Phishing, Vishing, Smishing, & Whaling

Logethica

Level 13
Thread author
Verified
Top Poster
Well-known
Jun 24, 2016
636
Phishing, Vishing, Smishing, & Whaling:

  • Phishing-
Perpetrators of online fraud using the phishing technique try to get hold of your personal data and or your credit/debit card by sending e-mails.
The message appears to be from your bank or the company issuing your credit card. You have to click a link to a Web site that looks extremely similar to your bank's own Web site. On this site, you read that you must enter, complete or check your personal data concerning your accounts, credit cards and codes. This will be for "security reasons", "file checks", "data loss", etc. Sometimes you will also be requested to mail your data directly to a specific person.

  • Vishing-
Similar to a phishing scam, the fraudster will masquerade as a well-known and trusted business in an attempt to gain information. However, rather than this being carried out via e-mail, the scammer will telephone their victim.
  • Smishing-
Similar to phishing scams. You get an SMS message from a bank or service provider asking you to do something. However, the smishing is really a message from a scammer. while most people are familiar with e-mail phishing scams, they're less sceptical when receiving smishing messages and victims get trapped easily.
[SOURCE for the above descriptions: itweb.co.za]
  • Whaling-
Whaling attacks are a form of personalized phishing, or spear phishing, aimed at senior executives or others in an organization who have access to lots of valuable or competitive information.
[SOURCE: infoworld.com]

According to a latest twitter poll run by Lincolnshire Trading Standards, 91 per cent of people don’t know the difference between phishing, smishing or vishing.

The poll also showed that 46 per cent of people had been targeted by scammers, either via email, post, mail, text or phone.

[SOURCE: gainsboroughstandard.co.uk (ARTICLE DATE: 9th Aug 2016)]

PhishMe grows into cyber security powerhouse:

[SOURCE: loudountimes.com (ARTICLE DATE: 25th Aug 2016)]

Leesburg-based cyber security company PhishMe is making waves against fraudulent emails with a new, innovative approach.

“Ultimately the problem is a human problem. Trying to discern what is legitimate in an email is hard,” said co-Founder and CTO Aaron Higbee. “We develop software that companies use to simulate spearfishing attacks on their employees and the idea is that it's not just a one off test, but a conditioning over time.”

The goal is to help people discern what a phishing email looks like and then learn how to report it. In just the five years since PhishMe was launched in 2011, the company now boasts that half the Fortune 100 companies use their software and they have 1,000 enterprise clients. While based in Leesburg, PhishMe has employees and offices all over the world including Dubai, London and Singapore.

“It took a lot of time in the beginning because some of the early conversations we had with customers would say you're going to trick our employees? That's going to make them feel bad. What we helped them understand is the messaging after the fact is about how this is a simulated phish and if it was real these are the consequences that could have happened.”..

[To read the full article please visit loudountimes.com]
Woman targeted by “vishing” scam in Leven:
[SOURCE: thecourier.co.uk (ARTICLE DATE: 29th Aug 2016)]

Levenmouth police have issued a warning after a 68-year-old woman lost £400 through a “vishing” scam.

The woman fell victim to the fraud on Saturday after receiving a phone call from a man claiming to be from a computing company.
He told her the security of her computer and tablet device had been compromised and that payment was needed to stop it.
She provided the caller with her card details but later discovered more than £400 had been taken from her account.

Sergeant Craig Fyall of Levenmouth police station said: “Perpetrators of “vishing” scams claim to be from legitimate organisations to obtain personal or bank details.
“They can be very convincing and try to take advantage of people’s fears and vulnerabilities."..

[To read the full article please visit thecourier.co.uk]

Scammers shift to scams through text messages:
[SOURCE: kdvr.com (ARTICLE DATE: 15th Aug 2016)]

Using a laptop computer for sale on Craigslist on Monday morning, potential buyers were asked to text. By the afternoon, 12 people had responded to the ad and all of them had similar stories.
Each buyer wanted to pay immediately through PayPal. Each buyer also wanted the computer shipped out of the country.

Ray Hutchins of Denver Cyber Security looked at the text conversation with one of the potential buyers and recognized several red flags.

The buyer offered to pay more money than the item was listed for, he got very pushy and wanted to close the transaction immediately, he wrote in very broken English, and he asked for the item to be shipped to Nigeria.

One text message read: “how much is total money am send to you now and pls can is the picture of the item now.”

“He’s not speaking usual, normal English. Grammar is wrong. Spelling is wrong,” Hutchins said.
One email listed the amount supposedly transferred into the PayPal account as “$650.OO”, using the letter “O” in place of two of the zeros...

[To read the full article please visit kdvr.com]

Whaling emerges as major cybersecurity threat:
[SOURCE: cio.com (ARTICLE DATE: 21st Apr 2016)]

A clever variant of phishing scams is proliferating among enterprises, forcing CIOs to up their game even as they are still refining their cybersecurity practices to contend with various zero-day attacks. Called whaling, the social engineering grift typically involves a hacker masquerading as a senior executive asking an employee to transfer money.

Unlike typical phishing or spearphishing scams, in which an attacker typically includes a malicious URL or attachment, whaling is a pure social engineering hack targeting relationships between employees, says Steve Malone, director of security product management at Mimecast. Whaling fraudsters either gain access to an executive's email inbox, or email employees from a fake domain name that appears similar to the legitimate domain name. They ask the intended recipient to take some action, such as moving money from a corporate account to an account the fraudster has set up, Malone says.

Often, the language and phrasing of the email request are designed to sound similar to those that might come from CEOs, CFOs and finance staff. The note may begin with a simple greeting, such as "Hello, how are you," and inquire if the recipient is in the office, a seemingly natural query. Then they'll ask the potential victim to trigger a money transfer, issue a bank payment, or email a W2 or some other sensitive document. "There's no way to spy that as bad," Malone says. "The content is human-written so a spam filter won't pick it up and it's hard to detect because there are no links or attachments."..

[To read the full article please visit cio.com]
 

Cats-4_Owners-2

Level 39
Verified
Honorary Member
Top Poster
Well-known
Dec 4, 2013
2,800
What a catchy title! I read the entire post aloud to my wife without putting her sleep. Now, that's a good sign!;) Thank you, @Logethica, for making learning interesting!
Thanks for the share !

Omg I Learned new words , I will soon exceed 20 (that's a lot for a penguin) :)
Hahaha-hahahaha!!:p:D
Crime fighting penguins whom are also literate possess the power to keep us all in stitches!!!:D:D:D
 

Logethica

Level 13
Thread author
Verified
Top Poster
Well-known
Jun 24, 2016
636
Thanks for the share !

Omg I Learned new words , I will soon exceed 20 (that's a lot for a penguin) :)
Thank you. :DBut you are a multilingual penguin @DardiM :)

Thanks for sharing! Judging by the names, I thought it was a poem someone made. :D
Thank you. Haha.:D.perhaps it should be a poem @SecretKeeper ....

Phishing, Vishing, Smishing, and Whaling
Fraudulent contact through text,phone,or e-mailing
Don't surrender ones data when faced with deception
Ones personal details deserve good protection
Rather than leave ones security ailing
Share knowledge to see many more scam attempts failing :rolleyes:

What a catchy title! I read the entire post aloud to my wife without putting her sleep. Now, that's a good sign!;) Thank you, @Logethica, for making learning interesting!
Haha:D Thank you @Cats-4_Owners-2 .. I was tempted to take a nap halfway through constructing this thread ..:D
7 tabs open simultaneously without a preconceived plan as to how I wanted to amalgamate their contents:oops:
 

DardiM

Level 26
Verified
Honorary Member
Top Poster
Malware Hunter
Well-known
May 14, 2016
1,597
In two words: social engineering!
The best protection? Still two words: common sense!.
"common sense" => what a lot of person doesn't have :'(

A new profession (I often have good ideas :p ) => "Personal Protection of person without common sense", => be their human security tool :rolleyes:
(I will choose a beautiful female penguin:oops:)
 
Last edited:

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top