{"id":16312,"date":"2019-02-21T08:00:28","date_gmt":"2019-02-21T13:00:28","guid":{"rendered":"http:\/\/www.thundercloud.net\/infoave\/new\/?p=16312"},"modified":"2019-02-21T08:00:28","modified_gmt":"2019-02-21T13:00:28","slug":"phishing-vs-spear-phishing-vs-whaling-attacks","status":"publish","type":"post","link":"https:\/\/www.thundercloud.net\/infoave\/new\/phishing-vs-spear-phishing-vs-whaling-attacks\/","title":{"rendered":"Phishing vs Spear Phishing vs Whaling Attacks"},"content":{"rendered":"<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 12pt;\"><em>The following article was written by Jareth and appeared in the <span style=\"text-decoration: underline;\"><a href=\"https:\/\/goo.gl\/6iBWtn\" target=\"_blank\" rel=\"noopener\">Emsisoft Blog<\/a><\/span>\u00a0on19 February 2019. We found it informative, interesting and fascinating. .With permission, we are posting it here and in our daily newsletter in order to share it with all our readers.<\/em><\/span><\/p>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 12pt;\"><em>Our thanks to Emsisoft and the Emsisoft team; a special thanks to Jareth for a job well done.<\/em><\/span><\/p>\n<blockquote>\n<h1><span style=\"font-family: helvetica, arial, sans-serif; font-size: 24pt;\">Phishing vs Spear Phishing vs Whaling Attacks<\/span><\/h1>\n<p><span style=\"font-family: helvetica, arial, sans-serif;\">Gone are the days when phishing emails were typo-laden messages demanding you to click on a link and enter your credit card details into some eyesore of a website. Today\u2019s phishing attacks are advanced, sophisticated and scarily believable, which perhaps explains why 22 percent of employees clicked on a phishing email in 2018, according to\u00a0<a href=\"https:\/\/www.researchgate.net\/publication\/324455350_2018_Verizon_Data_Breach_Investigations_Report\" target=\"_blank\" rel=\"noopener\">figures from Verizon<\/a>.<\/span><\/p>\n<p><span style=\"font-family: helvetica, arial, sans-serif;\">How are phishing attacks getting more sophisticated? Well, rather than casting out a wide net in the hopes of snagging a couple of fish, cybercriminals are becoming increasingly selective with their attacks. By focusing their efforts on a single high-value target, cybercriminals are able to create personalized attacks that are painstakingly tailored to the individual, thereby maximizing their chances of landing a whopper.<\/span><\/p>\n<p><span style=\"font-family: helvetica, arial, sans-serif;\">Read on to learn more about the different types of phishing attacks and how you can protect yourself as a small business owner.<\/span><\/p>\n<h2><span style=\"font-family: helvetica, arial, sans-serif;\">How phishing works<\/span><\/h2>\n<p><span style=\"font-family: helvetica, arial, sans-serif;\">Phishing is the general term for a type of social engineering attack in which attackers pretend to be a legitimate entity in order to extract sensitive information from a target. Much like a fisherman casting an enormous net into the sea in the hopes of catching something, most\u00a0<a href=\"https:\/\/blog.emsisoft.com\/en\/26866\/phishing-scams\/\" target=\"_blank\" rel=\"noopener\">common phishing attacks<\/a>have an incredibly wide attack scope, and will often be distributed to thousands or millions of people.<\/span><\/p>\n<p><span style=\"font-family: helvetica, arial, sans-serif;\">In this sense, a phishing attack is very much a numbers game. An attacker understands there\u2019s a low chance of a target taking the bait, but because the scope of the attack is so large there\u2019s a good chance that at least some people will respond. Phishing attacks are most commonly delivered over email, but they can also be sent via social media, phone calls and SMS.<\/span><\/p>\n<h3><span style=\"font-family: helvetica, arial, sans-serif;\">Examples of phishing attacks<\/span><\/h3>\n<h4><span style=\"font-family: helvetica, arial, sans-serif;\">1. Tech support scam<\/span><\/h4>\n<p><span style=\"font-family: helvetica, arial, sans-serif;\">The\u00a0<a href=\"https:\/\/blog.emsisoft.com\/en\/24269\/microsoft-calling-mind-the-tech-support-scammer\/\" target=\"_blank\" rel=\"noopener\">tech support scam<\/a>\u00a0is perhaps the most classic example of a phishing attack. It usually involves an email or browser popup warning you of some problem with your computer (e.g. malware infection, a data breach at a popular online service, or a claim that you have used your system for illegal activity) and a link to a website where you can resolve the issue. The website may look like the real deal, but when you enter your personal information it sends your data directly into the hands of the criminals. As many as 6 percent of consumers lost money to a tech support scam in 2018, according to\u00a0<a href=\"https:\/\/news.microsoft.com\/uploads\/prod\/sites\/358\/2018\/10\/Global-Results-Tech-Support-Scam-Research-2018.pdf\" target=\"_blank\" rel=\"noopener\">Microsoft\u2019s Global Tech Support Scam Research<\/a>.<\/span><\/p>\n<h4><span style=\"font-family: helvetica, arial, sans-serif;\">2. Fake invoices<\/span><\/h4>\n<p><span style=\"font-family: helvetica, arial, sans-serif;\">Fake invoice phishing attacks have been around for years, and unfortunately they\u2019re probably not going away any time soon. In this type of attack, criminals typically pose as a well-known tech company and send out phony invoices that show you\u2019ve recently made a purchase from them. The email includes a link to a website where you can dispute the charges or stop automatic billing. Inputting your details on the website sends your information to the criminals, who can use the data to commit fraud or identity theft.<\/span><\/p>\n<h4><span style=\"font-family: helvetica, arial, sans-serif;\">3. Facebook messages<\/span><\/h4>\n<p><span style=\"font-family: helvetica, arial, sans-serif;\">Social media is a powerful attack vector for phishing because the attack is usually delivered via the account of someone you know and trust, which makes it more convincing and increases the chances of you clicking on a dodgy link. The contents of the message can vary, but often it claims that you have won something, been tagged in a risqu\u00e9 photo or have a new job opportunity. Clicking the accompanying link will take you to a fraudulent website that might steal your personal information or install malware on your computer.<\/span><\/p>\n<h2><span style=\"font-family: helvetica, arial, sans-serif;\">What is spear phishing?<\/span><\/h2>\n<p><span style=\"font-family: helvetica, arial, sans-serif;\">Spear phishing is much more selective and sophisticated than regular phishing attacks. Spear phishing usually involves targeting members of a specific organization to gain access to critical information such as financial data, staff credentials, intellectual property and customers\u2019 personally identifiable information. These types of attacks are typically far more lucrative than a normal phishing attack, so criminals may spend a long time researching their target and planning the attack. Spear phishing is usually performed by government-sponsored attackers rather than random cybercriminals looking to make a quick buck.<\/span><\/p>\n<h2><span style=\"font-family: helvetica, arial, sans-serif;\">What is a whaling attack?<\/span><\/h2>\n<p><span style=\"font-family: helvetica, arial, sans-serif;\">A whaling attack is a type of spear phishing that focuses on a high-ranking target within an organization rather than lower level employees. Many whaling attacks target CEOs, CFOs and other executives who have a high level of access to sensitive company information. Some whaling attacks involve impersonating members of the C-suite and leveraging their authority to convince employees in other departments to release sensitive information.<\/span><\/p>\n<p><span style=\"font-family: helvetica, arial, sans-serif;\">Whaling attacks are as sophisticated as they are personalized. The emails and websites used in these types of attacks are professionally designed, flawlessly worded and appear, for all intents and purposes, to be completely legitimate. To further add to the illusion, attackers might use spoofed email addresses and the logos and contact information of real companies or government agencies.<\/span><\/p>\n<p><span style=\"font-family: helvetica, arial, sans-serif;\">To personalize the attack, criminals will also go to great lengths to collect as much information on the target as possible, often drawing data from LinkedIn, Facebook and Twitter. This allows them to refer to the target\u2019s name, job title and other personal information, which makes the attack seem even more authentic.<\/span><\/p>\n<h3><span style=\"font-family: helvetica, arial, sans-serif;\">Examples of whaling attacks<\/span><\/h3>\n<h4><span style=\"font-family: helvetica, arial, sans-serif;\">1. Seagate releases copies of 10,000 employees\u2019 W-2 tax forms<\/span><\/h4>\n<p><span style=\"font-family: helvetica, arial, sans-serif;\">In 2016, the HR department of data storage technology giant Seagate received an\u00a0<a href=\"https:\/\/krebsonsecurity.com\/2016\/03\/seagate-phish-exposes-all-employee-w-2s\/?utm_source=emsisoft\" target=\"_blank\" rel=\"noopener\">email that was apparently from the company\u2019s CEO Stephen Luczo<\/a>. The email asked for copies of employees\u2019 2015 W-2 tax forms and other personally identifiable information, including names, social security numbers, income and home addresses. HR fulfilled the request, which resulted in the personal details of almost 10,000 current and past employees being sent straight to the cybercriminals.<\/span><\/p>\n<h4><span style=\"font-family: helvetica, arial, sans-serif;\">2. Snapchat hands over payroll information<\/span><\/h4>\n<p><span style=\"font-family: helvetica, arial, sans-serif;\">Snapchat is\u00a0<a href=\"https:\/\/www.bbc.com\/news\/technology-25572661\" target=\"_blank\" rel=\"noopener\">no stranger to cyberattacks<\/a>, but in 2016 the social media platform yet again found itself at the center of a data breach when an employee was tricked into releasing payroll information about some of its employees. In the attack, a member of the payroll team received an\u00a0<a href=\"https:\/\/www.theguardian.com\/technology\/2016\/feb\/29\/snapchat-leaks-employee-data-ceo-scam-email\" target=\"_blank\" rel=\"noopener\">email from someone claiming to be Snapchat CEO Evan Spiegel<\/a>, who made a request for employee payroll information. The data was duly handed over to the attacker and the information was leaked shortly after.<\/span><\/p>\n<h4><span style=\"font-family: helvetica, arial, sans-serif;\">3. FACC CEO loses job after company wires $56 million to fraudsters<\/span><\/h4>\n<p><span style=\"font-family: helvetica, arial, sans-serif;\">FACC is an Austrian plane manufacturing company whose customers including Boeing and Airbus. In 2016, it emerged that the company had been the victim of a\u00a0<a href=\"https:\/\/www.reuters.com\/article\/us-facc-ceo-idUSKCN0YG0ZF\" target=\"_blank\" rel=\"noopener\">successful whaling attack<\/a>, which led to the finance department wiring $56 million to the fraudsters. While the full details of the attack were never publicly released, FACC CEO Walter Stephan was fired as he had \u201cseverely violated his duties\u201d, and the CFO of the company also lost their job soon after the attack.<\/span><\/p>\n<h2><span style=\"font-family: helvetica, arial, sans-serif;\">Phishing, spear phishing and whaling: What\u2019s the difference?<\/span><\/h2>\n<p><span style=\"font-family: helvetica, arial, sans-serif;\">Phishing, spear phishing and whaling attacks share many similarities \u2013 primarily, all three involve using impersonation to elicit information or money from a target. However, they also have some subtle differences to be aware of.<\/span><\/p>\n<p><span style=\"font-family: helvetica, arial, sans-serif;\">A typical phishing attack takes a \u201cquantity over quality\u201d approach to scamming. The attacks are often simple, relatively easy to identify and distributed to thousands or millions of people.<\/span><\/p>\n<p><span style=\"font-family: helvetica, arial, sans-serif;\">Spear phishing is more selective. These attacks target a specific organization or employee in order to gain sensitive data. The assets used in spear phishing are more sophisticated and can be difficult to spot. While spear phishing attacks take much longer to plan and execute, the payoff can be much more lucrative than wide-scale phishing attacks.<\/span><\/p>\n<p><span style=\"font-family: helvetica, arial, sans-serif;\">Whaling is a type of spear phishing. It targets high-ranking, high-value target(s) in a specific organization who have a high level of authority and access to critical company data. Whaling attacks may take weeks or months to prepare, and as a result the emails used in the attacks can be very convincing.<\/span><\/p>\n<h2><span style=\"font-family: helvetica, arial, sans-serif;\">How SMBs can defend against spear phishing and whaling attacks<\/span><\/h2>\n<h4><span style=\"font-family: helvetica, arial, sans-serif;\">1. Educate staff about phishing and whaling attacks<\/span><\/h4>\n<p><span style=\"font-family: helvetica, arial, sans-serif;\">Employees across every level of your organization, particularly senior management, and HR and payroll staff, should receive training on how to identify the signs of a phishing or whaling attack. This might include learning how to spot spoofed sender names and email addresses, being wary of unsolicited attachments, keeping software up to date and double checking URLs before clicking any links. For more information, be sure to check out our previous blog post on\u00a0<a href=\"https:\/\/blog.emsisoft.com\/en\/32351\/how-to-prevent-phishing-attacks\/\" target=\"_blank\" rel=\"noopener\">how to prevent phishing attacks<\/a>.<\/span><\/p>\n<h4><span style=\"font-family: helvetica, arial, sans-serif;\">2. Encourage managers to consider what they share on social media<\/span><\/h4>\n<p><span style=\"font-family: helvetica, arial, sans-serif;\">As noted above, cybercriminals regularly trawl social media platforms to find information on their targets which they can then use to add an extra layer of legitimacy to their phishing and whaling attacks. Data such as place of employment, address and date of birth can all be used to add weight to an attack. While you probably can\u2019t (and shouldn\u2019t) prohibit employees from using social media altogether, do encourage staff (and managers and executives in particular) to avoid oversharing on social media and tweak their privacy settings to keep their accounts as private as possible.<\/span><\/p>\n<h4><span style=\"font-family: helvetica, arial, sans-serif;\">3. Install an anti-phishing extension for your browser<\/span><\/h4>\n<p><span style=\"font-family: helvetica, arial, sans-serif;\">These days, all major web browsers come with reasonably effective phishing protection technology built right in, but to really keep your business safe you might want to consider installing a dedicated browser extension.\u00a0<a href=\"https:\/\/help.emsisoft.com\/en\/1974\/emsisoft-browser-security\/\" target=\"_blank\" rel=\"noopener\">Emsisoft Browser Security<\/a>, for example, blocks phishing attacks and prevents you from accessing websites that are known to distribute malware, and it does so in a way that doesn\u2019t compromise your privacy.<\/span><\/p>\n<h4><span style=\"font-family: helvetica, arial, sans-serif;\">4. Verify requests for money and sensitive information<\/span><\/h4>\n<p><span style=\"font-family: helvetica, arial, sans-serif;\">Phishing and whaling attacks rely on human error. Reduce the risk of a slip up by developing and enforcing processes to verify financial and sensitive data requests. For example, you could make it mandatory to verify requests through a secondary communications channel before performing the request. So, if someone in accounts were to get an email from the CFO instructing them to transfer a large sum of money to an unfamiliar account, the employee would have to double check the request by contacting the CFO via a phone call, chat, or in person, but NOT via email.<\/span><\/p>\n<h4><span style=\"font-family: helvetica, arial, sans-serif;\">5. Have systems in place in case someone takes the bait<\/span><\/h4>\n<p><span style=\"font-family: helvetica, arial, sans-serif;\">In the event that someone does fall for a phishing attack, you want to be sure that you have systems in place to limit the damage. Investing in reliable antivirus software such as\u00a0<a href=\"https:\/\/www.emsisoft.com\/en\/business\/businessecurity\/\" target=\"_blank\" rel=\"noopener\">Emsisoft Anti-Malware<\/a>\u00a0is critical for preventing malware that can be delivered in some phishing attacks, while a good backup strategy can help restore your machine to a safe state.<\/span><\/p>\n<h2><span style=\"font-family: helvetica, arial, sans-serif;\">Keeping your business safe from phishing<\/span><\/h2>\n<p><span style=\"font-family: helvetica, arial, sans-serif;\">Phishing and whaling attacks remain a constant threat for businesses of all sizes. While basic phishing attacks can usually be spotted from a mile away, spear phishing and whaling are much more difficult to identify. The good news is there are many things security-conscious businesses can do to contain the threat. By training staff on the dangers of phishing, establishing verification processes and having systems in place for a worst case scenario, you\u2019ll be better prepared to protect your company against all types of phishing attacks&#8230;<\/span><\/p><\/blockquote>\n<p><a href=\"https:\/\/goo.gl\/6iBWtn\" target=\"_blank\" rel=\"noopener\"><em>Written by Jareth, Emsisoft Blog, 19 February 2019<\/em><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The following article was written by Jareth and appeared in the Emsisoft Blog\u00a0on19 February 2019. We found it informative, interesting and fascinating. .With permission, we are posting it here and in our daily newsletter in order to share it with all our readers. Our thanks to Emsisoft and the Emsisoft team; a special thanks to Jareth for a\u2026 <span class=\"read-more\"><a href=\"https:\/\/www.thundercloud.net\/infoave\/new\/phishing-vs-spear-phishing-vs-whaling-attacks\/\">Read More &raquo;<\/a><\/span><\/p>\n","protected":false},"author":1,"featured_media":14573,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2897,1462,1821,1678,1,1426,1670,1680,1656,1674],"tags":[2954,331,589,14,2666,2953],"_links":{"self":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/16312"}],"collection":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/comments?post=16312"}],"version-history":[{"count":2,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/16312\/revisions"}],"predecessor-version":[{"id":16314,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/16312\/revisions\/16314"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/media\/14573"}],"wp:attachment":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/media?parent=16312"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/categories?post=16312"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/tags?post=16312"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}