top of page
Search

The Latest Developments in Phishing: Trends and How to Protect Against Phishing

  • Writer: Francis Borges
    Francis Borges
  • Sep 3, 2024
  • 3 min read

Updated: Sep 8, 2024

Aloha, Honolulu! As digital threats continue to evolve, staying ahead of the game is crucial for maintaining the safety and security of your information. Phishing, a technique used by cybercriminals to steal sensitive data by impersonating legitimate entities, remains one of the most prevalent cyber threats (and arguably the most successful method of attack). In this blog post, we’ll explore the latest developments in phishing and provide insights into the newest methods being used by attackers so you can keep yourself and your team safe.


The Evolution of Phishing Attacks


Phishing attacks have come a long way from the days of poorly written emails and obvious scams. Cybercriminals are becoming increasingly sophisticated, using advanced techniques and technologies to trick even the most vigilant users. Recent developments have introduced new methods that are harder to detect and can cause significant damage if successful.


Key Developments in Phishing Techniques



1. Spear Phishing and Whale Phishing


Spear phishing is a targeted attack aimed at a specific individual or organization, often based on detailed information gathered about the target. Whale phishing, or whaling, is a subset of spear phishing that targets high-profile individuals such as CEOs or CFOs. These attacks are meticulously crafted and can be very convincing, making them highly effective.



2. Voice Phishing (Vishing) and SMS Phishing (Smishing)


Vishing involves using phone calls to trick victims into revealing personal information. Fraudsters often use caller ID spoofing to appear as legitimate institutions. Smishing, on the other hand, uses SMS text messages to lure victims into clicking on malicious links or divulging sensitive information.


An Example We've Seen In The Wild:


A wave of vishing attacks targeting remote workers, with scammers posing as IT support personnel. Victims received phone calls instructing them to install "security updates" on their devices via a link provided by the bad actor, which were actually malware payloads intended to compromise the victim machine.


3. Clone Phishing


Clone phishing involves duplicating a legitimate email that the victim has received in the past, but altering the attachments or links to malicious ones. This method takes advantage of the trust that the recipient has in the original message.


An Example We've Seen In The Wild:


Cybercriminals replicated a commonly distributed email from a well-known vendor, this time adding a link to a fake login page designed to steal user credentials. This is very common in the AP/AR space as invoices are often sent with high frequency.


4. Browser-in-the-Browser Attacks


One of the newest techniques, Browser-in-the-Browser (BitB) attacks simulate a browser window within the browser. This makes phishing pages look more legitimate and harder to detect because the fake window appears as part of the legitimate application.


An Example We've Seen In The Wild:


Attackers used BitB to create a fake login prompt for the popular online meeting platform Microsoft Teams. Users who attempted to log in had their credentials stolen and accounts compromised.


5. Deepfake Phishing


Deepfake technology leverages artificial intelligence to create convincing video and audio impersonations. Cybercriminals use deepfakes to create videos of executives giving fraudulent instructions or to simulate voice calls that manipulate victims into taking harmful actions. The image and video impersonation is far less likely to be used by the bad actors. We typically see voice impersonations as the go-to method for Deepfake Phishing attempts.


An Example We've Seen In The Wild:


In a groundbreaking attack, criminals used a deepfake video of a company's CFO instructing employees to wire funds to a fraudulent account. The bad actors made out with nearly $25M.



So How Do You Protect Yourself From Phishing?


Awareness and education are your first lines of defense against these sophisticated phishing attacks. Here are some actionable steps to protect your organization:


- Training and Awareness Programs: Regularly educate employees about the latest phishing techniques and how to recognize them.

- Advanced Email Filtering: Implement robust email filtering solutions that can detect and block suspicious emails.

- Multi-Factor Authentication (MFA): Use MFA for all accounts to add an extra layer of security.

- Incident Response Plan: Develop and regularly update an incident response plan to quickly address any security breaches.


Conclusion


As phishing techniques continue to evolve, staying informed about the latest developments is crucial for protecting your business. By understanding these new methods and implementing robust security measures, you can defend against even the most sophisticated attacks.


If you have any questions or need assistance in enhancing your cybersecurity measures, please don’t hesitate to reach out to us at Dynacomp IT Solutions. Mahalo for reading, and stay safe out there, Honolulu!






Francis Borges










Francis Borges


Founder / Security Engineer

Dynacomp IT Solutions

 
 
 

댓글


더 이상 게시물에 대한 댓글 기능이 지원되지 않습니다. 자세한 사항은 사이트 소유자에게 문의하세요.
bottom of page