WHAT IS WHALING ATTACK?

Much like the freshwater or saltwater fisherman, cybercriminals target prey of all types and sizes in their phishing attempts. If each of us can be a victim of a phishing attempt, some cybercriminals target people who are more likely to make big money. Cybercriminals call these targets “whales,” meaning important people, such as presidents or company executives who are prime targets because of their position (agree with you: technically, we don't hook whales, but let's pretend…)

What is whaling attack?
Whaling-type attacks affect a large number of Canadian companies each year. Here's what you need to know to protect yourself and the people around you.

Phishing by email, text message or whaling

For various reasons, the world of cybersecurity is riddled with words that are metaphors for the world of fish and it's not always easy to navigate. So here's what it is:

Phishing is a type of cyber-attack by e-mail, text message or any other direct messaging service which attempts to imitate a legitimate source and which aims to induce the recipient to disclose personal information. When successful, these attacks can cause you to lose control over not only your account, but also your money and your identity.

Spear phishing is a type of phishing that uses information that appears to come from someone you know, such as a co-worker.

Whaling is a type of phishing that targets important people such as senior business executives or senior government officials. Since these people are likely to have confidential information, the stakes are much higher than in the case of a simple phishing attack.

Defend against whaling-type attacks

We protect ourselves from a whaling-type attack in the same way as any other type of attack by using antivirus software and following precautions. But because the stakes are so much higher, cybercriminals put a lot of effort into crafting messages that will successfully deceive their target. Therefore, it will be more difficult to detect that these messages are false.

So, before responding to a message, take the time to check for phishing clues:

Does the email address match the address of the person or entity the sender claims to represent? Does the address or domain name contain additional letters or numbers that should not be there?

Is the formatting of the message correct? Are there any spelling or grammatical errors that a legitimate sender wouldn't make? This kind of mistake can say a lot about the legitimacy of a message.

Does the message contain threatening language or ask you to respond immediately? Such urgent requests can be an indication of a phishing attempt.

It is relatively easy to gather information on the internet about the lives of people who have achieved real notoriety. Don't be fooled by some messages where the sender wishes you happy birthday, asks you how your vacation was or how your wife is doing. These messages do not always mean that the sender is trustworthy.

If you are not absolutely sure of the legitimacy of a message, try to reach the sender by means other than email, for example, by calling. It might seem tedious, but it could save you time and money.

Trust your team

When it comes to cybersecurity, a business is never better protected than its most vulnerable employee. You must therefore ensure that all employees, at all hierarchical levels of the company, are able to recognize a phishing attack. This is an essential condition to ensure the confidentiality of what must be… confidential.

As for the staff who work under the direction of senior management, they must be trained to recognize phishing attempts and whaling-type attacks. These people are the first line of defense against cyber-attacks.

Conclusion

Phishing attacks don't just consist of messages claiming that a foreign prince has made you his heir, or that you have won first prize in a contest or lottery. Whaling-type attacks are much more subtle and difficult to identify. This makes them all the more dangerous and this is the reason why you and your employees must remain vigilant.

Phishing attacks can deceive anyone, even the most tech-savvy. So make sure you know how cybercriminals work and how to recognize the signs of a phishing attempt so that you can protect yourself and your reputation and your organization.

Comments

Popular posts from this blog

What Is the WeAreDevs Virus?

WHAT IS BOTNET ATTACK?

Original or Pirated Virus Protection Which Is Better