It doesn’t matter if you are an individual using email at home, or what type or size of business you are in, phishing affects everyone.
Phishing emails have been used by cybercriminals to steal financial details from Zambians for a number of years but have become increasingly sophisticated since then.
Brands that are commonly copied include:
It used to be easy to recognise and ignore a phishing email because it was badly written or contained spelling errors, but current phishing messages appear more genuine. It can be very difficult to distinguish these malicious messages from genuine communications.
Because of phishing, it is now standard policy for many companies that they will not call, email or SMS you to:
Many companies also have security pages that identify active scams using their branding. These pages often include examples and pictures of scam messages to help you tell fake messages from real ones.
Tip: If a message seems suspicious, contact the person or business separately to check if they are likely to have sent the message. Use contact details you find through a legitimate source and not those contained in the suspicious message. Ask them to describe what the attachment or link is.
More dangerous still are a class of phishing messages known as ‘spear phishing’. These messages target specific people and organisations, and may contain information that is true to make them appear more authentic.
These messages can be extremely difficult to detect, even for trained professionals, as they catch people with their guard down.
For example, you might get a message that appears to be from your own company’s IT help desk asking you to click on a link and change your password because of a new policy.
Spear phishing often uses a technique called ‘social engineering’ for its success. Social engineering is a way to manipulate people into taking an action by creating very realistic ‘bait’ or messages.
Criminals are getting better at social engineering and putting more time, effort and money towards researching targets to learn names, titles, responsibilities, and any personal information they can find.
Social media accounts provide rich information about events, conferences and travel destinations that can be used to make an approach seem real and accurate. So consider what personal information you share online and learn how to use social media safely.
The best way to protect yourself from phishing attempts is to stay abreast of current threats, be cautious online and take steps to block malicious or unwanted messages from reaching you in the first place.
Take the following steps to protect yourself from phishing attempts:
Copyright @2023 ZAMBIA CIRT