Emerging Voices

Best Practices to Mitigate the Impact of Phishing

By

Justin Quintero-Franco and Alexa Senott, Intern Analysts, Access Point Consulting

By

Access Point Consulting

Understanding Phishing

Phishing is a form of social engineering where cybercriminals aim to trick individuals into revealing sensitive information or downloading malware. This type of attack typically involves sending an email that appears to come from a legitimate, trusted source. The email often contains a brief message followed by a link or attachment. Clicking the link usually redirects the victim to a fake login page that requests their credentials, while attachments may contain malware. Cybercriminals seek information such as login credentials, bank account details, and credit card information to commit identity theft and financial fraud.

Different Forms of Phishing

Phishing isn't limited to email. Four common variations include:

  1. Smishing (SMS Phishing): This involves sending fraudulent SMS messages that appear to come from reputable entities like banks or service providers, tricking individuals into revealing sensitive information. Smishing exploits the ubiquity of mobile phones and users' reliance on text messaging. Attackers send fraudulent SMS messages pretending to be legitimate entities and designed to create a sense of urgency. Recipients are prompted to take immediate action, like clicking a link or providing personal information. The goal is to extract sensitive data like banking information, credit card details, social security numbers, and login credentials.
  2. Spear Phishing: This targets specific individuals or organizations through personalized emails, often using information gathered about the victim to make the attack more convincing.In spear phishing, attackers focus on specific individuals, conducting thorough research on their targets beforehand. The objective is to install malware or steal sensitive information by posing as a trusted person in the victim's life. This method exploits the knowledge obtained from emails or communication platforms to lower the user's guard. Attackers often use spoofed links in their messages to deceive victims into providing their login credentials.
  3. Quishing-QR Code Phishing: This targets individuals or organizations through two-dimensional barcodes that trick users into visiting malicious sites or downloading malicious files disguised as advertisements. Quishing allows individuals to get information using their camera. Malicious actors create QR codes linked to rogue websites. These sites are meticulously crafted to deceive users or compromise their security. The attacker disseminates the QR codes through various forms, including phishing emails promising enticing rewards, social media posts, and even physical objects. When an unsuspecting individual scans the QR code, they are redirected to a malicious site that downloads malware or prompts the individual to enter sensitive information.
  4. Vishing-Voicemail Phishing: This targets individuals or organizations through phone calls or voicemails that pressure victims into revealing sensitive information. Vishing exploits voice communication and users’ reliance on phone calls. These fraudulent calls often pretend to be legitimate companies such as banks, employers, airlines, or even someone the victim personally knows. During a vishing call, attackers try to create a sense of urgency to trick victims into revealing sensitive information. The goal is to extract information such as bank account numbers, credit card information, and login credentials.            

Protecting Yourself and Your Organization from Phishing

  1. Recognize Phishing Emails: Learn to detect phishing emails by looking for red flags such as unfamiliar greetings, unusual requests, a sense of urgency, spelling and grammar errors, suspicious links and attachments, and requests for personal information.
  2. Do Not Respond to Phishing Emails: Avoid responding to suspicious emails, as this indicates to threat actors that your email address is active, potentially leading to further phishing attempts.
  3. Never Click on Links or Attachments: Refrain from clicking on any links or attachments in suspicious emails, as they may contain malware.
  4. Never Share Personal Information: Legitimate organizations will never ask for sensitive information like login credentials or bank details via email or text messages.
  5. Report Suspicious Messages: Report any suspicious messages to your company’s IT department for further review and verification. Use the built-in reporting features in email clients like Outlook and Gmail.
  6. Implement Regular Employee Training and Awareness: Conduct regular training sessions to educate employees on how to detect and report phishing emails. Emphasize that everyone in the organization is susceptible to phishing scams.

Technical Solutions to Protect Against Phishing

  1. Multi-Factor Authentication: Enhance security by requiring multiple forms of verification beyond just a password.
  2. Strong Passwords: Create robust passwords with at least 12 characters, including uppercase letters, numbers, and special characters. Regularly update passwords and avoid reusing them across different accounts.
  3. Conduct Regular Data Backups: Regularly back up critical files and systems to ensure data can be restored in case of a phishing attack.
  4. Block Pop-Ups: Use pop-up blockers to prevent malicious pop-ups associated with phishing attacks.
  5. Keep Systems Up to Date: Regularly update software to protect against vulnerabilities exploited by phishing attacks.
  6. Implement Antivirus Software: Use antivirus software to detect and prevent malware from malicious links and attachments.
  7. Email Filters: Use email filters to detect and isolate spam emails, prioritize important messages, and apply custom rules to manage your inbox efficiently.
  8. Web Browser Extensions: Utilize anti-phishing browser extensions to block access to malicious websites.

Best Practices for Smishing (SMS Phishing)

  1. Don’t Respond: Avoid responding to unsolicited text messages to prevent further smishing attempts.
  2. Do Not Click on Links or Attachments: Refrain from clicking on links or attachments in suspicious text messages.
  3. Verify Urgency and Sender’s Number: Verify the phone number and urgency of the message by contacting the organization through their official phone number.

What to Do If You Responded to a Phishing Email

If you fall victim to a phishing attack, it’s crucial to follow your Incident Response Plan. This includes detecting and verifying the attack, containing the affected systems, analyzing the impact, identifying the cause, and implementing recovery steps. Regular training and updates to security policies can help prevent future attacks.

Summary

Implementing these best practices will enhance email hygiene and create a robust online security environment. Understanding phishing and its implications is crucial for protecting organizations from financial loss, reputational damage, and operational disruption. Employees are the first line of defense. Educating them on recognizing and responding to phishing attacks is essential for maintaining a secure organization.

References

  1. Don’t be a phishing victim: Know your anti-phishing chrome extension. PhishProtection.com. (2023, July 31).
  2. Glosson, M. (2024, July 9). Best email spam filter services to stop junk in 2024. Atom.
  3. How backup saves you from phishing attack: Cloud backup & recovery solutions. CloudBacko. (2024, March 8).
  4. Kosinski, M. (2024, June 10). What is smishing (SMS phishing)?. IBM.
  5. Moes, T. (2024, June 10). What is anti-phishing? everything you need to know. SoftwareLab.
  6. Stouffer, C. (2022, September 18). How to protect against phishing: 18 tips for spotting a scam. Norton United States.
  7. Wells, A. (2021, April 20). Phishing incident response planning: Rapid7 blog. Rapid7.
  8. What is quishing. cloudflare. (n.d.).
  9. What is spear phishing? definition and prevention. Fortinet. (n.d.).
  10. What is a vishing attack? (n.d.).  

Resources

Trending Articles & Security Reports

Resources

CyberWatch

August 29, 2024

Hertz So Good: When Ransomware Hits the Airwaves

In May of 2024, a national association for amateur radio was hit by a severe ransomware attack that encrypted multiple internal systems, including desktops, laptops, and both Windows and Linux servers. The attack was coordinated by organized criminals and enabled by information purchased on the dark web. Learn how their response can help your organization avoid becoming a casualty of the ransomware trend.

Find out more
August 28, 2024

Still Stirring the Honeypot: Why an Old Log4j Vulnerability Still Packs a Punch

New threats emerge daily, but some old network vulnerabilities stubbornly refuse to fade away. One such vulnerability is Log4j, better known as Log4Shell. Discovered nearly three years ago, this critical flaw continues to wreak havoc across industries. Dive into the details and explore why this vulnerability remains such a persistent threat.

Find out more
August 28, 2024

Network Segmentation and Subnetting in Modern IT Security

Chief among the multi-layered strategies companies use to safeguard their sensitive data is network segmentation. This approach, which involves dividing a network into smaller, isolated segments, goes a long way toward stymying the efforts of malicious actors. The significance of network segmentation and subnetting, along with their many benefits are discussed ahead.

Find out more