Phishing Defined
Phishing is the fraudulent use of electronic communications to deceive and take advantage of users. Phishing attacks attempt to gain sensitive, confidential information such as usernames, passwords, credit card information, network credentials, and more. By posing as a legitimate individual or institution via phone or email, cyber attackers use social engineering to manipulate victims into performing specific actions—like clicking on a malicious link or attachment—or willfully divulging confidential information.
Both individuals and organizations are at risk; almost any kind of personal or organizational data can be valuable, whether it be to commit fraud or access an organization’s network. In addition, some phishing scams can target organizational data in order to support espionage efforts or state-backed spying on opposition groups.
Phishing Methods
Phishing attempts most often begin with an email attempting to obtain sensitive information through some user interaction, such as clicking on a malicious link or downloading an infected attachment.
- Through link manipulation, an email may present with links that spoof legitimate URLs; manipulated links may feature subtle misspellings or the use of a subdomain.
- Phishing scams may use website forgery, which employs JavaScript commands to make a website URL look legitimate.
- Using covert redirection, attackers can corrupt legitimate websites with malicious pop-up dialogue boxes that redirect users to a phishing website.
- Infected attachments, such as .exe files, Microsoft Office files, and PDF documents can install ransomware or other malware.
Phishing scams can also employ phone calls, text messages, and social media tools to trick victims into providing sensitive information.
Some specific types of phishing scams use more targeted methods to attack certain individuals or organizations.
Spear Fishing
Spear phishing email messages won’t look as random as more general phishing attempts. Attackers will often gather information about their targets to fill emails with more authentic context. Some attackers even hijack business email communications and create highly customized messages.
Clone Phishing
Attackers are able to view legitimate, previously delivered email messages, make a nearly identical copy of it—or “clone”—and then change an attachment or link to something malicious.
Whaling
Whaling specifically targets high-profile and/or senior executives in an organization. The content of a whaling attempt will often present as a legal communication or other high-level executive business.
- "Too good to be true" offers
- Unusual sender
- Poor spelling and grammar
- Threats of account shutdown, etc., particularly conveying a sense of urgency
- Links, especially when the destination URL is different than it appears in the email content
- Unexpected attachments, especially .exe files
Additional technical security measures can include:
- Two Factor Authentication incorporating two methods of identity confirmation—something you know (i.e., password) and something you have (i.e., smartphone)
- Email filters that use machine learning and natural language processing to flag high-risk email messages. DMARC protocol can also prevent against email spoofing.
- Augmented password logins using personal images, identity cues, security skins, etc.