Skip to content
  • 111 Shoshone St, N Ste A, Twin Falls, ID 83301
  • 400 Main St. Filer, ID 83328
  • View Locations
  • Email Us
  • Bill Pay
  • 208-326-3800
Facebook-f Linkedin-in Instagram
  • Home
  • Services
    • Cybersecurity
    • IT Support
    • Microsoft 365
    • IT Consulting
    • Business Phones
    • Backups
    • Hardware as a Service (HaaS)
    • HIPAA & PCI Compliance
  • About
    • Team
    • Videos
    • Testimonials
  • Blog
  • Careers
  • Support
    • Remote Support
    • Helpdesk
Menu
  • Home
  • Services
    • Cybersecurity
    • IT Support
    • Microsoft 365
    • IT Consulting
    • Business Phones
    • Backups
    • Hardware as a Service (HaaS)
    • HIPAA & PCI Compliance
  • About
    • Team
    • Videos
    • Testimonials
  • Blog
  • Careers
  • Support
    • Remote Support
    • Helpdesk
Contact Us

What Is Phishing & How Are Hackers Using It?

  • November 12, 2018
  • Blog

While the number of people falling for sending personal information to the crown prince of Nigeria in hopes of receiving his promised wealth and riches seems to be dropping, phishing remains a major issue. In fact, the number of phishing campaigns pursued by hackers around the world increased by 65% in the last year.

What exactly is phishing? Hackers mimic the emails, forms, and websites of legitimate companies in an effort to lure people into providing their private, personal information. Things like credit cards numbers, social security information, account logins, and personal identifiers. A compromised victim typically doesn’t realize it until long after the event. Oftentimes, they only realize it after their identity or finances are affected. In the past, hackers carried out attacks relatively quickly. As soon as the victim gave up their information, the hacker moved in and stole money from the compromised bank account. Today, it’s often more lucrative for hackers to sell that information on the Dark Web. This results in longer-lasting, even more devastating attacks.

3 Types Of Phishing Attacks

Spear phishing

Hackers direct spear fishing attacks at specific individuals or companies. Attackers may gather personal information about their target to increase their probability of success. This technique is by far the most successful on the Internet today, accounting for 91% of attacks.

Threat Group-4127 used spear phishing tactics to target email accounts linked to Hillary Clinton‘s 2016 presidential campaign. They attacked more than 1,800 Google accounts and implemented accounts-google.com domain to threaten targeted users.

Clone phishing

Clone phishing is a type of phishing attack whereby a legitimate, and previously delivered, email containing an attachment or link has had its content and recipient address(es) taken. Hackers use this content to create an almost identical or cloned email. Hackers replace the attachment or link within the email with a malicious version. They then send it from an email address spoofed to appear to come from the original sender. It may claim to be a resend of the original or an updated version to the original. Hackers may use this technique to pivot (indirectly) from a previously infected machine and gain a foothold on another machine. It exploits the social trust associated with the inferred connection due to both parties receiving the original email.

Whaling

Hackers occasionally direct phishing attacks specifically at senior executives and other high-profile targets within businesses. The tech community coined the term whaling for these kinds of attacks. In the case of whaling, the masquerading web page/email will take a more serious executive-level form. They craft the content to target an upper manager and the person’s role in the company. Often times, hackers write the content of a whaling attack email as a legal subpoena, customer complaint, or executive issue. Hackers design mailing scams to masquerade as a critical business email, sent from a legitimate business authority. Hackers tailor the content for upper management, and usually involves some kind of falsified company-wide concern. Whaling phishers have also forged official-looking FBI subpoena emails, and claimed that the manager needs to click a link and install special software to view the subpoena.

Have you ever gotten an email from your bank or medical office asking you to update your information online or confirm your username and password? Maybe a suspicious email from your boss asking you to execute some wire transfer. That is most likely a spear phishing attempt, and you’re among the 76% of businesses that were victims of a phishing attack in the last year.

Method of Delivery

You won’t always receive phishing scams just through email. Hackers are getting trickier and trickier with their preferred method of execution. Last year, in 2017, officials caught on to attacks using SMS texting (smishing), Voice phishing (vishing) or social engineering, a method in which users can be encouraged to click on various kinds of unexpected content for a variety of technical and social reasons.

Ransomware: The Consequence

Phishing is the most widely used method for spreading ransomware, and has increased significantly since the birth of major ransomware viruses like Petya and Wannacry. Anyone can become a victim of phishing, and, in turn, ransomware attacks; however, hackers have begun targeting organizations that are more likely to pay the ransoms. Small businesses, education, government, and healthcare often, unfortunately, don’t have valid data backups. This means they are unable to roll back to a pre-ransomed version of their data. Instead, they have to pay their way out or cease to exist. Outside of ransom costs, many consumers brand phishing victims as untrustworthy. Many of their customers turn to their competitors, resulting in even greater financial loss.

Why are effective phishing campaigns so rampant despite public awareness from media coverage?

Volume: There are nearly 5 million new phishing sites created every month, according to Webroot Threat Report. There are now even Phishing as a Service companies, offering phishing attacks in exchange for payment. One Russian website, “Fake Game,” claims over 61,000 subscribers and 680,000 credentials stolen.

They Work: Over 30% of phishing messages get opened, and 12% of targets click on the embedded attachments or links, according to the Verizon Data Breach Investigations Report. In short, these hackers  are really good at looking really legitimate.

They’re simple to Execute: New phishing campaigns and sites can be built by sophisticated hackers in a matter of minutes. While we think there are far more legitimate ways to be earning money, these individuals have made a living out of duplicating their successful campaigns.

How do you protect yourself from a phishing attack? It’s a lot more simple than you’d think.

Now that you have an understanding of what phishing is, our next two blogs will teach you:

  • How to Spot a Phishing Attack
  • Fixing Your Weakest Link: Your Employees.
Recent Blog Posts

Tech Talk Monthly Newsletter Volume 16

February 2, 2023

Cybersecurity Attack Trends You Should Watch Out for in 2023

January 17, 2023

Upcoming Changes in the Cybersecurity Insurance Market

January 10, 2023
View All
Services
  • Cybersecurity
  • IT Support
  • Microsoft 365
  • IT Consulting
  • Business Phones
  • Backups
  • Hardware as a Service (HaaS)
  • HIPAA & PCI Compliance
  • Cybersecurity
  • IT Support
  • Microsoft 365
  • IT Consulting
  • Business Phones
  • Backups
  • Hardware as a Service (HaaS)
  • HIPAA & PCI Compliance
Site Links
  • Home
  • About
  • Team
  • Videos
  • Blog
  • Careers
  • Testimonials
  • Contact
  • Helpdesk
  • Remote Support
  • Bill Pay
  • Home
  • About
  • Team
  • Videos
  • Blog
  • Careers
  • Testimonials
  • Contact
  • Helpdesk
  • Remote Support
  • Bill Pay
Contact Us
  • 208-326-3800
  • Email Us
  • 111 Shoshone St, N Ste A
    Twin Falls, ID 83301
  • 400 Main St.
    Filer, ID 83328
Facebook-f Linkedin-in Instagram
Hours of Operation

Office Hours
Monday-Friday: 8am to 5pm
Saturday-Sunday: Closed

Support Hours
24/7 365 days per year
Give us a call

Sitemap | Privacy Policy | Terms & Conditions

Copyright 2023 SimplicIT. All Rights Reserved.
Remote Support