Online Phishing: How to Stay Out of the Hackers’ Nets
Despite the growing popularity of social media and messaging apps, email remains the preferred way to communicate online for millions of Americans. And the bad guys know it. Of the 28.6 billion cyber-threats Trend Micro blocked globally in the first half of 2019, over 24.3 billion were carried by email. That’s 91%. Many of these threats were made possible via phishing: a tried-and-true technique that hackers having been using for years.
Why is it so popular? Because it directly targets what they believe to be the weakest link in home cybersecurity: you, the user.
Phishing can lead to data theft, identity fraud, sextortion, ransomware, or infection with a host of dangerous malware. So what can you do to stay safe?
What is phishing, exactly?
Phishing at its heart is a confidence trick. Attackers use a technique known as social engineering to manipulate the victim into doing their bidding. Usually they achieve this by spoofing their email so that it appears as if sent by a legitimate entity, like a bank, an insurance provider, a popular technology company, or even a friend.
They either want your personal data, your money, or for you to unwittingly download malware to your machine — by clicking on a malicious link or opening a malicious attachment. So, in order to get you to do this without thinking too hard about it, they’ll typically create a sense of urgency. For example, your bank contacts you saying you need to urgently update your details to avoid extra charges, or the IRS says you owe them an outstanding sum that needs to be paid immediately.
Sometimes they use the “carrot” rather than the “stick” approach. Phishing emails can be crafted to offer huge discount sales on popular items, such as during the upcoming Black Friday holiday weekend. In fact, capitalizing on popular events is a classic phishing ploy: there have already been numerous warnings ahead of the upcoming US 2020 Census.
Harder to spot
Unfortunately, the days when phishing emails were easy to spot are long gone. Today, successful cyber-criminals are much savvier. There are fewer typos and grammatical mistakes in emails, and the sender’s domain, writing style and corporate logos are often convincingly spoofed.
Hackers have also been able to make their emails look more legitimate by packing them with more of your genuine details. Every time a company you have stored personal details with is breached or leaks its customer databases, hackers can gain access to a trove of personal data to use in follow-on phishing attacks. The latest was Adobe, although breaches at delivery firm DoorDash and the American Medical Collection Agency, among many others this year, exposed personal data on millions of Americans. Along with your email address, hackers get your full name, account details and history, which they can use to trick you into handing over more details.
What are the phishers after?
As mentioned, the hackers behind phishing attacks are basically shooting for a handful of outcomes. These are:
|
|
They either want your personal and financial data to sell on the dark web to scammers, or to use themselves to commit identity fraud. The easiest way of getting this is by tricking the user into clicking through to a separate phishing page, where they’re prompted to enter their details. Like the email, the page itself is spoofed to appear as if hosted by a legitimate company.
Often, all they need is your log-ins, which provide the keys to your most sensitive online accounts, like internet banking, health insurance portals, and even Uber and Netflix. The latter can be sold on dark web marketplaces to offer unscrupulous buyers free streaming or taxi services, for example.
|
|
By clicking through in a phishing email, you could also be unwittingly downloading malware to your machine. It could be ransomware designed to lock you out of your PC until a fee is paid, or covert crypto-jacking malware which will cause your machine to run slowly while it mines for cryptocurrency using your power supply. It could also be a banking Trojan designed to steal your banking log-ins.
|
|
An emerging extortion scam involves tricking the user into believing they have been filmed via their webcam in a compromising position. Usually, the attacker threatens to release the footage to all of the victims’ contacts if they don’t pay a ransom. Sometimes they use previously breached data, such as the target’s email password, to add legitimacy to the scam.
Trend Micro data reveals that these so-called “sextortion” schemes more than quadrupled from the second half of 2018 to the first half of 2019.
How can I stop it?
Fortunately, there are a number of things you can do to protect you and your family from the impact of phishing emails. A combination of user awareness and technology filters from a reputable cybersecurity vendor is a great place to start.
Consider the following:
|
|
How Trend Micro can help
Trend Micro Security offers capabilities to filter out malicious phishing and spam emails before they even hit your inbox, or to examine them if they do. These include:
|
|
Click Internet & Email Controls > Spam & Emailed Files to open the panel. You can then check the boxes to:
|
|
You can also increase the strength of your spam filter in Settings:
|
|
Once switched on, it will send a warning pop-up when you open a scam email, telling you to not follow any instructions contained in the email. You can then decide to Report Dangerous to report the scam or click on Looks Safe to bypass the warning (not recommended). There’s also an option to View Details in the popup to get more info on the scam.
To find out more about the dangers of phishing and malicious spam and how Trend Micro can help protect you, watch our YouTube videos:
For more information, go to our website for a Security Products Overview.
Tags: Phishing, Spam, Anti-Fraud, Internet Security
Read More HERE