Phishing Is a Lot Like Fishing!


The Bait

The attacker will cast a bait, a request that seems trustworthy.

The Bite

The victim responds to that request, disclosing important information.

The Yield

The attacker will abuse the information acquired in several ways.
phishing threat 100691616 large

> What Is Phishing

Phishing in the digital world is similar to fishing in the general public’s understanding, and it is very simple: The Phisher casts a bait, and waits to see who will bite. And just like fishing can cost a fish its life, Phishing can very well cost you your lifelong earnings or reputation or sometimes even both.

Spear Phishing is basically the same as phishing, except the target is different. While phishing is something targeted at an entire population, much like casting a net and waiting to see what fish is going to get tangled, spear Phishing is targeting one specific individual.

If a specific person in accounting receives an email that appears to be from his supervisor, that mentions them by name, that is probably spear Phishing.

“Whaling” is another term you may come across, and it is about the same crime, but targeting the highest ranking officials and CEOs.

> How Is It Conducted

Just like any other crime, there are countless ways to conduct Phishing. But the most common ways are conducted by email. One that essentially tries to make you trust it, and instructs you to take an action that the attacker is waiting for. You might, for example, receive an email that says “This is your bank, your account has been locked for the suspicion of fraudulent activity; please log in to confirm your identity and approve or revoke the transactions that were made in your name”.

At first sight, one could just click the link provided and land on a page identical in design to that of the bank; one that asks for a username and a password. If you submit your credentials to that page they will be sent not to the bank, but to the person who set up that scam and they will then have complete access to your bank account as if they were you.

> What Could Happen

The Phishers could shop Amazon with your money, naturally, but they can also do more sinister things. They may request a new bank card with your name on it, but have it delivered to a mailbox they have access to, and use it at the time and place of a crime, placing you on scene and leaving you with the burden of proving your innocence and dealing with all the legal, financial and psychological strain that comes with such an experience.

The attacker, and depending on their purpose behind the attack, may just impersonate you to conduct a crime or sell your information on the dark web to whomever may want to pay for it. A victim can lose much more than money if they fall to a scheme of this kind.

Empowering Cybersecurity: The SentinelOne Advantage through MSPs

In today's digital landscape, where cyber threats loom large, safeguarding your computer and...

Enhancing Professionalism and Brand Consistency with Exclaimer Cloud Signatures

In the fast-paced digital landscape of modern business, first impressions are often made through...

Strengthen Your Defenses: Why Your Business Needs KnowBe4 Cybersecurity Training

Title: Strengthen Your Defenses: Why Your Business Needs KnowBe4 Cybersecurity Training In the...

Securing Your Online Accounts (2FA, Password Strength, Etc.)

With all the accounts we have online and all the malicious hackers trying to steal personal data, it’s important to protect yourself. Follow these tips to stay safe online!

Detecting Phishing Scams

Phishing scams have been around for decades and have only gotten more sophisticated. You don’t have to be another victim of phishing, learn how to identify and protect against it.

> Why So Dangerous

The high danger of such schemes is that the untrained eye could never tell the difference between a true warning email from the bank and a Phishing email. If you decide not to trust the emails you could miss something important and if you trust the email you may be jeopardizing too much.

> What To Do

In an effort to keep our community safe and immune to such fraudulent attempts our team at DIS Computers have put together a list of easy steps that anyone can take to make themselves more immune to Phishing and less prone to falling victims to it.

You can click this link to read our article on “The 7 Steps You Need to Take Today to Protect Yourself From Phishing”. We encourage you to read the article carefully and follow the instructions on it as well as share it with your spouses, children, friends and employees. No person is immune by default, yet no protective measures are beyond your reach.

Act now, protect yourself, and please feel free to reach out through our social media pages where we post and discuss all your questions and all our advice!

shutterstock 285775409
Our Partners
Get in touch

7 + 15 =