Home

About Us

IT Services

Understanding IT

News & Events

Blog

Support

Contact Us

Blog
  • Register

Capstone Works Blog

Capstone Works, Inc. has been serving the Cedar Park area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Definitive Guide on Spotting a Phishing Attack

The Definitive Guide on Spotting a Phishing Attack

Phishing is one of the leading vectors for larger cyberattacks, and right now, it’s the biggest cyberthreat for Texas-based businesses. In this guide, we’re going to cover what to look for. If you are a business owner, we recommend sharing this blog with your entire staff and asking that they read and confirm they understand it. Go ahead and share it as much as you want—if you find it useful, we’d love to hear from you!

What is Phishing?

A phishing attack is essentially an email hoax. It is an email designed to trick the recipient into downloading malicious software or sharing sensitive information. Phishing attacks come in many different forms, but there are some common tricks that are often used, and some key identifiers to help you determine if an email is actually legitimate or not.

How Does Phishing Work?

Let’s look at a classic example of a phishing attack. We’re going to use Bank of America because it’s the second most popular banking institution in Texas, and because cybercriminals have been targeting BoA customers frequently over the years. It’s important to note that this has nothing to do with Bank of America’s legitimacy or its security, and there is very little the bank can actually do to stop this type of attack.

The attack might look like this. You get an email that looks like it is from Bank of America.

The subject line might say something like: Security Alert: Unusual Account Activity Detected!

The email has the Bank of America logo.

The email then says something like:

Dear Valued Customer,

We’re letting you know that we’ve detected some unusual activity on your Bank of America account. For your protection, please verify this activity so you can continue to access your money without interruption.

To re-activate, please click here to provide your current username and password.

Please note that if you fail to do this within 48 hours, your bank account will be terminated.

That sounds pretty serious, right?

This is the kind of email that gets a person to panic and act quickly. However, if it’s a phishing attack, your bank didn’t actually email it to you, and that link doesn’t belong to your bank.

Instead, the cybercriminal who sent the email likely built a webpage that looks like Bank of America. It’s got the same logo and branding. Even the web address (at first glance) might look like it says bankofamerica.com. The familiar login box is there, waiting for you to put in your username and password.

However, when you enter your password, it doesn’t log you into your bank account. It gives that information to the cybercriminal.

Now they have access to your bank account. They don’t need to hack anything. They just simply log in right now.

Now, let’s say this phishing attack wasn’t for your bank. Let’s say it was something a little less valuable, like your Netflix account. Cybercriminals know that most people have poor password hygiene. If they can trick you into giving them your Netflix credentials, they will try out your credentials everywhere else, including your bank, your email accounts, your social media, and everywhere else they can.

Things can get very ugly, very fast.

How to Spot a Phishing Attack

Think Before You Click

No matter what, you should always stop and think for a moment before you click on anything within an email. That includes email attachments too (email attachments can contain malware like ransomware which will quickly take over your entire computer or network within moments).

If there is a link or an attachment, just pause, take a deep breath, and put your guard up. Start looking for some of these other signs.

Verify the Sender

Cybercriminals will try to spoof phishing emails to make it look like they are being sent from a legitimate source. This means they might make up a fake email account like “[email protected].” 

But let’s look at this closely. 

If you look at the part of the email after the @ symbol, you’ll notice that it isn’t the official Bank of America web address. It’s something else entirely.

A good rule of thumb is to look for periods. If there is a dot in the email other than the .com or .org (and vice versa), you might be getting duped. 

They might not always have an extra period though. It could just be an alternative spelling of the domain name, or a different (but possibly similar) domain name altogether.

Here are some other examples you might see, using Bank of America as our scapegoat:

[email protected]
[email protected]
[email protected] 

The possibilities are endless, so be vigilant. 

Just because the sender email looks good though, doesn’t mean you are out of the woods yet. It’s possible that cybercriminals hijacked the email account and legitimately sent out the email from a real address. This happens all the time on both large and small scales, so it’s worth looking for these other traps.

Inspect Any Links Before You Click on Them

Let’s say so far, the email has passed the tests above. Now you are thinking about following the instructions and clicking on a link in the email.

Remember, you should really be running through this whole gamut every time ANY email has a link or attachment in it.

Before you click, hover your mouse over the link. Most email clients like Outlook and Gmail will display the URL the link is going to, either as a tooltip next to your cursor or towards the bottom of the window, but we’ll show you a trick for that in a moment.

Look at the URL that the link is attempting to send you to. Does it look legitimate?

Use the same basic rules you used above for confirming the legitimacy of the email. 

Is there an extra period somewhere after the domain name?

Let’s use Amazon as our scapegoat now:

  • https://www.amazon.com/gp/help/customer/account-issues - This is safe, because there isn’t a period after the .com. 
  • https://support.amazon.com/ - This is safe, because the extra period is before the company’s domain name (in this case, amazon.com)
  • https://support.echo.amazon.com/customer-support/password-reset - Again, this is safe because there are no periods after amazon.com, regardless of how many subdomains (extra periods) are before it in the URL.
  • https://support.amazon.ru - Time to slow down. While Amazon does legitimately have a .ru domain, not every business has every variation of domain extension (like .org, .net, .co, .co.uk, etc.). As soon as you get something you don’t expect, start to scrutinize even more.
  • https://amazon.passwordservices.com/help/account-issues - This one is dangerous. This URL is technically taking you to a site called passwordservices.com. We just made that up for the example. Anyone could purchase that domain (or something similar) and spoof the URL to say Amazon before the first period. It’s tricky because it’s easy to miss.

When in doubt, ignore all of the links in the email, and just do a Google search for the website you want to go to. If it’s for Bank of America, PayPal, Amazon, Netflix, or virtually any other popular service, the official website should be among the top results. If you know the actual URL to the website or have it bookmarked, use that, log in like you normally would, and see if you can troubleshoot your account from there.

Don’t Trust Anything Until You’ve Received Confirmation

If someone sends you something unsolicited, whether it’s a vendor, a co-worker, a customer, or a random nobody who stumbled into your email inbox, just don’t click on it or download the attachment.

That’s it. Leave it be.

Then reach out to that person and check for its legitimacy.

A very popular type of phishing attack involves spoofing a CEO or other company executive, and it looks like a legitimate email where the boss is asking you to send them sensitive information or purchase prepaid gift cards, or something along those lines.

In cases like that, just reach out through another means to get confirmation. There’s no harm in questioning email these days. If the sender gives you any grief for it, let them know you just didn’t want to sacrifice their security and that it’s always a good habit to get confirmation outside of email.

This is a habit that each and every one of us needs to start building.

We’re Here to Help

If you want assistance training your staff, or you need help gaining control over your cybersecurity, give the IT professionals at Capstone Works a call at (512) 343-8891.

How to Set Up an IT Budget Texas Businesses Can St...
These Remote Workforce Mistakes Are Killing Austin...
Comment for this post has been locked by admin.
 

Comments

No comments made yet. Be the first to submit a comment
Guest
Already Registered? Login Here
Guest
Thursday, May 16, 2024

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Architect IT Apple Shadow Current Events phishing Cyberattack Internet Health managed IT hackers Vendor Privacy Ransomware Remote Workers Social Media Password Remote Workplace Tips SCAMS Efficiency Tip of the Week devices Quick Tips Disaster Planning high-threat environment Workplace Strategy best practices IT Services 365 features Managed IT spam AWS business owners application employees download Mobile Office Saving money cloud Software Outsourced IT IoT Cloud computing Remote Work Hosted Solutions right time smart devices Best Practices web application Technology Backup business Network Security AI Engineering VoIP New Year Content Filtering Broadband 2FA sports teams employees surge protection comprehensive IT Gadgets Hardware Security Servers Recovery Network Common password content Two-Factor Authentication Cloud Computing Marketing Microsoft Office Saving Money Cloud Communications IT support Microsoft Office 365 Users cybersecurity tools Productivity Business Continuity Communication accounts need Passwords today Microsoft Teams Business continuity Passwords Workplace Strategies Cloud services Malware Data User Tips BDR password protection Co-managed IT Compliance Tech Support Microsoft AutoCAD Delightful Clutch Computer Innovation business continuity Break/fit media accounts cybersecurity COVID-19 File Folder Managed Services Managed Service Email EMR Server January 28 HIPAA Data Privacy Day IT Support UPS Data Recovery Disaster Recovery Small Business Business Cybersecurity

Latest News & Events

Capstone Works is proud to announce the launch of our new website at https://www.capstoneworks.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our ser...

Contact Us

Learn more about what Capstone Works can do for your business.

Call Us Today
Call us today
(512) 882-2242

715 Discovery Blvd
Suite 511

Cedar Park, Texas 78613