MCC Daily Tribune Archive

Phishing Vs Spear Phishing Scams


You think you’ve seen it all, and then you receive another very clever phishing email.  As much as I’m in tune to these types of scams, I have taken a double take on several occasions.  I receive many emails daily asking me – “is this for real?”  It is important for you to know that ETS will NEVER send you an email asking you for your username and password.  Confidential information will NEVER be requested by our systems administrator or the help desk staff.  This article explains the difference between a phishing and spear phishing attack.  It gives you phishing indicators to look for in helping you determine if it’s a scam.  

What is Phishing?

Phishing is a psychological attack used by cyber criminals to trick you into giving up information or taking an action.  Phishing originally described email attacks that would steal your online username and password.  These attacks begin with a cyber criminal sending a message pretending to be from someone or something you know, such as a friend, your bank or a well-known store. These messages then entice you into taking an action, such as clicking on a malicious link, opening an infected attachment, or responding to a scam.  Cyber criminals craft these convincing-looking emails and send them to millions of people around the world.  The criminals do not know who will fall victim, they simply know that the more emails they send out, the more people they will have the opportunity to hack.  In addition, cyber criminals are not limited to just email but will use other methods, such as instant messaging or social media posts

What is Spear Phishing?

The concept is the same as phishing, except that instead of sending random emails to millions of potential victims, cyber attackers send targeted messages to a very few select individuals.  With spear phishing, the cyber attackers research their intended targets, such as by reading the intended victims’ LinkedIn or Facebook accounts or any messages they posted on public blogs or forums.  Based on this research, the attackers then create a highly customized email that appears relevant to the intended targets.  This way, the individuals are far more likely to fall victim. FYI, this is how Target was compromised.

Why should I care?

You may not realize it, but you are a phishing target at work and at home.  You and your devices are worth a tremendous amount of money to cyber criminals, and they will do anything they can to hack them.  YOU are the most effective way to detect and stop phishing.  If you identify an email you think is a phishing attack and you are concerned you may have fallen victim, contact Technical Support @ x 8324 immediately. 

Phishing Indicators

A.      Check the email addresses.  If the email appears to come from a legitimate organization, but the “FROM” address is someone’s personal account, such as @gmail.com or @hotmail.com, this is most likely an attack.  Check the “TO” and “CC” fields.  Is the email being sent to people you do not know or do not work with?

B.      Be suspicious of emails addressed to “Dear Customer” or that use some other generic salutation.  If a trusted organization has a need to contact you, they should know your name and information.  Also ask yourself, am I expecting an email from this company?

C.      Be suspicious of grammar or spelling mistakes; most businesses proofread their messages carefully before sending them.

D.      Be suspicious of any email that requires “immediate action” or creates a sense of urgency.  This is a common technique to rush people into making a mistake.  Legitimate organizations will not ask you for your personal information.

E.       Be careful with links, and only click on those that you are expecting.  Hover your mouse over the link.  This shows you the true destination of where you would go if you clicked on it.  If the true destination is different then what is shown in the email, this is an indication of an attack.

F.       Be suspicious of attachments.  Only click on those you are expecting.

G.     Be suspicious of any message that sounds too good to be true. 

H.      Just because you got an email from your friend does not mean they sent it.  Your friend’s computer may have been infected or their account my by compromised.  If you get a suspicious email from a trusted friend or colleague, call them on the phone.

This cyber-security tip is brought to you by the ETS: Cyber Security Awareness Program.

Donna Pogroszewski
Communications and Network Services
02/24/2014


Attachments:
icon Phishing.pdf