Gone Phishing?
For those of you who are just starting out in your cybersecurity endeavors or looking to learn about what phishing is, you’ve come to the right place.
What is Phishing?
Phishing is not a version of fishing following the old trend of replacing “f”s with “ph”s.
It is a cybersecurity term describing a technique that threat actors, bad people on the internet, utilize in order to steal something, usually money or credentials. It is a form of Social Engineering Attacks.
They pose as someone or something legitimate to entice you to click a link or download a file, similar to how bait on a hook lures fish.
Other related techniques include:
Smishing: SMS-based (Text Messages) phishing
Vishing: Voice-based phishing
Spear Phishing: Targeted email-based phishing
General phishing campaigns play the numbers game. The threat actors send their digital “hooks,” phishing emails, to as many “fish,” users, as possible. The more users they send it to, the more likely they will get bites.
How to identify?
There are multiple clues and questions that you can ask yourself to help identify if the email you received is phishing.
Some simple questions to ask are:
Was this an expected email?
Most general phishing attempts are unsolicited emails that come at random times to your inbox.
Is it an alarming or enticing subject?
Some alarming phrases could be “Urgent,” “Action Required,” or “Account at Risk.”
Some enticing phrase could be “Congratulations! You’ve won!,” “Mega Discounts Inside!,” or “You’ll never believe what [Celebrity/Figure] just did!”
Usually these are “Too Good to Be True” attention grabbing subjects to get you to open it.
Are there grammatical issues and/or odd vocabulary?
Things like typos tend to be pervasive throughout the email.
Odd vocabulary:
Common phrase: “kindly” plus a verb.
Kindly update, kindly send, or kindly remit.
Grammatically correct, but not used in emails.
Others
Henceforth, Thusly, or other fancy words.
They might be properly used, but not common to have them emails.
Is there a sense of urgency?
They will attempt to create panic or FOMO (fear of missing out).
This plays on human nature to react on instincts instead of logic.
Is the email coming from where you expect it to come from?
Verify the email domain by looking at everything after the “@” symbol.
Example:
Correct domain: “support@yourbank.com” the domain would be “yourbank.com”
Bad domain: “support@yourbank-badperson.com” the domain would be “yourbank-badperson.com”
Are the links taking you to where you expect it to go?
Same concept as the email domains but applies to links in the email.
To identify the domain of a URL/link, look at the two parts separated by a “.” before the third “/” in the URL/link.
Good domain: https://www.yourbank.com/login
Domain: yourbank.com
Bad domain: https://www.yourbank-badperson.com/login
Domain: yourbank-badperson.com
How to protect yourself?
Look for the signs described above.
Do NOT respond or forward it.
This alerts the bad people that the email account is active.
If it came from a friend or someone you know, but the email seems off.
Contact your them via a known good alternative like calling or texting their cellphone number.
Report the suspicious message.
If you work at a company, use your company’s approved method to report emails.
If you’re using a personal emailing system, such as Gmail, you can click the three dots next to the reply button and click “Report phishing.” Outlook and other mail systems use similar processes/locations.
Avoid sharing personal information.
If in doubt, contact the organization/friend directly.
Use a verified website or phone number that is not contained within the email as those numbers or websites could be tied back to the bad person.
Use strong passwords:
It’s best to create unique, complex passwords for different accounts.
If you have a lot of accounts, it’s easier to use a password manager.
These can help generate strong passwords and keep them unique across sites.
Make sure to use a good, strong, unique password that is used to login to the password manager.
If the website or application allows it, configure Multi-Factor Authentication (MFA). I’ll explain more about MFA in an upcoming blog post.
Most sites can do it via email or text.
Enabling these methods are better than not having it at all
If the sites allow authenticator apps, this is considered a “phishing-resistant”, better method.
There are apps like Google Authenticator, Authy, Microsoft Authenticator, and others that are free to use.
Conclusion
Phishing is a prevalent threat in the digital world, but by staying vigilant and following the tips outlined above, you can protect yourself and your sensitive information. Stay safe and always think twice before clicking on that link!
Comments are welcome! Keep them civil and on topic.