<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=355535778237127&amp;ev=PageView&amp;noscript=1">

What are Phishing Attacks and How to Identify Them

In the most simple terms, a phishing attack is any online activity that tricks people into revealing their personal or sensitive information. I think it's fair to say that most people know that this kind of activity takes place, but firmly believe that they would never fall victim to phishing attacks. As time goes on, however, these attacks continue to get more sophisticated and can really fool the best of us. According to a Forbes article, an estimated 23 percent of workers fell for phishing mail in a recent test with 11 percent of those opening the malicious attachment. Find out more about what phishing attacks are and how you can identify them faster.

iStock-600699462

 

 

Phishing Attacks

According to the United States Computer Emergency Readiness Team, "Phishing is an attempt by an individual or group to solicit personal information from unsuspecting users by employing social engineering techniques. Phishing emails are crafted to appear as if they have been sent from a legitimate organization or known individual. These emails often attempt to entice users to click on a link that will take the user to a fraudulent website that appears legitimate. The user then may be asked to provide personal information, such as account usernames and passwords, that can further expose them to future compromises. Additionally, these fraudulent websites may contain malicious code."

Phishing can get even more personal and become a term known as "spear phishing". The Digital Guardian "Phishing attacks and spear phishing have much in common, including the shared goal of manipulating victims into exposing sensitive information. Spear phishing attacks differ from typical phishing attacks in that they are more targeted and personalized in order to increase chances of fooling recipients. Attackers will gather publicly available information on targets prior to launching a spear phishing attack and will use those personal details to impersonate targets’ friends, relatives, coworkers or other trusted contacts."

Types of Phishing Attacks

Most often, phishing occurs in the form of an email, but can also come from direct messages from any platform that allows it. Online areas such as Facebook, eBay, and Craigslist have had reports of phishing. Even according to a Forbes article on the Top 10 New Phishing Scams of 2015, those listed were Bank of America, Westpac Bank, PayPal, Chase Bank, Microsoft Outlook, and the Apple Store with multiple phishing attacks coming from these accounts. According to an Entrepreneur article, there are five main types of phishing attacks which include:

  1. "Emails from people claiming to be stranded in a foreign country, asking you to wire money so they can travel home"
  2. "Emails claiming to be from a reputable news organization capitalizing on trending news. These emails ask recipients to click the link to read the full story, which in turn leads the user to a malicious website"
  3. "Emails claiming to be from organizations like the FTC and FDIC, referencing complaints filed or asking recipients to check their bank deposit insurance coverage"
  4. "Emails threatening to harm recipients unless sums in the thousands of dollars are paid"
  5. "Emails claiming to be a confirmation of complaints filed by the recipient. Not having logged any complaints, recipients are inclined to click on these links to find out what is being referenced. The links and attachments contain malicious code"

One thing that is for certain is that phishing attacks never end well for the victim. A string of headaches and stress, which is common with any fraud, are sure to be present and we at Rocky Mountain Credit Union want to keep you financially safe and sound. So when it comes to suspicious online activity, it's best to avoid the activity entirely because if it seems too good to be true, it probably is.

 

Non RMCU links are being provided as a convenience and for informational purposes only; they do not constitute an endorsement or an approval by Rocky Mountain Credit Union of any of the products, services or opinions of the corporation or organization or individual. RMCU bears no responsibility for the accuracy, legality, or content of the external sites.

Blog Categories