Phishing (pronounced ‘fishing’) is an online attack strategy used by cybercriminals to deceptively gather or collect data. Stolen data could then be used to breach the security of online accounts, hack into websites, or aid in targeted malicious attacks. When ‘fishing’, one must lay a trap or bait to hook the catch.
Phishing attacks have evolved over the years and taken on a different face, one that may appear to many as a legitimate entity that doesn’t raise any suspicion among computer users. Unfortunately, many of the modern-day phishing attacks are carefully crafted by resourceful hackers and come in many different forms. Some of the forms, such as spam email messages that look like legitimate emails from banks, social media networks, and other popular sources, are at the frontline of stealing data from unsuspecting computer users.
Phishing dates back to 1995 and the bait has evolved and expanded since its debut. Here are a few traps to avoid:
- Spoofed email spam cleverly purporting to be from a trusted source and seeking to gather sensitive data. A booby-trapped link or attachment will be included that ultimately routes the victim to a malicious website, often a form imitating a legitimate financial institution and thus seeking input of financial data or credentials.
- Instant Messaging (IM) links that route to a malicious website or form seeking input of sensitive data.
- Social Networking Platforms that offer up a poisonous link, again leading to a fraudulent webpage or form seeking input of sensitive data, i.e. passwords, usernames, financial data, login credentials, etc.
The Evolution of Phishing Shows More Effectiveness That Leads to Identity Theft
The landscape of modern-day phishing attacks has leaned towards theft of personal data, which in turn can easily lead to identity theft cases. Identity theft is a prevalent issue when it comes to phishing. Because phishing attacks have a primary goal of stealing personal information from a victimized computer user, identity theft cases loom with today’s hackers utilizing sophisticated malware threats to leverage phishing attacks so they may collect personal data and potentially sell it over the Dark Web to the highest bidder. Such a process is known to garner identity theft cases at alarming rates.
Other forms of modern-day phishing attacks often leverage government entities like the IRS where spoofed emails claim to be from the IRS or hackers breach data from the IRS so they can later send phishing emails to taxpayers demanding personal information like their address and social security number. Such an incident of breaching data at the IRS resulted in over a half a million taxpayers’ having their information accessed.
Among Internet behaviors that contribute to emotional motivators behind successful phishes, entertainment and social rank the highest, according to PhishMe’s Enterprise Phishing Resiliency and Defense Report released in 2018 (demonstrated in the Figure 1. chart below). Additionally, PhishMe mentions that mature anti-phishing programs may have conditioned employees to spot certain work-related scams, potentially influencing the results show in the chart below. The totality of the PhishMe report shows that phishing attempts have grown overall 65% in 2018.
Figure 1. PhishMe Phishing Behavioral Chart 2018
Spam Emails Remain to Be at the Leading Edge of Phishing Attacks
Spam emails are at the forefront of phishing attacks, one of the most popular aspect of sophisticated phishing methods, and one commonly used to directly spread modern ransomware threats or other malware as an attachment. Unfortunately, many spam messages have evolved to exploit vulnerabilities and bypass spam detection methods and software. Often there are many different forms of spam messages that initiate phishing campaigns, such as the following popular subject matters:
- Adult content spam – Often spam emails may contain explicit material that gain attention and may offer access to adult content by enticing the computer user to enter a limited amount of personal information that is later stolen.
- Chain letter spam – Chain letter spam messages may force recipients to forward them to other friends sometimes asking for enticing information that may get unwanted attention and eventually demand personal details.
- Fake notification spam messages – We’ve all seen spam emails that make claims of winning a lottery that may request the recipient to either send an initial amount of money that’s a fraction of the winnings to later claim the larger winning sum.
- Nigerian letters spam – Nigerian letters spam messages have a goal to obtain a user’s banking account login or extort money by pressing an urgent and dire situation. Often such messages will ask for assistance to obtain a large sum of money and in return offer a bogus monetary reward.
- Personal finance spam – Personal finance spam messages will phish a user’s data by pretending to be a banking institution possibly offering a loan, credit, or alerting user’s to an alleged “issue” on their banking account that needs to be addressed by providing personal details.
- Pharmaceutical spam – Accounting for one-quarter of all spam messages, pharmaceutical spam will usually share advertisements offering drug access or deals in hopes that the user will click the link and relinquish payment details or other personal information.
The best way to avoid becoming a victim of Phishing and having your valuable data stolen and abused is by verifying the source of emails, IMs, or any links and attachments before clicking. Otherwise, you could not only be transported to a look-a-like or fraudulent form or webpage awaiting input of your financial or personal data, but too could unleash malware onto your vulnerable system.
The overall volume of spam emails has shown some inclines while those with malicious attachments has pushed the collective amount of spam messages to new records from January 2015 to December 2016 as shown in the IBM Threat Intelligence Index 2017 report chart below (Figure 2.). Moreover, email remains to be the number one method for delivering malware to vulnerable computers around the world keeping phishing a prevalent issue.
Figure 2. IBM Threat Intelligence Index 2017 Malicious Spam Attachments Chart
All Phishing is Not Created Equal
Not all ‘Phishing’ leads to a website but rather too could be executed over the phone. In these cases, the victim will be provided a phone number that is fraudulent. Supposedly the phone number is that of a trusted source, i.e. Microsoft or bank representatives, etc., and the person or recording will ask the victim to either verify their personal information or provide it. Don’t be surprised that the attacker knows just enough information about you already to sell or legitimize the scam. The Internet and its tracking of personal data has made it easy for just about anyone to learn about you, such as your name, age, intimate associations, birth city and state or current residence, as well as past ones, or even political or religious affiliations. Knowing that you work for XYZ, for instance, makes a cleverly spoofed and written email seem believable. So never think it silly or a waste of time to ‘pick up the phone’ and verify the communication before you click or provide requested data. The worst that could happen is that the receiver ‘verifies’ it is legitimate. Otherwise, the following could result:
- You could become the victim of a man-in-the-middle attack. An online strategy that cleverly places a look-a-like interface between you and the intended banking webpage so that you enter credentials, i.e. user name and PIN.
- You could become victim of a cross-scripting attack, whereby the legitimate and trusted banking website is compromised and thus your credentials and online transactions.
- You could be forcibly routed to a malicious website nursing a drive-by strategy and upon landing, you’ll unleash a bounty of malware able to exploit your system’s vulnerabilities.
Actually, malware could already be present on your system, for example, a backdoor that a gives a hacker the ability to remotely access and control your computer. Don’t wait to learn that a DNS strike was tracked to your IP address or that your online accounts were hacked and your money stolen.
Many times, computer users have issue with identifying a phishing scam or a phishing email. PhishMe, a ten-year-old firm that helps companies train employees to help avoid phishing scams, had their CEO on CNBC to discuss how the biggest issue is “US” and how we can take steps to spot phishing emails among other phishing scams in the video below.
Phishing attacks have found new breeding grounds mostly in social media platforms
Phishing attacks have no boundaries and social media platforms are prime targets for hackers to proliferate phishing campaigns. Undoubtedly, social media is in high demand with billions of users who access the popularized networks of Facebook, Twitter, Instagram and others on a daily basis. Among the most popular methods of hackers stealing one’s identity and potentially their money is through social media giants like Facebook. There are countless phishing campaigns used throughout Facebook and other social media networks that are highly effective at collecting personal information from users. Many of the modernized phishing campaigns are sometimes masked as advertisements, quizzes, like-jacking scams, free offers, or the common personable post with an attached malicious link.
Today’s malware is aggressive and not only demands aid of a stealth guard or antimalware solution to protect your data and resources, but too demands PC users use safe online habits. Below are a few safety steps to consider:
- Use of a strong password. If you are not certain what constitutes a strong password, use Cyclonis Password Manager’s strong password checker.
- Keep software current and apply patches in a timely manner. Automatic updates to help you stay current.
- Invest in a stealth and trusted antimalware solution that guards your system 365 days a year and updates definitions 24/7. Your Internet security tool should filter all downloads, scan connection of external drives, contain a rootkit and offer a customize fix, if need be.
- Verify sources of links and attachments before you click. Otherwise, you could be inviting inside a nasty infection.
- Utilize caution when using social media networks. Never assume links are always safe even if they are posted by people that claim to be your friend or profiles that you follow. Social media networks cannot monitor everyone.
- Make use of a virtual computer to conduct financial transactions, i.e. buying or banking online.
- Schedule regular backups of your data and perform external backups of important data, i.e. via an external drive.
- Securely store passwords and product keys to your installed applications or software offline, just in case you need to do a reinstall.
- DO NOT PIRATE! It is an illegal act and besides risking fees or jail time, it too is a bedsore for malware.
In addition to our tips above, below is a comprehensive outline and detailed visual (Figure 3. infographic) for computer users of virtually any experience level from Digital Guardian. The phishing infographic has sourced many trusted firms and government agencies, from the IC3.com to the IRS to communicate phishing methods, forms, and how to prevent becoming a victim.
Most Trending Malware in the Last 2 Weeks
How Can You Detect Phishing? Check for Phishing with SpyHunter!
SpyHunter is a powerful malware remediation and protection tool designed to help provide users with in-depth system security analysis, detection and removal of a wide range of threats like Phishing as well as a one-on-one tech support service.Download SpyHunter's Malware Scanner to Detect Phishing*
Free SpyHunter Remover Details & Terms
There are currently 18 articles listed on phishing.