Phishing Is a Lot Like Fishing!

TLDR ↓

The Bait

The attacker will cast a bait, a request that seems trustworthy.

The Bite

The victim responds to that request, disclosing important information.

The Yield

The attacker will abuse the information acquired in several ways.

> What Is Phishing

Phishing in the digital world is similar to fishing in the general public’s understanding, and it is very simple: The Phisher casts a bait, and waits to see who will bite. And just like fishing can cost a fish its life, Phishing can very well cost you your lifelong earnings or reputation or sometimes even both.

Spear Phishing is basically the same as phishing, except the target is different. While phishing is something targeted at an entire population, much like casting a net and waiting to see what fish is going to get tangled, spear Phishing is targeting one specific individual.

If a specific person in accounting receives an email that appears to be from his supervisor, that mentions them by name, that is probably spear Phishing.

“Whaling” is another term you may come across, and it is about the same crime, but targeting the highest ranking officials and CEOs.

> How Is It Conducted

Just like any other crime, there are countless ways to conduct Phishing. But the most common ways are conducted by email. One that essentially tries to make you trust it, and instructs you to take an action that the attacker is waiting for. You might, for example, receive an email that says “This is your bank, your account has been locked for the suspicion of fraudulent activity; please log in to confirm your identity and approve or revoke the transactions that were made in your name”.

At first sight, one could just click the link provided and land on a page identical in design to that of the bank; one that asks for a username and a password. If you submit your credentials to that page they will be sent not to the bank, but to the person who set up that scam and they will then have complete access to your bank account as if they were you.

> What Could Happen

The Phishers could shop Amazon with your money, naturally, but they can also do more sinister things. They may request a new bank card with your name on it, but have it delivered to a mailbox they have access to, and use it at the time and place of a crime, placing you on scene and leaving you with the burden of proving your innocence and dealing with all the legal, financial and psychological strain that comes with such an experience.

The attacker, and depending on their purpose behind the attack, may just impersonate you to conduct a crime or sell your information on the dark web to whomever may want to pay for it. A victim can lose much more than money if they fall to a scheme of this kind.

Spoofing Microsoft

Spoofing Microsoft! “There Has Been an Unusual Sign-in Activity on Your Microsoft Account” Has...

URL Breakdown

So What is a URL?Websites do not actually have "names". They are referred to by numbers;...

WiFi – Free Doesn’t Mean Safe

WiFi – Free Doesn’t Mean Safe Do you rely on Wi-Fi while at a restaurant or hotel?While on...

Auto-fill: Can Lead to Financial Loss

Auto-Fill Can Lead To Financial Loss And Exposure Of Personal Information Is your personal...

Blue Keep

Update Your Windows Operating System, ASAP!The CISA which is the Department of Homeland Security’s...

A Warning Call

Those are fraudulent phone calls, are aiming at stealing your personal information, hoping to either use it in their malicious / criminal activity or sell it on the dark web for other cyber criminals to do so.

> Why So Dangerous

The high danger of such schemes is that the untrained eye could never tell the difference between a true warning email from the bank and a Phishing email. If you decide not to trust the emails you could miss something important and if you trust the email you may be jeopardizing too much.

> What To Do

In an effort to keep our community safe and immune to such fraudulent attempts our team at DIS Computers have put together a list of easy steps that anyone can take to make themselves more immune to Phishing and less prone to falling victims to it.

You can click this link to read our article on “The 7 Steps You Need to Take Today to Protect Yourself From Phishing”. We encourage you to read the article carefully and follow the instructions on it as well as share it with your spouses, children, friends and employees. No person is immune by default, yet no protective measures are beyond your reach.

Act now, protect yourself, and please feel free to reach out through our social media pages where we post and discuss all your questions and all our advice!

The DIS Difference

Clear Communication

We won't do geek speak - you'll understand exactly what we are doing with progress reports in between!

Problem Solving

Our goal is to solve your technical issues as quickly as possible. Our employees are compensated to fix issues faster!

Technology Consulting

If it involves technology, we can advise you. From managing your technology vendors to consulting on your ERP/CRM.

Find out how we can help...