Phishing

“Hello My Dear. 
 
Please do not feel disturbed for contacting you, based on the critical condition I find mine self, though, it's not financial problem, but my health, you might have know that cancer is not what to talk home about, I am married to Mr. Shine Zuthimalin who worked with Tunisia embassy in Burkina Faso for nine years before he died in the year 2012. We were married for eleven years without a child. He died after a brief illness that lasted for five days. 

Since his death I decided not to remarry, When my late husband was alive he deposited the sum of US$ 9.2m (Nine million two hundred thousand dollars) in a bank in Burkina Faso, Presently this money is still in bank. And My Doctor told me that I don't have much time to live because of the cancer problem, Having known my condition I decided to hand you over this fond to take care of the less-privileged people, you will utilize this money the way I am going to instruct herein. I want you to take 30 Percent of the total money for your personal use While 70% of the money will go to charity" people and helping the orphanage.” 

 

The “My Dear” address has become almost iconic and is used by almost everyone who operates in the field of computer security. These emails are so-called “phishing” attacks, which took time to gain their place in the popular consciousness and become an issue of public interest.   

On one hand, this created an almost universal awareness that phishing is a type of attack via email (or today more often via social networks), in which users are tempted to give away their login or payment details. This is a very widespread type of attack and you’re sure to find dozens of such messages in your email account. The problem is that it became widely-known that phishing can be recognized according to its poor use of English or another language. However, this is not always true, and today’s attacks are often much more sophisticated.  

The goal of phishing is for a user to click on a dangerous link (or attachment), or access a page where he or she fills something in. These can be login details, information on payment cards, pins, etc. In order for such an attack to be successful, two basic strategies can be used – either “carpet bombing” and betting on a simple email that will eventually hook someone, or the use of more sophisticated tools.  

For example: “In a 2017 phishing campaign, Group 74 (a.k.a. Sofact, APT28, Fancy Bear) targeted cybersecurity professionals with an email pretending to be related to the Cyber Conflict U.S. conference, an event organized by the United States Military Academy’s Army Cyber Institute, the NATO Cooperative Cyber Military Academy, and the NATO Cooperative Cyber Defence Centre of Excellence. While CyCon is a real conference, the attachment was actually a document containing a malicious Visual Basic for Applications (VBA) macro that would download and execute reconnaissance malware called Seduploader.” 

Emails that look like they’re from bosses or teachers are often used, as are links that are often only slightly different to something well-known or famous. The phishing pageis then almost identical to a normal one (the only chance you have is to check the address window) and lures you into entering necessary info. As is evident from these examples, you don’t have to be complete fool to get yourself mixed up or “hooked” in an attack like this.  

The text of a phishing message often looks like information on an unsent or undelivered message, asks you to update something, enlarge the storage space in your email, or contains information on password changes, modifications to terms and conditions, a research project, an invitation, etc. The most common differentiating signs are the sender’s email address (your bank, for example, probably won’t be writing you from a Gmail address), a link that is often different in some small detail (e.g. .co instead of .com), or link shorteners (e.g. bitly).  

What are the basic rules to follow if you want to minimize the risk of phishing? 

  1. Don’t click on links in an email or messenger if you don’t know who’s sending them or why. Be very careful when it comes to attachments.  
  2. If you want to access your internet banking, go to it directly. This applies to all other services too.  
  3. Use updated software (mainly your browser and the plugins within it) and an antivirus. Don’t use flash.  
  4. Don’t believe anyone who says they know you but you’ve never heard of them.  
  5. Check for small typos in addresses both on webpages and on your email.  
  6. Never click on a URL from your email listed via an address shortener, and avoid QR codes from people or institutions that you don’t trust.  
  7. If anything out of the ordinary is happening, primarily in your e-banking or while logging in to your email, pay attention to it.  
  8. Think! 

 

You are running an old browser version. We recommend updating your browser to its latest version.

More info