6.what Is Phishing, and How Can I Avoid Falling Victim To It
6.what Is Phishing, and How Can I Avoid Falling Victim To It
6.what Is Phishing, and How Can I Avoid Falling Victim To It
1
How do I spot a phishing scam?
What is phishing email?
What do I do once I’ve identified a phishing email?
What should I do to avoid being a victim of
phishing?
What is Phishing?
Phishing persuades you to take an action which gives a
scammer access to your device, accounts, or personal
information. By pretending to be a person or
organization you trust, they can more easily infect you
with malware or steal your credit card information.
In other words, these social engineering schemes “bait”
you with trust to get your valuable information. This
could be anything from a social media login, to your
entire identity via your social security number.
These schemes may urge you to open an attachment,
follow a link, fill out a form, or reply with personal info.
By that logic, you must be on guard at all times which
can be exhausting.
The most common scenario is as follows:
You open your email and suddenly an alert from
2
problem with your account and ask you to confirm
your login and password.
After entering your credentials on the page that
identity
Obtain control of your online accounts
3
Trust and urgency are what makes phishing so deceiving
and dangerous. If the criminal can convince you to trust
them and to take action before thinking — you’re an
easy target.
Who is at risk of Phishing attacks?
Phishing can affect anyone of any age, whether in their
personal life or in the workplace.
Everyone from the elderly to young children are using
internet devices nowadays. If a scammer can find your
contact information publicly, they can add it to their
phishing target list.
Your phone number, email address, online messaging
IDs, and social media accounts are harder to hide
nowadays. So, there’s a good chance that just having
one of these makes you a target. Plus, phishing attacks
can be broad or highly targeted in the people they
choose to trick.
Spam Phishing
Spam phishing is a broad net being thrown to catch any
unsuspecting person. Most phishing attacks fall into this
category.
To explain, spam is the electronic equivalent of the ‘junk
mail’ that arrives on your doormat or in your postbox.
However, spam is more than just annoying. It can be
dangerous, especially if it’s part of a phishing scam.
Phishing spam messages are sent out in mass quantities
by spammers and cybercriminals that are looking to do
one or more of the following:
4
Make money from the small percentage of
recipients that respond to the message.
Run phishing scams – in order to obtain passwords,
5
Phishers might take this information from:
Social media profiles
6
likely to experience at least one of these forms of
phishing:
Phishing email appears in your email inbox —
7
sketchy “official” organization pages with an urgent
request. Others might impersonate your friends or
build a relationship with you long-term before
‘attacking’ to seal the deal.
Clone phishing duplicates a real message that was
8
Clickjacking uses a website’s vulnerabilities to
insert hidden capture boxes. These will grab user
login credentials and anything else you might enter
on the otherwise safe site.
Tabnabbing happens when an unattended
fraudulent page reloads into an imitation of a valid
site login. When you return to it, you might believe
it to be real and unknowingly hand over access to
your account.
HTTPS phishing gives a malicious website the
9
carefully, you may click the malicious page instead
of the real one.
Angler phishing impersonates a customer service
10
Whilst it would be impractical and impossible to list
every known phishing scam here, there are some more
common ones you should definitely look out for:
Iran Cyberattack phishing scams use an illegitimate
Microsoft email, prompting a login to restore your data
in attempts to steal your Microsoft credentials.
Scammers use your fear of being locked out of Windows
and the relevance of a current news story to make it
believable.
Office 365 deletion alerts are yet another Microsoft-
related scam used to get your credentials. This email
scam claims that a high volume of files have been
deleted from your account. They give a link for you to
login, of course resulting in your account being
compromised.
Notice from bank. This scam tricks you with a fake
account notification. These emails normally give you a
convenient link which leads to a web form, asking for
your bank details “for verification purposes.” Do not
give them your details. Instead, give your bank a call as
they may want to take action on the malicious email.
Email from a ‘friend’. This scam takes the form of a
known friend who is in a foreign country and needs your
help. This ‘help’ normally involves sending money to
them. So, before you send your ‘friend’ money, give
them a call first to verify whether it’s true or not.
Contest winner/Inheritance email. If you’ve won
something unexpectedly or received an inheritance
11
from a relative you've never heard of — don’t get too
excited. Because, most of the time these emails are
scams that require you click on a link to enter your info
for prize shipment or inheritance ‘verification’.
The tax refund/rebate. This is a popular phishing scam
as many people have annual taxes which they pay or
have to submit payment to. These phishing messages
normally say that you are either eligible to receive a tax
refund, or you have been selected to be audited. It then
requests that you submit a tax refund request or tax
form (asking for your full details), which scammers then
use to either steal your money and/or sell your data on.
Coronavirus Phishing Scams and malware threats
Coronavirus/COVID-19 phishing scams are the latest to
weaponize fear for cybertheft. One of the most notable
is the Ginp banking trojan which infects your device and
opens a web page with a “coronavirus finder” offer. It
baits people into paying to learn who is infected nearby.
This scam ends with criminals taking off with your credit
card info.
There have also been cases of scammers pretending to
be important government bodies and even the World
Health Organization (WHO). This scam involves
scammers contacting users directly, usually by email.
Requesting bank details or asking you to click on a link
— in an attempt to infect your computer with malware
and steal your private data.
12
These emails and messages may look official, but if you
investigate the link URL (by hovering over the link, again,
do not click it) or the email address carefully, there are
usually tell-tale signs that they are not authentic and
should not to be trusted (such as WHO or government
emails coming from a Gmail account, etc.).
Do not fall for these scams. These organizations will
never ask you for sensitive personal details or private
banking details. And, the chances of them asking you to
download an app or software onto your computer is
also incredibly low. So, if you receive an email or
message like this, especially out of the blue, do not click
on the links and do not give them your personal
information or bank details. Check with the applicable
authorities or your bank if you’re unsure, and only
use/visit trusted websites and sources.
If you receive one of these emails, this is what you
should do:
1. Verify the sender by checking their email address —
WHO sender addresses use the [email protected]
pattern. NOT Gmail, etc.
2. Check the link, before you click — make sure the
links start with https:// and not http://
3. Be careful when providing personal information —
never provide your credentials to third parties, not
even the WHO.
13
4. Do not rush or panic react — scammers use this in
order to pressure you into clicking links or opening
attachments.
5. If you gave sensitive information, don’t panic —
reset your credentials on sites you've used them.
Change your passwords and contact your bank
immediately.
6. Report all scams.
14
You are computer savvy, and you're not taking chances
with any email from an organization that's asking for
personal and financial information. This is especially
true when you didn't request it and can't verify its
identity.
By taking a pause, instead of taking immediate action,
you’ve taken an important step to protect yourself.
However, you’ve still got to determine if this is
legitimate or a scam.
Now you need to know exactly what to look for in a
phishing email to make a decision.
What does a Phishing Email look like?
One of the reasons phishing emails are so sinister — and
unfortunately often successful — is that they're crafted
to look legitimate. Generally, the following features are
common among phishing emails and should raise red
flags:
Attachments or links
Spelling errors
Poor grammar
Unprofessional graphics
your name.
Hackers often rush to get phishing sites up, so some of
them will look significantly different from the original
15
company. You can use these traits to pick a malicious
email out of your inbox.
Still, it's not always clear what steps to take when you
receive a phishing email that has skirted around your
spam folder.
Tips for handling known Phishing Emails
Being vigilant about spotting phishing emails is key. If
you've come across one in your inbox (that hasn’t been
auto filtered into spam), use these strategies to avoid
becoming a victim of a phishing attack.
Delete the email without opening it. Most viruses
16
Just remember, the best way to handle a phishing email
is to block or delete it immediately. Whether you take
any additional actions to limit your exposure to these
attacks is a bonus.
Beyond spotting the email and removing it, you can
guard yourself with a few extra few tips.
Phishing prevention tips
Whether we like it or expect it, you will be the target of
these phishing emails every day.
Most of these are filtered out automatically by our email
providers, and for the most part, users have gotten
relatively good at identifying these types of emails and
using common sense to not comply with their requests.
But you’ve already seen how deceptive phishing can be.
You also know phishing attacks extend into all types of
communication and internet browsing — not just
emails.
By following a few simple phishing prevention tips, you
can greatly reduce your chances of falling victim to a
scammer.
Steps to protect yourself from Phishing
Internet protection starts with your mindset and
behavior toward potential cyberthreats.
Phishing tricks victims into giving over credentials for all
sorts of sensitive accounts, such as email, corporate
intranets and more.
Even for cautious users, it's sometimes difficult to
detect a phishing attack. These attacks become more
17
sophisticated over time, and hackers find ways to tailor
their scams and give very convincing messages, which
can easily trip people up.
Here are a few basic measures to always take with your
emails and other communications:
1. Employ common sense before handing over
sensitive information. When you get an alert from
your bank or other major institution, never click the
link in the email. Instead, open your browser
window and type the address directly into the URL
field so you can make sure the site is real.
2. Never trust alarming messages. Most reputable
companies will not request personally identifiable
information or account details, via email. This
includes your bank, insurance company, and any
company you do business with. If you ever receive
an email asking for any type of account information,
immediately delete it and then call the company to
confirm that your account is OK.
3. Do not open attachments in these suspicious or
strange emails — especially Word, Excel,
PowerPoint or PDF attachments.
4. Avoid clicking embedded links in emails at all
times, because these can be seeded with malware.
Be cautious when receiving messages from vendors
or third parties; never click on embedded URLs in
the original message. Instead, visit the site directly
by typing in the correct URL address to verify the
18
request, and review the vendor's contact policies
and procedures for requesting information.
5. Keep your software and operating system up to
date. Windows OS products are often targets of
phishing and other malicious attacks, so be sure
you're secure and up to date. Especially for those
still running anything older than Windows 10.
Reducing your spam to avoid Phishing
Here are some more useful tips – from Kaspersky’s team
of Internet security experts – to help you reduce the
amount of spam email you receive:
Set up a private email address. This should only be used
for personal correspondence. Because spammers build
lists of possible email addresses – by using combinations
of obvious names, words and numbers – you should try
to make this address difficult for a spammer to guess.
Your private address should not simply be your first and
last name – and you should protect the address by doing
the following:
Never publish your private email address on
19
If your private address is discovered by spammers –
you should change it. Although this may be
inconvenient, changing your email address will help
you to avoid spam and scammers.
Set up a public email address. Use this address when
you need to register on public forums and in chat rooms,
or to subscribe to mailing lists and other Internet
services. The following tips will also help you to reduce
the volume of spam you receive via your public email
address:
Treat your public address as a temporary address.
often.
Consider using a number of public addresses. That
20
Keep your browser updated. Make sure that you use
the latest version of your web browser and that all the
latest Internet security patches have been applied.
Use anti-spam filters. Only open email accounts with
providers that include spam filtering. Choose an
antivirus and Internet security solution that also
includes advanced anti-spam features.
Phishing vs the importance of Internet security
software
One of the simplest ways to protect yourself from
becoming a victim of a phishing scheme is to install and
use proper Internet security software on your
computer. Internet security software is vital for any user
because it provides multiple layers of protection in one
simple-to-manage suite.
For the most reliable protection, your security plan
should include the following:
Anti-spam software is designed to protect your email
account from phishing and junk emails. Aside from
working with pre-defined denylists created by security
researchers, anti-spam software has intelligence
capabilities to learn, over time, which items are junk and
which are not. So while you still should be vigilant, you'll
get some comfort from knowing that the software is
also filtering out potential trouble. Use anti-phishing
protection and anti-spam software to protect yourself
when malicious messages slip through to your
computer.
21
Anti-malware is included to prevent other types of
threats. Similar to anti-spam software, anti-malware
software is programmed by security researchers to spot
even the stealthiest malware. With ongoing updates
from vendors, the software continues to become more
intelligent and better able to deal with the latest
threats. By using an anti-malware package, you can
protect yourself from viruses, Trojans, worms and more.
By combining a firewall, anti-spam and anti-malware
into one package, you can provide extra backups that
keep your system from being compromised, if you do
accidentally click on a dangerous link. They are a vital
tool to have installed on all your computers as they are
designed to complement common sense.
While technology is a rapidly evolving field, by using a
security package from a reputable security vendor, you
can secure your devices from phishing and other
malware threats.
Password management made easy
In addition to having virus protection software on your
computer, it is crucial to use a password manager to
manage your online credentials.
Today, it is vital to have different passwords for all
websites. If a data breach ever occurs, malicious
attackers will try using the discovered credentials across
the web.
One of the best features of password managers is that
they usually automatically fill in login forms to minimize
22
clicking around. Additionally, many password managers
include portable editions that can be saved to a USB
drive, ensuring that you can take your passwords
wherever you go.
While phishing can be a difficult area to tackle at times,
by following the simple tips and advice outlined in this
article (and embracing proper phishing prevention
tools) — you can greatly minimize your risk of falling
victim to digital scammers.
23