Phishing in Cyber Security

Spread the love

Phishing, another name of online fraud that involves misleading people into providing valuable and sensitive information, such as passwords or credit card numbers, by masquerading as an ethical source. This is a scam that can be done through email, malicious websites or social media. Some cyber attackers send messages pretending to be a trusted person or entity causing the victim to perform actions like clicking a malicious link, installing a malicious file, opening an email, instant message, or text message.

This can lead to malware installation or the revealing of sensitive information or freezing of the system which is a kind of ransomware attack. An organization which is exposed to such an attack suffers with financial losses including declining market share, reputation, and consumer trust.

Phishing Techniques

1. DNS cache poisoning Technique

It is otherwise known as pharming attack, a type of attack on cyber security system that redirects a website’s traffic to a malignant fake site. Pharming is used to steal sensitive information including credentials for login or financial information.

2. URL hijacking Technique

URL hijacking is a practice by which a URL is removed from the index of the search engine and replaced by another URL. The new, false URL not directly but via a redirect still links to the actual target page. As the incorrect/fake URL takes over the ranking of the original site, it leads to a huge drop in visitors also.

3. Clickjacking Technique

For example, an online shopper may end up downloading malware by clicking a button and thinking that they are doing a purchase. These cyber-attackers use several transparent layers to place malicious and dangerous clickable content over legitimate buttons.

4. Tabnabbing Technique

Tabnabbing is one of the phishing techniques where users are tricked into entering their credentials on an imposter website which resembles the original website.

Types of Phishing Attacks

1. Email Phishing Scam

Most of the phishing scam or phishing attacks are generally being sent via email. Cyber-attackers use fake domain names manipulating the users to click a link to a malicious website, to download an infected file, to click a link redirecting a fake website and submit personal data.

2. Spear Phishing Scam

Here, malicious emails have been sent to some specific people (usually high-privilege account holders). The attacker already has partial or full information about the victim who are tricking them into providing sensitive data, downloading malware or sending the attacker money.

3. Whaling Attack (CEO Fraud)

These messages are typically sent to high-profile employees of an organization to trick them into believing that the CEO or other management executive has requested to transfer money. The attackers spoof the CEO of the targeted corporation, instead of spoofing a popular website.

4. Smishing

Attackers send a text message to the targeted individuals with a malicious link showing the promise to provide them with rewards, discounts or free prizes.

5. Vishing

It involves phone conversations where attacker pretends to be a scam investigator for a bank or credit card company, informing the victims that their accounts have been breached. Vishing scams can also be automated phone calls where voice-changing software is being used.

6. Angler Phishing Scam

Attackers reply to posts using social media, pretending to be an official and reputed organization tricking users into providing personal information and account credentials.

7. Malware Phishing Scam

This attack tricks the targets to click a link or download an attachment to the malware get installed on the system.

8. BEC (Business Email Compromise)

It involves appearing an email from someone in or associated with victim’s own organization requesting urgent action, whether purchasing gift cards or wiring money.

Rely on Blue Summit for protection against Phishing Scam!

There are several practices that may strongly safeguard vulnerabilities of phishing attacks. We, at Blue Summit, offer a small business cyber security package which costs just £2,000/year.

1. Periodical phishing test to see which employees need reminders

Periodical phishing test for employees that can help end users better understand attack and to mimic real phishing attacks

2. Training content for employees

Train employees to make them understand phishing strategies, realize and identify signs of phishing, and report suspicious activities to the cyber-security team.

3. External penetration test of your network

External penetration testing is a kind of phishing security test to identify and fix weaknesses that can be exploited by malicious agents. The tester will attempt to access database and system using brute-forcing passwords, stolen credentials, and exploiting known security vulnerabilities.

4. Review of your firewall

Conduct Firewall Security Reviews that will identify any potential security vulnerabilities present within your system firewall by rigorous firewall penetration testing.

5. Recommendations for updating your security online

Comprehensive security tests of your applications (preferably by a specialized 3rd party) and IT infrastructure can greatly avoid risks.

Conclusion

As malicious cyber attackers and hackers are constantly coming up with new and sophisticated techniques in order to perform dangerous security attacks, every organization needs major protection against phishing.

Blue Summit is experienced cyber-security specialist and we can help in avoiding cyber security risks with best of the security practices.

If you are facing frequent cyber security threats or with a risk exposure, you can reach out to us for a consultation.

Refer our Skills page:

Android App Development

Blue Summit employs professional android application programmers and developers as well as quality assurance engineers to create and test applications that work flawlessly across the vast array of Android devices and environments and provide exhilarating end-user experiences. At reasonable costs, Blue Summit offers qualified Android...

read more

TESTIMONIAL