Learn How to Catch a Phish

What may seem like a harmless email link could turn into a virus with one wrong click. The email phish is a master of disguise. Follow these tips to understand what a phish is and how to catch it. 

The stonefish is named for its ability to camouflage itself among ocean floor debris. It is highly venomous, and its sting can be fatal to any human unfortunate enough to step on one. Recognizing and avoiding the stonefish is a swimmer’s best defense, but that is easier said than done.

Like the stonefish, the email phish (or simply “phish”) is a master of disguise, lurking in inboxes and waiting for users to step on them. Its venom is kept in links and attachments, and one click delivers a sting of malware to the user’s computer system. Recognizing and avoiding the email phish is a user’s best defense, but that, too, is easier said than done.

Fish/phish analogy aside, Trevor Buxton, a fraud awareness and communications manager and Certified Fraud Examiner with PNC Bank offers safety tips for individuals and small businesses to help recognize and avoid phishing attacks.

Know the Red Flags

Phishing attacks are designed to resemble legitimate email correspondence and rely on a user’s inability to spot them in order to succeed. Email containing certain red flags should alert users to a possible phishing attack:

  • Misspellings
  • Grammatical errors
  • Offering fantastic prizes
  • Creating a sense of urgency
  • Requesting personally identifiable information (PII)
  • Threatening with consequences
  • Making demands

Email address spoofing is also a common tactic of phish. The user may not notice an email address has been changed from “@homelender.com” to “@home1ender.com” and may recklessly click links and open attachments, which introduce malware.

worldwide email phishing graphic

View Text Version

Small Businesses & Phish

Small businesses have the added threat of phishing attacks designed to mimic vendors, couriers, suppliers, clients, colleagues, etc. Employees should ensure that email coming from these third parties is legitimate.

Such business relationships also can serve as backdoor attack routes for phish to infiltrate the objective business itself.  Example: The Target data breach of 2013 started with a phishing attack against one of its third-party refrigeration contractors.

Understanding third-party cybersecurity policies and procedures will help small businesses decide which ones are taking it seriously.

Business Email Compromise (“BEC”) is another threat affecting businesses of all sizes. Thieves use BEC to dupe employees into transferring money, releasing HR and payroll data, or exposing trade secrets and intellectual property. 

BEC can be carried out by spoofing an employee’s email address, or by gaining control of an employee’s legitimate email account. BEC attacks often appear to come from C-level managers or other positions of authority within the business, adding a level of prestige to the unauthorized request.

Phight Back

Fortunately, there are things which can help individuals and small businesses detect and avoid a phish:

  • Hover the cursor over the sender’s email address, which should bring up a “mouseover” box containing the sender’s actual email address. Inspect it for signs of spoofing.
  • Use email’s “forward” feature rather than “reply.”  “Forward” forces the user to type in a known and trusted email address, whereas “reply” will respond directly to the phisher.
  • Do not click links in a suspected phish. It is best practice to type in a known URL address directly into a browser’s search bar.
  • Do not open attachments in a suspected phish whatsoever.
  • Do not call phone numbers contained in a suspected phish. Go directly to a known source of information for contact information, such as the company’s legitimate website.
  • Regarding BEC, call the requestor to confirm any unusual demands for money transfers, HR or employee payroll data, or trade secrets or intellectual property.
  • If practical, refrain from posting personnel organizational structures in the public domain. Phishers can use this information to make their BEC scams more effective.
  • Keep employee leave and absence information off of social media accounts. Phishers can use this knowledge to craft “emergency situation” BEC scams.

Upon spotting a phish, delete it.  Do not click any links or open any attachments.  Do not forward it to friends and colleagues. 

If compelled to forward a phish, forward it to the FBI’s Internet Crime Complaint Center (IC3).

 

For more helpful tips on cybersecurity, visit the Federal Trade Commission website

Worldwide Email Phishing

Phishing poses as a legitimate email, but unleashes malware that wreaks havoc. Learn warning signs for safe handling of phishing emails. 

  • more than 1.2 million phishing attacks in 2016, a 65 percent increase over 2015
  • 81 percent of attacks worldwide in 2016 were against U.S. companies

Don't be lured into phish. Know the warning signs:

  • making demands
  • offers of fantastic prizes
  • creating a sense of urgency
  • requesting personally identifiable information
  • threatening with consequences
  • misspellings

How to fight a suspected phishing expedition:

  • do not open attachments
  • do not click links
  • do not call phone numbers
  • do not reply - use forward instead
Trevor Buxton
Trevor Buxton says small businesses should review third-party cybersecurity policies and procedures to help protect against phishing attacks

According to a Q4 2016 report from the Anti-Phishing Working Group, there has been a 5,753 percent increase in phishing attacks over the last 12 years.