Week 7: How to spot and deal with phishing?
Downloaded from pixabay

Week 7: How to spot and deal with phishing?

A few weeks ago, when we covered the different types of cyberattacks, we briefly introduced the concepts of social engineering and phishing. Given the popularity, we thought it would be great to delve into some tips for identifying and dealing with such scams.?

First and foremost, let’s define the term phishing. It’s a type of social engineering attack in which a cyber threat actor (CTA) pretends to be, for example, a reputable company, an acquaintance, or even an officer from law enforcement and attempts to steal information, like passwords or financial data, through a fake message containing a link.?

Note: While the tips shared in this article are generally used to identify phishing emails, some of them can be used to spot the other flavors of social engineering attacks like smishing and vishing.

Figure 1: Difference between Phishing, Vishing, and Smishing. Source:

Here are some pointers to detect phishing messages:

  • Sense of urgency: Often CTAs will claim a reward or penalty for immediate action, like clicking or calling. This tactic is commonly employed so that the victim doesn’t contact a trusted party (for example, their bank).?
  • Spelling and Grammar: This can be a result of poor translations, but if you see an email with obvious errors, it's most certainly a scam.?
  • Suspicious email domains: Pay attention to the email domains. In some cases, they can contain subtle misspellings like amaz0n.com instead of amazon.com. There might also be instances where the “domain extension” or Top-Level Domain (TLD) is, for example, Gmail.ru instead of Gmail.com.
  • Look out for unfamiliar senders: Be cautious about messages from unknown senders. If you work for an organization that uses, for example, Outlook, the mailing service can be configured to tag non-company emails with an External tag.?
  • Generic greetings: Messages that begin with “Dear Sir/ Madam” instead of a personalized salutation from your bank, for example, should let the alarm bells go off. Companies that know you will typically greet you with your name.

Figure 2: Example of a generic greeting. Source:

  • Dubious links and/ or attachments: Never open an attachment from an unknown sender, or if you do decide to open it because the sender appears to be legitimate, use your antivirus solutions or tools like Virus Total to scan the file. With regards to links in emails, one recommendation is to hover over (without clicking) them. If the address does match with what’s written in the email, it's most certainly a malicious link.

Note: On a mobile device (whether Android or iOS), you can long-press the link till a dialog box opens where you’ll be able to see the link).

Figure 3: Example of a suspicious URL. Source:

Now that you have a better understanding of identifying potentially malicious emails let’s assume you accidentally interacted with one. Well, you should consider taking the following actions:

  • If you merely clicked on the link and got redirected to a website that looks suspicious, do not enter any information.
  • Disconnect that device from the internet, as some types of attacks can provide cybercriminals with more information about you and even allow them to connect to other devices.
  • Scan your device using an antivirus solution.
  • You could consider a factory reset.?
  • Change all your passwords and contact the different service providers (for example, banks).
  • Notify your loved ones and employer. Your employer, for example, could disable your account/ device or some of its features.
  • Be on the lookout for suspicious activity, like logins from unknown locations (Some platforms might even notify you of unusual logins).?
  • Update your device.?
  • Forward/ report the email to your local authorities, antivirus provider, or even email service provider (such as Outlook or Gmail).?

We thought we’d end this week’s article with a humorous video. Please do not attempt to do it.?

Next week we’ll cover the complexities around ransomware.

This article is part of a project called Security Chronicles, written jointly with Walter Buyu .

Sources:


要查看或添加评论,请登录

Puneet Tanwani Manghnani的更多文章

  • Week 47: Let’s understand data classification and categorization

    Week 47: Let’s understand data classification and categorization

    Fortunately, this week’s article isn’t going to be as technically intense as the past few weeks. However, understanding…

  • Week 44: Cybersecurity Metrics

    Week 44: Cybersecurity Metrics

    In the last 43 weeks, we’ve covered the theory behind topics like, but not limited to, Risk Management, Incident…

  • Week 42: An Introduction to Cyber Threat Intelligence

    Week 42: An Introduction to Cyber Threat Intelligence

    Today’s topic is quite relevant. We aren’t quite sure why we didn’t address this in Q1, but… better late than never.

  • Week 40: PCI DSS

    Week 40: PCI DSS

    In the last two weeks, we’ve looked at ISO 27001 as well as the CIS Controls. Today we’ll focus on the Payment Card…

    1 条评论
  • Week 38: ISO 27001

    Week 38: ISO 27001

    Last week, Walter Buyu mentioned that the next few articles will deal with standards… and we’ll start with ISO 27001…

  • Week 36: VPN vs. Tor

    Week 36: VPN vs. Tor

    Walter Buyu and I addressed the basics of cryptography in Week 16. Last week (i.

  • Week 34: Vulnerability Assessment and Penetration Testing

    Week 34: Vulnerability Assessment and Penetration Testing

    This week’s article is around two types of security testing that should be part of your cybersecurity strategy –…

  • Week 31: The RACI Matrix

    Week 31: The RACI Matrix

    In the course of writing these weekly articles, Walter Buyu and I have briefly mentioned, a few times, the need to have…

  • Week 29: Data Destruction

    Week 29: Data Destruction

    Two weeks ago, we explored the topic of Data Lifecycle Management (DLM), discussing not only its benefits but also the…

    1 条评论
  • Week 27: Data Lifecycle Management

    Week 27: Data Lifecycle Management

    Organizations of all sizes recognize that data is their heartbeat. It improves their ability to make better decisions…

社区洞察

其他会员也浏览了