Phishing has been in use in one form
or another probably a week after the first email account was used by consumers.
Phishing has become glaringly prevalent in today’s society. This clogs up the
Spam folders daily across the U.S. The attackers have operationalized phishing
as a vector to compromise the user’s information, data, email, credentials, and
any other facet that has value. This has become so popular and used as much as
it is due to the ease of application. The technical requirements for this are minor.
The phisher has to create a moderately believable email generally without
significant grammar or spelling errors, which is not difficult. This may
involve a bank, sale at a retail business, sale on pharmaceuticals, or any
other possible email that is appropriate.
The more productive and revenue
generating phishing scams or campaigns have involved ransomware or the
executive wire scam. Most are familiar with the ransomware phishing exploit, as
it has been in the news more frequently. With this the user opens a link or
attachment that appears to be fine, however is actually malicious in nature.
The system, network segment, network, etc. is encrypted. The attackers later
offer to provide the decryption key…for a fee.
The executive wire scam has predominantly
taken the form of someone in accounting or finance receiving an email directing
them to wire funds, varying per target from a few thousand to millions,
dependent on the target, what was encrypted, the industry, etc. The usual email
is rather demanding, stating the person has to wire the money in the next few
hours, the executive sending the email is in a meeting or would not be
accessible, and it is imperative that this be sent. These both are very low
tech attacks, which work on the user’s oversight and willingness to do the job
and keep the executive happy.
All is not lost though. There are
many options the users need to be aware of in order to limit the risk of this
continuing to happen. For instance, the bank is not going to send the user a
link in an email with a message directing the user to click on a link or to
provide the credentials on the email. Generally, an invoice does not need to be
paid within a few hours or a discount would be lost. As a rule of thumb, the
discount period is a few weeks, not hours. Although pet pictures are wonderful,
strangers are not going to email these to you. Users generally don’t purchase
pharmaceuticals online from a firm they have never heard from and their
workplace is not associated with.
One tool that works wonders is
simple communication. If an email arrives and demands a payment within a very
short amount of time and the sending party directly, aggressively states that
they are not accessible, simply check if they are actually on vacation, if they
are in a meeting, send a quick email to the person while not replying to the
email that was received for authentication, or just make a quick call. This
only takes a moment and has the potential to save a large amount of money and
embarrassment.
No comments:
Post a Comment