What is “phishing?”
Email attack is the preferred method for many hackers -- a cybercriminal sends an email that attempts to fraudulently acquire the recipient’s personal information. A phishing email might include an attachment or a link or request personal information. The email may appear to be legitimate communication from your bank, phone company, a store you frequent, or a friend or coworker. A phishing email calls for an action, such as clicking on an embedded link, opening an attachment, or providing personal information.
What is “spearphishing?”
The higher up you are in an organization, the more likely you are to be a target for spearphishing -- specialized attacks against specific targets or small groups of targets to collect information or gain access to systems. In a spearphishing campaign, hackers have done their homework and learned names of the target’s subordinates, associates, friends, and perhaps even clubs the target belongs to or schools the target’s children attend. Spearphishing emails typically appear to be from or about those close relations.
Phishing scams work. Based on data collected by ThreatSim, Verizon calculated that “running a campaign with just three phishing emails gives a hacker a better than 50 percent chance of harvesting a click. At six emails, the probability goes to 80 percent, and with 10 emails, it’s almost 100 percent certain that a target will have clicked and let a malicious payload into a targeted computer. ”
Additionally, on some sites that hackers love "social media and banking websites" emails are used as usernames. A hacker who knows his target’s email address would then know their likely username for some accounts and could then try to crack the target’s passwords on those accounts.
What are some ways to identify phishing emails?
Poor spelling and grammar. Cyber criminals normally do not have the staff of copy editors that professional companies or organizations have, so phishing attempts often contain spelling and grammar mistakes.
Threats. Have you ever received a threat that your account would be closed if you didn't respond to an email message? Cybercriminals often use threats that your security has been compromised.
Spoofing popular websites or companies. Scam artists use graphics that appear to be connected to legitimate websites, but take you to scam sites or legitimate-looking pop-up windows. Cybercriminals also use web addresses that resemble the names of well-known companies but are slightly altered.
What can I do to help avoid becoming a victim of phishing and spearphishing?
Beware of links in email. Rest your mouse on the link (but don’t click!) to see if the address matches the link typed in the message. The real address should show in a small box. If it doesn’t look anything like the link text or the company’s web address, it's best not to click on it.
Call before you click. Suppose you have an email that seems to be from your organization’s human resources department telling you to complete an attached form to “update your personnel file.” The attachment could be an executable malware file or it could be a legitimate personnel update. Fight the natural instinct to trust an official-looking communication. Assume it’s malware until proven otherwise.
When in doubt, throw it out. If it looks suspicious, even if you know the source, it’s best to delete it or, if appropriate, mark it as junk email.
Consider using specialized email accounts. Use one account for work, one for friends, and one for online purchases. If you create a unique email address just for online payments, for example, it will be harder for a hacker to gain access to your information and account.
Take advantage of free antivirus software and security checkups. For a list of free security checks for your computer, visit https://staysafeonline.org/stay-safe-online/stay-safe-online/free-online-security-checkups-tools/.
If you are a victim of phishing, report it. Report phishing attempts to the appropriate experts within your organization, such as network administrators and security officers. If you believe your financial accounts may be compromised, contact your financial institutions immediately. Additionally, consider reporting the attack to your local police department, and file a report with the Federal Trade Commission, the FBI’s Internet Crime Complaint Center and/or the Anti-Phishing Working Group.
What about phishing phone calls?
Email isn’t the only way criminals launch phishing attempts. They might also attempt to scam you by phone, claiming to represent a trusted firm and offering to help with a computer problem or sell you a software license. Once they gain your trust, they may ask you for your user name and password or direct you to a website to install software that allows them to access your computer. Treat all unsolicited calls with skepticism and again – report them to your security manager and/or other appropriate authority.
For more, visit http://www.staysafeonline.org/stay-safe-online
Army Cyber on U.S. Army website
1st IO Command
780th MI Brigade (Cyber)
Department of Defense
U.S. Cyber Command
Air Forces Cyber
U.S. Fleet Cyber
Marine Corps Forces Cyber
Coast Guard Cyber
U.S. Army Reserve
Army National Guard
U.S. Army Cyber Center of Excellence
Developing tomorrow’s cyberspace strategies today.
Army Cyber School
Army Cyber Institute
National Defense University College of Information and Cyberspace
Air Force Institute of Technology
Defense Cyber Investigations Training Academy
Hacking for Defense
Defense Advanced Research Projects Agency
Defense Digital Service