Wednesday, March 3, 2021
CybersecFill
Advertisement
  • Home
  • Events
  • News
  • security tips
  • Article
  • Contact Us
No Result
View All Result
  • Home
  • Events
  • News
  • security tips
  • Article
  • Contact Us
No Result
View All Result
CybersecFill
No Result
View All Result
Home security tips

The most Dangerous Cyber Attack – Phishing Attack

Cybersecfill by Cybersecfill
January 25, 2019
in security tips
0
Url spoofing on UC browser
Share on FacebookShare on Twitter

What is Phishing?

Phishing is a technique of deceiving people into sharing sensitive information such as usernames, passwords, credit card details by disguising as a legitimate or trust worthy entity in an electronic communication.Victims receive emails or text messages that imitates a person or organization they trust. Unlike other cyber attacks or online threats, phishing does not require any technical expertise. Phishing is the simplest cyberattack and also the most dangerous and effective.

An attack can have devastating results. For individuals, this includes unauthorized purchases, the stealing of funds, or identify theft.

Types of Phishing

There are different ways in which phishing attacks can be carried out and this ways are known as types of phishing.This include:

Spear phishing

Spear phishing is targeted to a specific person or organization. This means it’s content will be tailored for the victim or victims. Before a spear phishing is carried out, there is a pre-attack reconnaissance(information gathering) to uncover specific information about the target. This information includes names, email address, job titles and a lot of other information. With this, the attacker crafts a believable email

Phone Phishing

Phone phishing also called Vishing is the use of voice calls to deceive a victim. This is a very common type of phishing in Nigeria. In Nigeria, the attacker claims to represent your bank and come up with some sort of bank related issue and insist you take care of the issue immediately. They go ahead to request for your account information and this aids their financial scam on your bank account.

SMS Phishing

This is also known as Smishing and it is the use of Short messaging Service (SMS) or text messages carry out the deceitful activity to get personal information from the victim. With the increase in the use of internet connected mobile phones, smishing now comes with malicious links. Clicking on this links directs you to a phishing site where you are asked to provide personal information or infected with malware.

419/Nigerian Scam

A phishing email from someone claiming to be a Nigerian prince is one of the internet’s earliest and longest scam

Nigerian Prince” scams are also known as “419 scams,” a reference to the Nigerian penal code designed to deal with them. They are notoriously difficult to prosecute for both Nigerian and foreign authorities

In its earliest incarnations, the scam involved someone claiming to be a Nigerian prince sending a target an email saying he desperately needed help smuggling wealth out of his country. All the target needed to do was provide a bank account number or send a foreign processing fee to help the prince out of a jam, and then he would show his gratitude with a generous kickback.

These scams really do appear to have begun in Nigeria, but they can now come from almost anywhere

“In a hilarious update of the classic Nigerian phishing template, British news website Anorak reported in 2016 that it received an email from a certain Dr. Bakare Tunde, who claimed to be the project manager of astronautics for Nigeria’s National Space Research and Development Agency. Dr. Tunde alleged that his cousin, Air Force Major Abacha Tunde, had been stranded on an old Soviet space station for more than 25 years. But for only $3 million, Russian space authorities could mount a flight to bring him home. All the recipients had to do was send in their bank account information in order to transfer the needed amount, for which Dr. Tunde will pay a $600,000 fee.

Incidentally, the number “419” is associated with this scam. It refers to the section of the Nigerian Criminal Code dealing with fraud, the charges, and penalties for offenders. This scammers feeds on the weakness of human to carry out their malicious activities.

How To Identify Phishing Scam

  1. If the email is coming from a company or organization, you should be skeptical of generic greeting like “Dear customers” or Dear friend”. This should raise a red flag as most companies or organization will use your name in their email greetings.
  2. The email offer sounds too good to be true.” Wow! You just won yourself a sum of $1000, click this link to claim”. Don’t click it because this lotteries and expensive prizes are click baits to install malwares on your system or get personal information
  3. The message contains unusual or unexpected email attachments. This attachment may contain malware, ransomware and other online threats.
  4. The email contains links that is a little off. Hover over the link to see actual URL, lookout for misspellings. It is better to always directly type in the URL rather than clicking embedded links
  5. If the email claims to be from somebody you know, call to verify that they actually sent the email especially if it involves taking some certain actions. This could include downloading of attachments or submitting personal information.

How To Protect Against Phishing

  1. Have a good online habit and don’t respond to links in unsolicited emails or social media
  2. Don not give sensitive information to anyone on the phone or via emails
  3. Look out for websites URL(web address).In phishing attempts the web address may look legitimate but the web address may be misspelt or the domain maybe different.(.com when it should be .ng)
  4. Hover over links to see if it is legitimate
  5. If you suspect an e-mail isn’t legitimate, take a name or some text from the message and put it into a search engine to see if any known phishing attacks exist using the same methods.
  6. If you suspect an e-mail isn’t legitimate, take a name or some text from the message and put it into a search engine to see if any known phishing attacks exist using the same methods.
  7. Educate your employees and having a phishing simulation scenario carried out on your employees

Identifying phishing can be harder than you think.Try the google email phishing quiz here

Subscribe To Our Newsletter

Join our mailing list to receive the latest news and updates from our team.

You have Successfully Subscribed!

Tags: Careers in CybersecurityCyber EducationcyberintelligencecybersecurityGoogleNigeriaonline safetyPhishingSafety TipsYahoo
Cybersecfill

Cybersecfill

An independent Nigeria cybersecurity blog aimed at sharing cybersecurity news, articles ,blog and opinins.

Next Post
2018 Biggest Data Breaches

2018 Biggest Data Breaches

0 0 vote
Article Rating
Login
guest
guest
0 Comments
Inline Feedbacks
View all comments

Subscribe

Subscribe To Our Newsletter

Subscribe To Our Newsletter

Join our mailing list to receive the latest news and updates from our team.

You have Successfully Subscribed!

  • Trending
  • Comments
  • Latest
credit card cloning

How Credit/Debit Cards are Cloned / Preventing Card Cloning

December 26, 2019
Wifi 6 Security

Did Wi-Fi 6 come with an Improvement In Security?

May 13, 2019
Nationa Cybersecurity Strategy

A Review of the Nigeria National Cybersecurity Strategy

July 1, 2019
Wireless Access Point

How To Secure Your Wireless Access Point (WAP)

August 3, 2019
Facebook

Facebook’s New Settings Allows Hackers To Easily Pentest Facebook,Instagram Mobile Applications

8
Nationa Cybersecurity Strategy

A Review of the Nigeria National Cybersecurity Strategy

6
Cybersecurity Jobs

Cybersecurity Jobs – You can create your own Cybersecurity Role

4
open Source intelligence tools

Open Source Intelligence tools – OSINT

4
5G Dangers: What are the Cybersecurity implications?

5G Dangers: What are the Cybersecurity implications?

March 1, 2021
Key Differences Between Firewall And Antivirus

Key Differences Between Firewall And Antivirus

February 27, 2021
Cybersecurity for Remote Workers: 8 ways to work safer…

Cybersecurity for Remote Workers: 8 ways to work safer…

February 24, 2021
Cloud Account Hijacking

Cloud Account Hijacking

February 22, 2021

Recommended

5G Dangers: What are the Cybersecurity implications?

5G Dangers: What are the Cybersecurity implications?

March 1, 2021
Key Differences Between Firewall And Antivirus

Key Differences Between Firewall And Antivirus

February 27, 2021
Cybersecurity for Remote Workers: 8 ways to work safer…

Cybersecurity for Remote Workers: 8 ways to work safer…

February 24, 2021
Cloud Account Hijacking

Cloud Account Hijacking

February 22, 2021

© 2020 CybersecFill. All Rights Reserved.

No Result
View All Result
  • Home
  • Events
  • News
  • security tips
  • Article
  • Contact Us

© 2020 CybersecFill. All Rights Reserved.

wpDiscuz
0
0
Would love your thoughts, please comment.x
()
x
| Reply