Cookies setting

Cookies help us enhance your experience on our site by storing information about your preferences and interactions. You can customize your cookie settings by choosing which cookies to allow. Please note that disabling certain cookies might impact the functionality and features of our services, such as personalized content and suggestions. Cookie Policy

Cookie Policy
Essential cookies

These cookies are strictly necessary for the site to work and may not be disabled.

Information
Always enabled
Advertising cookies

Advertising cookies deliver ads relevant to your interests, limit ad frequency, and measure ad effectiveness.

Information
Analytics cookies

Analytics cookies collect information and report website usage statistics without personally identifying individual visitors to Google.

Information
mageplaza.com

What is Phishing? How to Protect Yourself from Phishing?

Summer Nguyen | 3 days ago

What is Phishing? How to Protect Yourself from Phishing? What is Phishing? How to Protect Yourself from Phishing?

The Most Popular Extension Builder for Magento 2

With a big catalog of 224+ extensions for your online store

Let’s face the truth: Phishing attacks don’t show any sign of slowing down. In its 2019 Phishing Trends and Intelligence Report, PhishLabs found that total phishing volume increased by 40.9% throughout 2018.

These attacks targeted a number of companies, especially financial services organizations, online and email service providers, and cloud/ file hosting firms. The growth of phishing attacks undeniably poses a significant threat to all businesses.

Therefore, it’s essential that all companies know what phishing is and how to protect themselves from phishing.

And that’s also the purpose of this article. Don’t hold off; just explore right now!

Table of content

What is phishing?

Phishing, by definition, is a type of scam that tricks people into giving away sensitive information, such as usernames, passwords, bank account information, credit card numbers, network credentials, and many more. The goal is often to steal money or gain confidential information. This is why one of the best things to do to prevent a phishing attack is to build a secure network with zero trust.

Typically, phishing victims receive a malspam (malicious email) or a text message that imitates a person or organization they trust, like a relative, coworker, bank, or government office. When they open the email or text, they’ll find a message that requires them to go to a website and take immediate actions or risk some sorts of consequences.

What is phishing?
What is phishing?

If they take the bait and click the link, they are sent to an imitation of a legitimate website. They’re then asked to log in with their username and password credentials. In case they are gullible enough to comply, the sign-on information goes to attackers, who use it to steal identities, pilfer bank accounts, and sell private information on the black market.

Unlike other online threats, phishing doesn’t require particularly complicated technical expertise. According to Adam Kujawa, Director of Malwarebytes Labs, “Phishing is the simplest kind of cyberattack and, at the same time, the most dangerous and effective.” The reason is so easy-to-understand, it attacks the most potent and vulnerable computer on the planet: the human mind.

Read more:

How does phishing affect your business?

The consequences of phishing can be much more severe than you think. More often than not, though, the culprits behind phishing attacks are not attempting to steal money from businesses at all. Instead, they are trying to steal something much more valuable: data.

According to an IBM report, a data breach can cost up to $3.86 million in average. However, a figure alone is not sufficient to communicate the consequences of a phishing attack. Therefore, let’s break it down.

Reputational damage

Following the announcement of a data breach, an organization’s reputation immediately takes a hit.

Headlines like “7.5 million Adobe Creative Cloud accounts exposed to the public” and “Cyber thieves took dara on 145 million eBay customers by hacking 3 corporate employees” become mainstream news stories - no matter how formidable that company’s PR department might be.

The reports can take years - even, decades - to fade from memory. As long as they linger, they impact public opinion.

Intellectual property issues

Intellectual property theft, in fact, is no less devastating. Phishing attacks can compromise trade secrets, customer lists, recipes, formulas, and research. For firms in manufacturing, food, pharmaceuticals, or technology, a single stolen design or patent amounts to millions in wasted research investment.

Loss of customers

Reputational damage and intellectual property are really just the beginning of the backlash.

News of a data breach actually makes customers nervous. In November 2017, only two months after a high-profile phishing attack at US credit reporting agency Equifax, as many as 40% of customers said they didn’t trust Equifax with their financial information at all.

Similarly, the 2015 data breach exposed the accounts of nearly 157,000 TalkTalk customers accessed, including bank account details and sort codes of over 15,000 customers. The consequence was easy to realize - customers left in their thousands, and the company’s loss was around £60m in 2016 alone. The ramifications, as you can imagine, will continue for years to come.

Loss of company value

Data breaches not only affect consumer confidence, but they impact investor confidence as well.

Loss of company value from phishing
Loss of company value from phishing

A study of Comparitech showed that breached companies’ share prices hit a low point nearly 14 market days following a breach. On average, share prices fall 7.27% and underperform the NASDAQ by -4.18%.

Direct costs

The direct monetary costs from phishing attacks are well documented and reported. In terms of costs, according to the FBI’s 2018 Internet Crime Report:

  • Business email compromise (BEC) attacks cost businesses in the US more than $1.2 billion.
  • Direct deposit phishing, an attack that steals employee portal credentials and their salary, cost organizations more than $100 million.
  • Gift card scams, a type of spear phishing attack, cost victims in the US $70 million.

Regulatory fines

Financial penalties for the mishandling or misuse of data have been in place for decades. Under GDPR (General Data Protection Regulation, the penalties can total €20 million or 4% of the annual global turnover - whichever is higher.

In addition, phishing attacks on your business also means paying fines from regulatory bodies like the Payment Card Industry Data Security Standard (PCI DSS) or the Health Insurance Portability and Accountability Act (HIPAA). Investigating the incident and providing adequate compensation to victims of stolen data can run into the millions.

Business disruption

No matter how large or small a breach might be, it inevitably leads to business disruption.

After being infected by a phishing email, the multinational advertising WPP instructed its 130,000 employees to “immediately disconnect and turn off all Windows servers, PCs, and laptops until further notice”.

Eventually, it took the company weeks to resume normal service.

7 common types of phishing attacks

1. Deceptive phishing

Deceptive phishing is by far the most popular type of phishing attack. In this type of scam, attackers impersonate a legitimate company in an attempt to steal personal data or login credentials. Those emails generally use threats and a sense of urgency to scare users into doing what the fraudsters want.

For example, PayPal scammers could send out an attack email that instructs recipients to click on a link to rectify discrepancies with their accounts. Then, the link redirects to a fake PayPal login page that collects a victim’s login credentials and sends them to the attackers.

The success of a deceptive phishing attack relies on how closely the email resembles a piece of official correspondence from the abused company.

2. Spear phishing

Instead of using spam-like tactics to blast thousands of people in massive email campaigns, spear phishing attacks target specific individuals within an organization.

Spear phishing targets specific individuals
Spear phishing targets specific individuals

Cybercriminals often turn to social media and company websites to research their victims. Information that is utilized includes full name, place of employment, job title, email address, and specific information about their job role. Once they have a profound understanding of their target, they can trick the recipient into believing that they are acquainted with the sender.

The ultimate goal is the same as deceptive phishing: trick the victim into clicking on a malicious email attachment or URL so that they can hand over their personal data. Given the amount of information needed to create a convincing attack attempt, it comes as no surprise that spear phishing is commonplace on social media channels like LinkedIn where attackers can make use of multiple data sources to craft a targeted attack email.

3. Whaling

What distinguishes whaling attacks from other types of phishing is the high-level choice of target. A whaling attack attempts to steal sensitive information and is typically targeted at senior management. As the victim is considered high-value, the stolen information will be much more valuable than what a regular employee may offer.

Although the goal of whaling is the same as any other type of phishing attacks, the technique tends to be much subtler. Tricks such as malicious URLs and fake links aren’t useful in this case, as criminals are attempting to imitate senior staff.

Instead, scams involving bogus tax returns are an increasingly popular variety of whaling. Tax forms are highly valued by attackers as they contain a host of useful information, including names, addresses, bank account information, and Social Security numbers.

4. Clone phishing

The idea behind clone phishing is to take advantage of legitimate messages that the victim may have already received and create a fake version of it.

The email is actually sent from an address resembling the legitimate individual or organization, and the message’s body looks the same as the previous message. The only difference is that the link or attachment in the message has been swapped out with a malicious one. The attacker may say something to explain why the victim receives the “same” message again, for instance, to resend the original or an updated version.

5. Vishing

Until now, we have discussed phishing attacks that rely solely on email as a means of communication. Undoubtedly, email is a popular tool among phishing attackers. Even so, fraudsters sometimes turn to other media to perpetrate their attacks. Take vishing as an example.

Vishing, or voice phishing, refers to phishing scams that take place over the phone. Among all the phishing types, it has the most human interaction but follows the same pattern of deception. Attackers will create a sense of urgency to convince a victim to divulge sensitive information.

Vishing involves scams taking place over the phone
Vishing involves scams taking place over the phone

The call will typically be made through a spoofed ID, so it looks like it comes from a trustworthy source. A common vishing scam involves a criminal posing as a fraud investigator (either from the bank or the card company) telling the victim that their account has been breached. Once they’ve gained the victim’s trust, they will ask for personal information such as login details, PIN, and passwords. Or the victim will be required to transfer money into a “secure” account, which means the criminal’s account.

6. Smishing

Smishing, or SMS phishing, involves criminals sending text messages to an individual’s phone number and usually tricks users into clicking on a malicious link or handing over personal information.

For example, in February 2019, Nokia warned its customers to be careful with a smishing campaign in which digital hackers posed as the Finnish multinational telecommunications and sent out messages informing users that they had won money or a car. The fraudsters then asked recipients to send over money as a registration payment for their prize.

7. Pharming

This type of phishing leverages cache poisoning against the domain name system (DNS), which is a naming system that the Internet applies to convert alphabetical website names, such as “www.mageplaza.com”, to numerical IP addresses to locate direct visitors to computer services and devices.

A pharmer can target a DNS server under a pharming attack and change the IP address associated with an alphabetical website name. This means an attacker can redirect users to a malicious website of their choice. That is the case even if the victim enters the correct site name. One effective way to protect yourself from phishing is by utilizing security measures such as robust antivirus software and browser extensions that can block malicious websites and prevent your sensitive information from falling into the hands of cybercriminals.

How to spot a phishing attack

Spotting a phishing attack has become a lot harder than it used to be as cybercriminals have honed their skills and been more sophisticated in their attack methods. Phishing emails that we receive in our inbox everyday are increasingly well personalized, written, and contain the same logos and language of brands we know and trust.

Despite the sophistication and convincing nature of these emails, there are still some signs that may alert us to a phishing email.

A mismatched URL

One of the first things to consider in a suspicious email is the validity of a URL. Try hovering your mouse over the link without clicking on it, you can see the full hyperlinked address appear. Although it seems perfectly legitimate, if the URL doesn’t match the address displayed, it is an indication that the message is fake and likely to be a phishing email.

The email asks for personal information

A reputable and trustworthy company will never send out an email asking for customers’ private information such as account number, PIN, password, or security questions. If you receive an email requesting these pieces of information, it is likely to be a phishing email and should be deleted immediately.

Poor spelling and grammar

Cybercriminals, in reality, are not renowned for their spelling and grammar. Whenever trustworthy companies send out emails to customers, they are generally proofed by copywriters to ensure the spelling and grammar are correct. If you identify any spelling mistakes or poor grammar within an email, chances are it doesn’t come from an official organization and can indicate a phishing email.

Poor spelling and grammar can be a phishing indicator
Poor spelling and grammar can be a phishing indicator

The use of threatening or urgent language

A common phishing tactic is to promote urgency or a sense of fear to rush someone into clicking on a link. Attackers will often use threats that your security has been compromised and that urgent action is required to remedy the situation.

Be aware of subject lines that contain “your account has been suspended” or your account had an “unauthorised login attempt”. If you are not sure if the request is legitimate, contact the company directly via their official telephone number or website.

A suspicious attachment

Alarm bells should be ringing if you see an email from a company that contains an attachment, especially when it relates to something unexpected. The attachment might contain a malicious URL or trojan, leading to installing malware or viruses on your network or PC. Even if you suppose that attachment is genuine, it is good practice always to scan it first using antivirus software.

It’s “too good to be true”

If an email informs you that you have won a competition you didn’t participate, or a request to click on a link to receive a prize, it is highly likely to be a phishing email. If an offer seems too appealing to be true, it usually is!

How to protect yourself from phishing

Phishing prevention is rarely a single course of action and is best implemented using a combination of methods. So, some common best practices to protect yourself from phishing include:

Most of us are curious about the news of lottery wins, free downloads of software or other digital products, urgent deadlines, pending collections of expensive items, donations to charities, etc. These typically originate from entirely random and unknown sources.

Never click on suspicious links to avoid phishing
Never click on suspicious links to avoid phishing

Therefore, put in extra scrutiny on an email that provides unrealistic rewards or threats and abnormal language (e.g., too many exclamations, bold letters, underlines, etc.). To verify its authenticity, contact the company directly using the contact information they make publicly available.

Avoid using open and public networks

Data sent via public networks is often not encrypted, and this provides opportunities for attackers to sniff out important information, such as account usernames, passwords, purchase transactions, and other browsing activities.

So, stick to as few public Wi-Fi networks as possible. The more networks you sign up to, the more likely that you’ll stumble across one that isn’t treating your data and browsing as carefully as it should be.

Verify the security of a site

Before providing any information on a website, you should always check if that site is safe and secure. The best method to do this is to look at the URL. In case it begins with a “https” instead of “http”, it means that the site has been secured using an SSL Certificate (S stands for secure).

Verify the security of a site
Verify the security of a site

SSC certificates ensure that your data is secure as it is passed from your browser to the website’s server. Besides, there should be a small padlock icon near the address bar which also indicates the site is secure.

Use two-step authentication

Two-step authentication is widely used to add a layer of security to your online accounts. The most popular form of two-step authentication when logging into an account is the process of entering your password and receiving a code via text on your phone that requires you to enter. This method will make it harder for attackers to access your account.

Be careful what you post online

The Internet and social media channels have transformed how we communicate with each other on a daily basis. Nevertheless, this sharing culture has provided cybercriminals with a simple way to profile potential victims, making sure their phishing attempts are more targeted and harder to identify.

Attackers are taking advantage of social media sites to access personal information such as age, job title, location, email address, and social activities. By accessing these personal data, hackers can launch a highly targeted and personalized phishing attack.

To reduce your chance of falling into a phishing trap, think more carefully about what you post online, use enhanced privacy options, restrict access to anyone you don’t know, and create strong passwords for your social media accounts.

Educate staff

Even though companies may have the most robust security defense systems in place, it offers little protection if attackers can bypass these traditional technological defenses and get straight to an employee to trick them into providing sensitive information.

Educate staff regularly to avoid phishing
Educate staff regularly to avoid phishing

As a matter of fact, hackers are increasingly targeting what they perceive as the weakest link in a company’s defenses - its employees! Therefore, it’s essential to educate staff and provide regular training courses on what they should be taking into account and how they can play their role in preventing a cyber-attack.

Install anti-virus software

Anti-virus software is undoubtedly the first line of defense in detecting your Pc threats and blocking unauthorized users from gaining access. It is also necessary to make sure that your software is updated regularly, and hackers are unable to access your network through vulnerabilities in older and outdated programs. Even Macbook users should not forget about malware cleaners, better use the best ones. After all, MacBooks can also catch a virus.

The bottom line

Using the guide above, businesses can more quickly understand what phishing is and how to prevent it. Even so, that doesn’t always mean they will be able to spot each and every phish. Phishing is, in fact, constantly evolving to adopt new forms and techniques.

With that in mind, it is imperative that businesses conduct security awareness training on an ongoing basis so that their executives and staff can stay on top of phishing’s evolution.

Table of content
    Summer

    A data-driven marketing leader with over 10 years of experience in the ecommerce industry. Summer leverages her deep understanding of customer behavior and market trends to develop strategic marketing campaigns that drive brand awareness, customer acquisition, and ultimately, sales growth for our company.



    Related Post

    Website Support
    & Maintenance Services

    Make sure your store is not only in good shape but also thriving with a professional team yet at an affordable price.

    Get Started
    mageplaza services