Phishing is real!
We’ve all heard of the word phishing but have never really paid attention to it. If it hasn’t happened to me or my business I don’t worry, guess what, we are all in danger.

Phishing is real!

Phishing explained

Phishing is a fraudulent act in which an attacker acquires sensitive data, such as bank account numbers, through a fraudulent solicitation in email or on a web site, in which the perpetrator masquerades as a legitimate business or reputable person.

The Internet is a network of computers filled with valuable data, so there are many security mechanisms in place to protect that data, but there's a weakest link: the human. If the user freely gives away their personal data or access to their computer, it's much harder for security mechanisms to protect their data and devices.

A?phishing attack?is an attempt to trick a user into divulging their private information.


No alt text provided for this image
A phisher puts out some tempting bait, a persuasive website. If the user bites, then the phisher can reel in some tasty private information.

An example attack

A phishing attack typically starts with an email that claims to be from a legitimate website, like a banking website or online store:

No alt text provided for this image
An email that claims to be from PayPal

The goal of the email is to obtain private data from the user, so it either asks the recipient to reply with personal information or it links to a website that looks remarkably like the original site:

No alt text provided for this image
A website that claims to be a PayPal login screen

If the user is convinced and enters private details on the site, that data is now in the hands of the attacker! If the user filled in login details, they can then use those credentials to log in to the real website, or if the user provided credit card details, they can use the credit card to make purchases anywhere.

Signs of a phishing attack

Fortunately, there are some tell-tale signs of phishing scams.

Suspicious email address

Phishing emails will often come from addresses at domains that don't belong to the legitimate company.

No alt text provided for this image
Email looks like it's from PayPal but is actually from mailbox.com.

Conversely, a legitimate email address is not a guarantee that an email is 100% safe. Attackers might have figured out a way to spoof the legitimate email address or hacked their way into control over the actual email.

Suspicious URL

Phishing emails will often link to a website with a URL that looks legitimate but is actually a website controlled by the attacker.

No alt text provided for this image
URL has "paypal" in it, but isn't PayPal's actual domain.

Attackers use a variety of strategies to make tempting URLs:

  • Misspellings of the original URL or company name. For example, "goggle.com" instead of "google.com".
  • A spelling that uses similar looking characters from other alphabets. For example, "xn--wikipedi-86g.org" versus "wikipedia.org". The "e" and the "a" are actually different characters in those two d
  • omains.Subdomains that look like the domain name. For example, "paypal.accounts.com" instead of "accounts.paypal.com". PayPal owns the second domain, but they have no control over the
  • first.A different top level domain (TLD). For example, "paypal.io" versus "paypal.com". Popular companies try to buy their domain with the most common TLDs, such as ".net", ".com", and ".org", but there are hundreds of TLDs out there.

Even if an attacker hasn't found a similar looking URL to host their malicious webpage, they can still try to disguise the URL in the HTML.

Consider this very legitimate looking text:

Visit?www.paypal.com?to change your password.

Now try clicking the link. You didn't land on PayPal, did you? That's because the text of a link isn't the same as the destination of the link.


Visit <a >www.paypal.com</a> to change your password.

An attacker might disguise links in that way in an email message or a webpage. Whenever you click a dubious link, it's important to check the URL in the browser bar to see where your browser actually landed.

Article source: https://www.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:cyber-attacks/a/phishing-attacks


About MBV IT
MBV IT is a leading provider of ICT services in South Africa, has expanded its reach in the industry with the establishment of Pluxnet, a subsidiary offering fiber-to-the-home (FFTH) services. With Pluxnet's cutting-edge fiber optic network and MBV IT's expertise in ICT services, the two companies are working together to provide world-class connectivity to homes and businesses across the region. This collaboration highlights MBV IT's commitment to innovation and excellence, as well as their dedication to advancing technology and improving connectivity in the country. As a responsible corporate citizen, MBV IT is empowering communities with the tools they need to succeed in the digital age, promoting economic growth and social progress. By establishing Pluxnet as their subsidiary, MBV IT is positioning itself as a leader in the ICT industry, with the ability to provide a wider range of services to their customers while maintaining the highest standards of quality and excellence.

Please visit the MBV IT website on www.mbvit.co.za and for Fiber please visit the Pluxnet website on www.pluxnet.co.za?Email [email protected] for more information.?

For more articles please visit the MBV IT blog on https://mbvit.co.za/blog/

要查看或添加评论,请登录

MBV IT的更多文章

社区洞察

其他会员也浏览了