Phishing Attacks

The word “phishing” might conjure up images of relaxing by a lake or stream to catch some fish, but there’s nothing laid-back about it. Phishing campaigns lure you with seemingly must-click offers – anything from get-rich-quick schemes to insistent security updates – and then steal your personal data. While phishing is among the oldest and best-known cyberattack techniques, it lives on, with continual improvements making it harder to spot.

Phishing expeditions: Why people keep falling for scams hook, line and sinker

It was once relatively easy to flag a phishing attempt. Common giveaways that a request for you to hand over personally identifiable information (e.g., your Social Security number, address, phone number, etc.) was illegitimate included:

  • Typos and general sloppiness in email communications.

  • Redirects to unsecured websites (i.e., ones without HTTPS encryption).

  • Well-known backstories, such as the “Nigerian prince” frame.

Nowadays, you can’t count on phishers to leave such obvious tracks. For example, in late 2017 security researcher Brian Krebs noted a sharp rise in phishing attacks from websites hosted on HTTPS domains, which are normally synonymous with safety. HTTPS-protected sites feature a padlock near their URLs; if you’re on a desktop PC, you might also see some green text indicating who holds the SSL certificate.

Using the HTTPS version of a site is always preferable to its plain HTTP address, and HTTPS is itself still a secure protocol, as well as an absolute must-have when performing tasks such as shopping or checking your bank account balance. None of that means it can’t be used as a distraction for attackers prodding you into handing over sensitive data; an HTTPS site is not necessarily legitimate, especially now that site owners can obtain valid SSL certificates for free.

What you can still do to protect yourself from phishing

Now for some good news: You can still thwart virtually all phishing scams by paying careful attention to any unexpected and unusual communications. Let’s review a few useful tips in this regard:

Links can’t always be trusted to go where they say they do. To avoid falling into a trap, hover your mouse over a link you’re not sure of to see where it actually leads. If you’re on a mobile device, you can usually do a light tap and hold on a link to preview where it goes.

The important detail to notice is the “root” domain. This sounds complicated, but it simply refers to what’s in between the “http(s)://” and the first “/”. Phishing sites often have lengthy and/or suspicious roots, such as “system.confirm” or “web-paypal.com.”

Phishers often steer would-be victims toward domains they falsely claim are legitimate sites, such as a bank’s web app or an identity verification landing page, with insistence you act quickly. You can actually preempt this line of attack by keeping all your most important sites saved as bookmarks in your web browsers.

These bookmarks provide a safe fallback in the unlikely scenario that you really do need to do something for your bank or to verify an address. It doesn’t matter where you save them, since all major browsers do cross-device synchronization if you are signed-in to the same account on each one.

3. Ignore installation prompts, particularly on Facebook

You might have tried viewing a video on Facebook or another social site, only to be prompted to download a special codec or plugin to actually watch it. These requests are almost always spurious, given the wide compatibility of video formats between browsers and operating systems.

Basically, if you did not go looking for a piece of software, do not download it, especially from sites you’re barely familiar with and that are likely choked with pop-ups and ads. The same holds for phishing attempts in general: Unless you were expecting to take action on a critical financial or commercial transaction, don’t let someone else talk you into doing so.

What if I suspect Phishing?

If you suspect that you are a victim of Phishing, report the suspected emails to IT for further review. To find out how to report emails, CLICK HERE.

 

Office Hours Room C229: Monday-Friday 8:00 am - 5:00 pm | Call us 269-927-8189