work because executives don’t often participate in employee security awareness training.

 

How to avoid these:

Check unusual requests with your boss before taking further action within the email. Amend financial policies in the company so that no one can authorize a transaction through an email. Lastly, ensure that executives undergo security awareness training along with employees.

 

4. PHARMING

This is a different type of phishing than the others because it does not follow the tradition of baiting targets through emails. Instead, Pharming is executed by converting website addresses into numerical IP addresses in order to locate computer services and devices.

The Internet uses DNS (domain name system), which is used to convert the website name to the IP address. After attacking the DNS server, the pharmer changes the IP address to redirect the target to a malicious website, even when the target has entered the right website name.

 

How to avoid these:

Encourage employees to only enter in login in information on HTTPS-protected sites. Installing anti-virus software and issuing security upgrades on a regular basis are important. Look out for the URL of any site that is asking for data and make sure there is a security certificate.

 

Check it out: Don't Get Hooked: How To Recognize and Avoid Phishing Attacks (Infographic)

 

5. DROPBOX PHISHING

This type of phishing is a more specialized attack that targets an individual company or service. Dropbox Phishing is emails that look realistic and claim to originate from Dropbox, a commonly used file-sharing platform.

The email will request the user to secure their account or to download a shared document, using a fake Dropbox login page hosted on Dropbox. When this phishing is successful, and the target has entered their information, malware will be installed on their computer.

 

How to avoid these:

Consider implementing a two-step verification on their Dropbox account.

 

6. GOOGLE DOCS PHISHING

This type of phishing is similar to Dropbox Phishing in the sense that it uses a particular platform and mimics it to attack users. Google Docs Phishing sends users a message invite to view a document, taking them to a landing page that is, in fact, a Google Drive, so it appears to be the real deal until the target enters their information, which is then sent right to scammers.

Google Drive supports documents, files, photos, and even websites that phishers are able to use to create a site that exactly imitates that of the Google account login screen.

 

How to avoid these:

Just like the Dropbox Phishing solution, implementing a 2SV (two-step verification) will help to protect the user against this type of attack. Also, examine the page for errors and check which service you are entering.

SHARE BLOG POST