{"id":2624,"date":"2016-06-16T10:00:33","date_gmt":"2016-06-16T17:00:33","guid":{"rendered":"https:\/\/berkonomics.com\/?p=2624"},"modified":"2016-06-13T14:29:24","modified_gmt":"2016-06-13T21:29:24","slug":"dont-go-on-a-phishing-trip","status":"publish","type":"post","link":"https:\/\/berkonomics.com\/?p=2624","title":{"rendered":"Don\u2019t go on a phishing trip!"},"content":{"rendered":"<p><em>Dave\u2019s note: Our guest author this week is Kevin McDonald, <\/em><em>Executive Vice President and Chief Information Security Officer at Alvaka Networks, a network services and security firm in Irvine, California. He is a trusted technology and security consultant and public policy\u00a0advisory\u00a0to some of America&#8217;s most influential people and organizations.\u00a0<\/em><\/p>\n<p><strong><em>By Kevin McDonald<\/em><\/strong><\/p>\n<p>Phishing, a play on the word \u201cfishing,\u201d is a dangerous form of executive or CEO email fraud, and is negatively impacting individuals and companies worldwide. You certainly have seen some form of this social engineering &#8211; where criminals pretend to be an organization or individual such as the IRS, a creditor, partner, CEO\/CFO or other key executive.<\/p>\n<p>The goal is to \u201cphish\u201d a person into taking actions they shouldn\u2019t. An attack may involve a <img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-medium wp-image-2625\" src=\"https:\/\/berkonomics.com\/wp-content\/uploads\/2016\/06\/phishing-300x200.jpg\" alt=\"phishing\" width=\"300\" height=\"200\" \/>call demanding payment to the phisher for past due invoices from a legitimate supplier, or verification of credit card data to create facilitate the fraudulent transaction. Phishing can hook you through infected emails &#8211; or links to a fake website containing malware &#8211; or information capturing forms you are asked to complete.<\/p>\n<p>Many websites are compromised and have been hacked with or set up with embedded nefarious software. \u00a0A successful attack can lead to you or one of your associates providing highly sensitive personal details of self, customers or employees \u2013 including social security numbers, usernames, passwords, and\/or banking information. Phishing victims have been known to transfer large sums of money as a result of appeals, threats, or claims.<\/p>\n<p><span style=\"color: #993300;\"><em>[Email readers, continue here&#8230;]<\/em> <\/span>\u00a0Some attacks are rudimentary, but watch it! Sophisticated attacks fool highly astute users. \u201cSpear phishing\u201d is directed at specific individuals or groups and is especially effective. \u00a0From IT staff to controllers, many comply with a phisher who has done homework. Attackers use social media and professional pages to understand their targets. Being rushed to respond and clear a task, aiming to please when seemingly appropriate, or fearing threats to leadership or the entity under attack can easily lead to mistakes.<\/p>\n<p>So what does phishing look like? You may recognize some obvious attempts yourself. For example, you receive a PayPal email revoking your credit, but the email contains obvious grammar and spelling errors, and you don\u2019t have a PayPal account. You may have received a notice of default for some critical service you do or don\u2019t have \u2013 along with a request to transfer money outside of the normal payment channel.<\/p>\n<p>Attacks have resulted in losses from a few dollars to hundreds of millions. Anthem Blue Cross for example could be a phishing loser. It reportedly suffered a phishing attack that exposed an estimated eighty million patient records. The attack is believed to have started with custom malware sent to Anthem IT staff. Unfortunately, patients were further victimized when they were then targeted with fake Anthem emails offering credit protection. \u00a0According to a recent lawsuit filed by a New York U.S. Attorney, another unnamed company was phished for nearly $100 million and luckily, so far recovered much of that. FireEye has reported Apple phishing campaigns using fake Apple domains to lure victims into providing Apple Store<a href=\"http:\/\/www.ibtimes.co.uk\/iphone-users-targeted-by-new-apple-support-scam-that-steals-id-password-1554421\"> IDs and passwords<\/a>. \u00a0The list goes on and becoming a victim is not difficult.<\/p>\n<p>So, what can you do?<\/p>\n<ul>\n<li>Slow down and pay attention with skepticism when something seems \u201cnot just right.\u201d<\/li>\n<li>Use email clients or services with pre-delivery scanning.<\/li>\n<li>Don\u2019t open emails from unknown sources.<\/li>\n<li>Never use an <u>administrator account<\/u> to surf the web or open email.<\/li>\n<li>Read URLs very carefully to be sure they are legitimate (<a href=\"http:\/\/www.microsoft.com\">microsoft.com<\/a> is not <a href=\"http:\/\/www.microsft.com\">www.microsft.com<\/a>.)<\/li>\n<li>Read email addresses carefully and verify (<a href=\"mailto:joel@outlook.com\">joel@outlook.com<\/a> is not <a href=\"mailto:Joel@outlok.com\">Joel@outlok.com<\/a>.)<\/li>\n<li>Look for improper grammar and language patterns that appear to be foreign or don\u2019t fit the person or organization represented.<\/li>\n<li>Avoid account verification, updates or other requests for you to click a link, log into a website or provide information.<\/li>\n<li>Never enter data into a pop-up.<\/li>\n<li>Never open an unsolicited attachment or link.<\/li>\n<li>Use secondary authentication and two party authentication (code to your cell phone after entering your name and password) for financial transactions.<\/li>\n<\/ul>\n<p>With all of these precautions, you\u2019ll be unlikely to go on an unwanted and dangerous phishing trip.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Dave\u2019s note: Our guest author this week is Kevin McDonald, Executive Vice President and Chief Information Security Officer at Alvaka Networks, a network services and security firm in Irvine, California. He is a trusted technology and security consultant and public &hellip; <a href=\"https:\/\/berkonomics.com\/?p=2624\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[20],"tags":[],"class_list":["post-2624","post","type-post","status-publish","format-standard","hentry","category-protecting-the-business"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/berkonomics.com\/index.php?rest_route=\/wp\/v2\/posts\/2624","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/berkonomics.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/berkonomics.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/berkonomics.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/berkonomics.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2624"}],"version-history":[{"count":0,"href":"https:\/\/berkonomics.com\/index.php?rest_route=\/wp\/v2\/posts\/2624\/revisions"}],"wp:attachment":[{"href":"https:\/\/berkonomics.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2624"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/berkonomics.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2624"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/berkonomics.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2624"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}