Cyber Criminals Go Phishing

Phishing is the most common form of cyber crime, with an estimated 3.4 billion spam emails sent every day. Phishing is a simple attack vector that enables cyber attackers to easily scale-up their attacks, customised for their intended targets, and penetarting network security.

Most attacks are launched with the aim of making web users believe that they are communicating with a trusted entity which compels them to share their personal, financial information which is then used for criminal purposes. Phishing costs Internet users billions of dollars every year. 

SANS Institute, a leader training and cyber security certification, recent;y published a report examining new  phishing trends, providing a powerful resource for organisations looking to defend themselves from  phishing attacks.  

One of the most common methods phishing attacks have largely aimed to infect victims' computers with malware and this continues to highly effective. However, as security defenses have become more adept, attackers have shifted their objectives.

SANS have identified three primary goals of phishing attacks 

Password Harvesting:   Phishers frequently attempt to trick individuals into clicking on a link that directs them to a fraudulent website designed to steal their login credentials. Once obtained, attackers can misuse these credentials to cause substantial damage while remaining undetected.

Phone-Based Attacks:   An increasing number of phishing attacks do not include links or attachments but focus on manipulating victims to call a specified phone number. Attackers employ social engineering tactics, such as emotional manipulation, to coerce individuals into revealing sensitive information, making unauthorised purchases, or transferring funds to attacker-controlled accounts. Although these attacks require significant effort, they can yield substantial financial gains.

Scams:    Many phishing emails now omit links or attachments and instead employ impersonation tactics to deceive recipients. These short, impersonating messages often imitate someone the victim knows or trusts, such as a boss, coworker, or a familiar company.  Business Email Compromise attacks exemplify this approach, in which attackers deceive victims into performing actions without the need for malicious links or attachments.

Understanding the different types of phishing attacks your organisation will encounter is crucial to implementing effective anti-phishing solutions.

Preventing Phishing Attacks

Educating your workforce on the most common indicators and clues of phishing attacks is essential. It's not feasible to train employees on every phishing attack and lure, as attackers continually adapt their tactics. 
Focus on the indicators that transcend the method or lures used by cyber criminals. These common indicators include:

Urgency:    Emails or messages that create a sense of extreme urgency, pressuring recipients to take hasty actions, often with threats of negative consequences, usually indicate a phishing attack. For example, fake messages from government agencies claim overdue taxes and potential legal consequences.

Pressure:    Messages that pressure employees to disregard company policies and procedures, pushing them to act inappropriately, are also a red flag. BEC attacks, which manipulate individuals into making unauthorized financial transactions, are a prime example.

Curiosity:    Emails or messages that exploit recipients' curiosity or offer enticing opportunities that seem too good to be true typically betray a phishing attack. Examples include messages claiming undelivered packages or refunds from well-known companies like Amazon.

Tone Discrepancy:    Emails or messages that appear from a known sender but exhibit a tone, wording, or signature inconsistent with the sender's typical communication style are usually phishing scams.

Generic Greetings:   Messages purportedly from trusted organizations but addressed with generic salutations such as "Dear Customer" instead of personalising the recipient's name indicate a potential phishing attempt.

Personal Email Addresses:    Emails that purport to come from legitimate sources but use personal email addresses (e.g., @gmail.com) rather than official company domains are often phishing. 

While these common indicators help protect against various phishing attacks, it's essential to avoid relying on outdated indicators:

Misspellings:   Poor spelling and grammar are no longer reliable indicators, as legitimate emails with errors have become common, and attackers increasingly produce well-crafted messages.

Hovering Over Links:    Hovering over links to check their legitimacy is not recommended, as it may require teaching recipients how to decode URLs, which can be confusing and technical. Many links are obfuscated by security solutions, and this method is difficult to employ on mobile devices.

As phishing attacks evolve, staying informed about emerging trends is vital for maintaining effective defenses. Threat actors are exploiting new modalities and goals, making it essential for organisations to educate their workforce about the evolving nature of these attacks. 

Understanding the most common phishing indicators and adapting to the changing landscape is crucial in the ongoing battle against cyber threats. By doing so, organisations can enhance their security posture and reduce the risks associated with phishing attacks.

SANS:    Arvix:     Mimecast:    Science Direct:     Tripwire:

Image: AbsolutVision

You Might Also Read:

BEC Attacks: Trends & Predictions For 2024:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible





 

« The End Of Crypto Currency
British Nuclear Power Facility Attacked »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Keyfactor

Keyfactor

Keyfactor is a leader in cloud-first PKI as-a-Service and crypto-agility solutions. Our Crypto-Agility Platform seamlessly orchestrates every key and certificate across the enterprise.

Smokescreen

Smokescreen

Smokescreen's IllusionBLACK employs deception technology to detect, deflect and defeat advanced hacker attacks.

Cyberlitica

Cyberlitica

Cyberlitica (formerly iPhish) provides a Workforce Threat Intelligence application that significantly augments companies’ cyber threat prevention efforts.

R2S Technologies

R2S Technologies

R2S can help you implement a cyber security framework to ensure your business is more resilient towards the growing threat of cyber crime. We provide Web and Mobile Application Security Assessment..

BEAM Teknoloji

BEAM Teknoloji

BEAM Technology is an independent Software Quality and Security Testing Center in Turkey.

Scanmeter

Scanmeter

Scanmeter helps identifying vulnerabilities in software and systems before they can be exploited by an attacker.

Cloud Managed Networks

Cloud Managed Networks

Cloud Managed Networks provides enterprise grade IT network solutions for cloud-based and on premise network security, Wi-Fi, data switching, collaboration, device management and more.

Risk Based Security (RBS)

Risk Based Security (RBS)

Risk Based Security provide the most comprehensive and timely vulnerability intelligence, breach data and risk ratings.

Ultratec

Ultratec

Ultratec provide a range of data centric services and solutions including data recovery, data erasure, data destruction and full IT Asset Disposal (ITAD).

AgileBlue (Agile1)

AgileBlue (Agile1)

AgileBlue (formerly Agile1) is a managed breach detection company with an Autonomous SOC-as-a-Service for 24×7 monitoring, detection and guided response.

riskmethods

riskmethods

riskmethods helps you proactively identify, assess and mitigate supply chain risk. You need to master supply chain risk management—we can help.

Spotit

Spotit

Spotit offers a wide-ranging portfolio of technologies and services, from consultancy, assessments and pentesting to the set up of completely new security and network infrastructures.

Sentra

Sentra

Sentra is focused on improving data security practices within the cloud, mitigating the risks of damaging data leaks by providing comprehensive visibility into critical data assets.

Raiven Capital

Raiven Capital

Raiven Capital is a global early-stage technology venture capital fund. We focus on founder-led, driven companies on the leading edge of disruption.

EasyDMARC

EasyDMARC

EasyDMARC deliver the most comprehensive product for anyone who strives to build the most secure possible defence system for their email ecosystem.

National Renewable Energy Laboratory (NREL) - USA

National Renewable Energy Laboratory (NREL) - USA

NREL is transforming energy through research, development, commercialization, and deployment of renewable energy and energy efficiency technologies.