This should be fun. Take a look at this message I got recently. Try to find 3 things that are wrong with it. Ready? Go:
How many did you find? I’ll give you the answer at the end of this post.
Let’s talk a little bit about phishing. Why?
Because phishing can happen to anyone
Typically, if your job role is exposed to key stakeholders in the business (or if you’re one of them), you’ll be at a higher risk than most. But security is everyone’s business – so whatever your role, you should be prepared.
If you don’t feel like reading today, I recorded a video about it some time ago. (Un)surprisingly, it is still relevant today. You can watch it below:
Look for anything unusual
Phishing works by mimicking the environment you’re familiar with. As you log in to your systems regularly, you should be used to a certain procedure. The bad guys will try to replicate it, but these attempts may not be perfect.
Beware of strange messages
A phishing message will likely have some differences compared to your usual emails – a typo in the address, a different language to what the person usually uses, some unusual spelling, etc. Your inbox protection should also flag any issues.
How to stay safe?
Easy – don’t click any links in such a message and report it as spam. This way, you’re not just protecting yourself – by alerting the system and your IT team to a problem, you’re also protecting other users who may not notice any issues.
A few other tips that may help:
Check the login screen
Here too are a few signs you can look for:
How to stay safe?
There are two simple things you can do if you haven’t yet:
It’s possible that in a rush you don’t notice that something’s off, and the bad thing happens. Let’s talk about what to expect then.
Phishing – the aftermath
If you fall for a phishing attempt, your credentials are harvested and used to obtain a token to the service. Depending on how sophisticated the attack is, you might see an error page, or get redirected to the application you attempted to access.
Your login details will then be used to download the data from your mailbox, online storage, etc., and to gain additional information from across the organization (for example by sending e-mails in your name).
Other typical actions include:
The goal is to establish continuous access to the organization in case you reset your password or revoke the token the attacker obtained in your name.
If you notice any activities like that, change your password immediately and report it.
Your IT team should also be able to see some suspicious (atypical) activities while monitoring the tenant. Examples might include massive data downloads, logins from unusual locations, setting up forwarding rules on the e-mail inbox, etc.
How to stay safe?
The final point is that, of course, prevention is always better than the cure, so it’s best to stay alert and know how to avoid an incident in the first place.
As for the question about the email in the beginning:
It’s all wrong!
But keep in mind, it won’t always be so obvious. Ask for help and stay safe.
Read similar articles