I’m White Ops’ resident phisher. As an InfoSecurity team member, it’s my job to make sure everything we do is secure and free from cybercriminals so we can fight for you. To do this, I deploy fake phishing attempts on White Ops’ own Humans, not to shame them when they click on a link (though they sometimes out themselves out of frustration), but to show just how realistic—human, even—a phishing attempt can appear. While we must stay particularly vigilant given our line of work, phishing can target anyone. Phishing is a low-risk, high-reward social engineering attack that uses electronic communication to exploit an end user into providing personal information or clicking on malicious links.
Without the proper literacy around how to spot phishing attempts, you can open yourself to all sorts of malware and fraudulent behavior. Especially since phishing has come a long way from the infamous foreign prince scams. Cybercriminals have evolved their tactics making it even harder to catch a phish.
Phishing isn’t just one type of attack, it’s a category of attacks. There’s spear phishing, smishing, vishing, and whaling attacks:
Spear Phishing is a targeted phish usually aimed at a specific user or organization. In order to do this, fraudsters use personal information that is discoverable online to contact you. This information can be found on areas of the internet that are freely available, such as on social media. These typically take the form of emails, such as Figure 1. You can see that the email is vague and urgent to entice someone to click.
Smishing is a SMS phish that usually asks you to do something, such as provide some sort of personal information or click on a link. This phish is particularly deceptive because people are more likely to trust a text message vs an email. In Figure 2, you can see how innocuous of a text they can be. Usually a smishing attack will have a very broad request to have you download a malicious app or go to a fake website where you have to enter PII (personal identifiable information) data.
Vishing is a phish that takes place over the phone where the fraudsters are asking you to provide some sort of personal information. The surge of VOIP technology has made it easier for adversaries to spoof caller IDs. We see this attack happen a lot where fraudsters pretend to be the IRS saying you owe them money or you’ll go to jail. They do this to get social security numbers or any of your PII data.
Whaling is a type of spear phishing attack that is more focused on high profile targets. With other types of phishing, the target is a group of people - it’s not about each individual. Whaling doubles down on specific people and targets them. It’s called whaling because they’re going after bigger targets like high-level executives. Typically, the fraudsters will pretend they’re a higher-level executive to get people to divulge sensitive company information. For instance, they will target a VP by pretending to be the CEO. Figure 3 shows a whaling attempt directed at a White Ops employee. The phish uses urgency in both the language and by having it appear to be from White Ops CEO & Co-founder, Tamer Hassan. Additional hallmarks include the wonky grammar, stray letters, and incorrect capitalization of “iPhone.” This is a pretty obvious phish to us since Tamer wouldn’t ask people to run “errands” for him.
Thankfully, once you learn the hallmarks of phishing attempts they become easier to spot and report. There are several elements you should check before clicking on any links:
It is possible to be proactive in protecting your information from phishing attacks.
Don’t panic! If you believe your credentials have been compromised, alert your leadership or security team as soon as possible, then go to the sites you use these credentials on and change them. Additionally, enable 2FA (Two Factor Authentication) if you haven’t already. Use a password manager and ensure you have unique passwords on every site you use, and enable 2FA on any site that offers it You should also check all your online accounts to see if there is any unusual activity associated with them.
If these credentials are used for a financial institution, I would contact them immediately and explain the situation. Consider freezing your credit if you’re concerned that the attack may have resulted in access to your social security information. Use it as a learning opportunity and teach family and friends what to look out for so they don’t fall for the same attack. If you click on a link and you believe your device is infected with malware, restore from a known good backup or factory restore the device.
Even when someone does their best to be safe online, they can still get caught in a phish net (pun intended). As long as you follow these steps, you’ll be better off the next time a fraudster tries to mess with you.