Phishing e-mails, constituting one of the most common ways of cyber fraud, have been at the forefront of the concerns of security professionals for several years, for instigating ransomware infections. Particularly in shipping, an increased shift in automation and new technologies has brought new risks associated with cyber threat in the last few years.
Let’s not forget that the cyber-attack against Maersk, the world’s largest container shipping company, with one ship arriving in a port somewhere around the world every 15 minutes, began when an employee in Ukraine responded to an email featuring the NotPetya Malware.
This attack, that caused the company an estimated damage of around $300 million, shocked the shipping community pushing the industry to redefine its current approach on cyber security.
Every day, countless phishing emails are sent to unsuspecting victims worldwide. Some of them are like screaming “I am a fraud”, but others can be a bit more convincing.
So how do you tell the difference between a phishing message and a legitimate message? The following article attempts to cite key features of common phishing e-mails and provide best practices for individuals and organizations to protect themselves.
5 tips to identify a phishing e-mail
- Check the display name: Just because it is coming from a name you may know it does not mean that this is the case. Always look at the email address, not just the sender.
- Is the e-mail asking for personal information? Legitimate companies are unlikely to ask personal information in an e-mail, at least without informing you first in some other way and validating that the information will be secured. Don’t give up personal information unless you are absolutely certain whom that information goes to.
- Has the e-mail an urgent tone? By creating a climate of emergency, the potential hacker aims to create panic so that the recipient won’t have much time to think and act recklessly. Beware of urgent or threatening language, particularly in the subject line.
- Is the e-mail properly signed? It is a key feature of legitimate e-mails that senders include a full signature block at the bottom, while businesses always provide contact details.
- Is the e-mail grammatically correct? Potential attackers are often less concerned about spelling or grammatical consistency than a normal sender would be.
5 tips to protect from a phishing e-mail
- Look but don’t click: You can mouse over the e-mail, but think twice when it is to click, especially if the alt text looks weird or is not in accordance with the link description. If you want to test the link, open a new window and type in website address directly rather than clicking on the link from unsolicited emails.
- Analyze the salutation: Is the email addressed to a vague “Valued Customer?” If so, watch out, legitimate businesses will often use a personal salutation with your first and last name.
- Don’t click on attachments: One of the most regular tactics of phishers is sending juicy attachments. Chances are that this has a long name. Don’t open attachments, unless you actually expect one.
- Don’t trust the header from email address: Fraudsters not only spoof brands in the display name, but also spoof brands in the header from email address.
- Don’t believe everything you see: Always have in mind that phishers are good at what they do: A phishing e-mail may look completely valid. No matter the time of the day, it is most preferable to contact the company’s Security Operations Center (SOC) if something looks strange, rather than putting an entire organization at risk.
For organizations: Don’t forget!
Educating employees is the A and Z in protecting against these types of attacks. Employees remain a significant security risk within a company, a recent research from Microsoft revealed.
Did you know?
A special form of cyber fraud, known as social engineering, refers to attackers manipulating individuals into acquiring personal information that will be used for fraudulent purposes; otherwise known as hacking the human. One way to do so is via e-mail.
The following infographic by LogRythm summarizes 10 things to watch regarding phishing e-mails:
Leave a Reply