DON’T GET HOOKED!

How to Recognize and Avoid

PHISHING ATTACKS

What is Phishing?

The Go-To Social Engineering Strategy

Phishing (same pronunciation as fishing) is a form of social engineering that uses email or malicious websites (among other channels) to solicit personal information from an individual or company by posing as a trustworthy organization or entity. Phishing attacks often use email as a vehicle, sending email messages to users that appear to be from an institution or company that the individual conducts business with, such as a banking or financial institution, or a web service through which the individual has an account. The goal of a phishing attempt is to trick the recipient into taking the attacker’s desired action, such as providing login credentials or executing a malicious file.

welcome

Phishing Attack Methods

attack

MASS-SCALE PHISHING

An attack where fraudsters cast a wide net of attacks that aren't highly targeted.

READ MORE
attack

SPEAR PHISHING

Tailored to a specific victim or group of victims using personal details.

READ MORE
attack

WHALING

Specialized type of spear phishing that targets a "big" victim within a company.

READ MORE

Keep Your Eyes Open for All Forms of Phishing Attacks!

EMAIL PHISHING

Fraudsters send phony emails that appear to come from valid sources in an attempt to trick users into revealing personal and financial information.

What to look for?

From: Easy Pay Support
To: ap@yourcompany.com
CC:
Subject: Please pay overdue toll
  • Message
  • E-pass 0000319.zip

Notice to Appear,

Impersonal
Messages

You have not paid for driving on a toll road
and the fee past due

Scare Tactics

The copy of the invoice is attached to this email.

Best Regards,
John Doe,

Easypass Agent.

Imitating a Known Brand

Sender’s Name and Domain Spoof a Known Brand

Compressed Attachments

Highly Personalized Messages

Unlike mass phishing emails, spear
phishing messages are highly
personalized and will
often reference coworkers' or friends' names.

  • To : jsmith@bigbank.com
  • Subject : Urgent Notice
  • Dear James,
    We were contracted by your HR Director, Anne Wallece.

Embedded Malicious Files

Common file attachments (.doc, .xls, .ppt, etc.) can contain malicious macros.

  • Security warning
  • Macros have been disabled.
  • Enable content

Spoofed Links

Spoofed link text can hide a hyperlink's actual destination to a Spoofed Website.

  • To : jsmith@bigbank.com
  • Subject : Urgent Notice
  • www.bigbank.com

Spoofed Websites

Links to spoofed versions of well-known websites can look legitimate to the untrained eye. They are used to steal info submitted via forms and/or distribute malware to visitors.

VISHING

Short for "voice phishing," vishing uses telephone attacks to solicit unsuspecting victims for financial or personal details.

What to look for?

Personal data

It can be gathered from social media profiles, providing criminals with sensitive details to make attacks seem more legitimate.

Fear tactics

Vishers use fear tactics to con you into thinking your money is in danger and you must act quickly.

Persuasive phone tactics

Their tactics are "too good to be true" and are a dead giveaway of criminal activity.

  • Phoenix,
  • AZ 555-555-5555

Scammers often alter phone numbers/IDs to disguise the real origin of the call.

VISHERS POSE AS IRS AGENTS

Threatening parties with arrest, deportation, license revocation, etc.
IRS reports from January 2016 show that since October 2013:

896,000

people have been solicited by scammers claiming to be IRS officials.

  • 5000

VICTIMS HAVE COLLECTIVELY

  • paid
    over
  • $26.5 MILLION

SMISHING

With SMS messaging attacks fraudsters send phony texts in an attempt to con you into divulging private information or infecting your phone with malware.

What to look for?

'5000' or other non-cell numbers

are most likely scammers masking their identity by using email-to-text services.

Spoofed Websites are most likely scammers masking their identity by using email-to-text services.

5000
Dear Walmart shopper, Congratulations! You have just won a $1000 Walmart Gift Card. Click here to claim your gift.

www.wmartlick.com

(cancel: reply STOP)

(405) 777-0909
Notice: this is an automated message from Miami University Community Federal Credit Union. Your ATM card XXX4 0505 has been suspended. Click this link to reactivate:

Smishers are most likely scammers masking their identity by using email-to-text services, unknown numbers or unsolicited messages.

Smishers may use the first few digits of your debit/credit card to pressure a response.

Banks, financial institutions, social media platforms, and other business accounts should be contacted directly to determine if they sent you a legitimate SMS request.

Smishers breached authentication systems and conned users into resetting their passwords with the goal of gaining access to the victims' email accounts.

Authentication systems were breached by "smishers" who conned users into resetting their passwords in order to gain access to victims' email accounts.

  • 1

An attacker secures a victim's email address / phone number from public sources.

  • 2

The attacker poses as the victim and asks Google for a password reset.

  • 3

Google sends a reset code to the victim.

  • 4

The smisher texts the victim with the fraudulent message: "Google has detected unusual activity on your account. Please respond with the code sent to your mobile device immediately."

  • 5

The victim sends the password verification code to the smisher, thinking that the request came from Google.

  • 6

The attacker uses the code to reset the victim's password and take control of their account.

SOCIAL MEDIA PHISHING

Cyber criminals use social media as a channel to carry out phishing attacks aimed at stealing personal information or spreading malware. Some attacks are even used to hijack your accounts and launch follow-up attacks on your connections or followers.

WHAT TO LOOK FOR?

Play-pretend

Scammers create a replica account and inform victim friends/followers that their previous account was abandoned. Messages are sent to victim friends asking the recipient to click on a link with the aim of collecting personal data, e.g., credit/debit card numbers.

Bogus posts

Social network feeds can contain bogus posts that trick users into clicking on a link and providing personal info.

Social media Malware

Scammers can pose as a friend/follower and send messages with links to sites that are infected with malware. Even messages from known friends and followers may include links to sites that have been hacked.

  • Ray Thomas
    30 mins

Decided to make a new account

  • Ray Thomas
    30 mins
  • Ray Thomas
    30 mins

Hey! check this out,i cant’t believe
they got this picture of you!!!

bitly.xyz/345Fw041

Ray Thomas

Hey Joe!, You should sign up for this free giveway.
http://bitly.xyz/345Fw041

Admin

Hey Joe!,We notice a security threat on your account. Would you like to reset your password now?
http://bitly.xyz/345Fw041

Stay Suspicious

Phishers can pose as admins from social networking sites in an effort to gain access to passwords/other account info.

First Things First - Be Vigilant Online and Use Your Common Sense!

First Things FirstBe
  • Always be suspicious of any unsolicited communication from businesses or individuals, regardless of the message medium.
  • Don't click on links or attachments in suspect emails, texts, or social media messages.
  • Directly contact the purported sender via their official website, phone number, or email address if you are not sure about the legitimacy of a message you have received.
  • Report suspected phishing scams to your IT and security teams.
  • File a complaint with the FBI Crime Complaint Center (IC3) to help shut down cyber criminals.