itechfy
No Result
View All Result
  • Marketing
  • Tech
  • Business
  • Web Design
  • Health
  • More…
    • Automotive
    • Career
    • Economy
    • Education
    • Entertainment
    • Environment
    • Family
    • Finance
    • Fitness
    • Food
    • General
    • Home
    • Legal
    • Lifestyle
    • Music
    • Pets
    • Photography
    • Real Estate
    • Shopping
    • Travel
Contact us
itechfy
  • Marketing
  • Tech
  • Business
  • Web Design
  • Health
  • More…
    • Automotive
    • Career
    • Economy
    • Education
    • Entertainment
    • Environment
    • Family
    • Finance
    • Fitness
    • Food
    • General
    • Home
    • Legal
    • Lifestyle
    • Music
    • Pets
    • Photography
    • Real Estate
    • Shopping
    • Travel
Contact us
itechfy
No Result
View All Result

Don’t Fall for the Bait  – Michael Pertuit

Don’t Fall for the Bait  – Michael Pertuit
Share on FacebookShare on Twitter

Don’t Fall for the Bait  – Michael Pertuit

How many times have you received an email that looks to be from a legitimate source or a government entity notifying you of long-forgotten money awaiting you or some pending legal action?

The line between legitimate emails and fake emails is getting blurred. Scammers and malicious actors are continuously finding ways to improve their fake email campaigns (called phishing) in an attempt to monetize their efforts…and they are often successful.

Phishing is a big business. According to a study from the Ponemin Institue on behalf of Proofpoint (https://www.proofpoint.com/us/resources/analyst-reports/ponemon-cost-of-phishing-study), the monetary cost of phishing attacks has risen 4-fold in the past 6 years with the average cost in the United States reaching $14.8 million in 2021 compared to $3.8 million in 2015.

What are some different phishing attacks?

1. Phishing attacks that demand immediate action

These attacks traditionally have been via email, but are now evolving to be also delivered via text (smishing) or via telephone (vishing). Here the malicious actor is requiring you to take immediate action to avoid some repercussions.

It could be someone who poses as a government authority or an alert from your financial institution notifying you of fraudulent activity. In any instance, the hope is for the victim to click on a link that directs the victim to a website that is controlled by the malicious actor in order to either capture sensitive information like banking details or request payment, typically via gift cards.

2. Phishing attacks that offer “services”

These attacks are straightforward; the malicious actor contacts the victim and poses to offer some sort of “legitimate” service. I have seen examples where a victim navigates to a fraudulent website and then receives a pop-up indicating that there is a virus or other issue with their computer.

They are then directed to a company for remediation. In actuality, there is no company doing remediation and the individual that they are contacting is going to remediate something that wasn’t there, to begin with and request payment or try to trick the victim into allowing the malicious actor access to their computer where they will exfiltrate data and extort the victim into paying to prevent their data from being leaked.

3. Phishing attacks that pretend to be sent from someone else

These attacks are usually targeted and prey on the human instinct to trust but not verify. The malicious actor pretends to be someone that the victim may know. The malicious actor will usually do some sort of reconnaissance via social media accounts to get background information on the victim.

They will then craft an attack that makes the victim believe that it is someone that they know. Once a level of trust is established, then the malicious actor will try to get information or payment from the victim.

4. Phishing attacks that contain a malicious payload

These attacks leverage the above mechanism with the same end goal: monetize the attack. However, the means to monetization is via a payment from ransomware, a payment from extortionware, or gaining sensitive financial information.

The key difference in these types of attacks is that the malicious actor wants to get the victim to open an attachment that will launch malware into an environment in the hopes of deploying a successful ransomware campaign, data exfiltration campaign, or a campaign to capture sensitive financial data.

Related Posts

My Local Locksmith Expands Full-Service Locksmith Solutions Across Texas: Automotive, Residential, Commercial & Emergency Lockouts
General

My Local Locksmith Expands Full-Service Locksmith Solutions Across Texas: Automotive, Residential, Commercial & Emergency Lockouts

How One Sydney Entrepreneur Built a $500K Car-Sharing Business That’s Changing Urban Mobility
General

How One Sydney Entrepreneur Built a $500K Car-Sharing Business That’s Changing Urban Mobility

Drivehub: Your Ultimate Companion for Smarter Driving
General

Drivehub: Your Ultimate Companion for Smarter Driving

682 Locksmith in Euless, TX: Your Local Locksmith Heroes for Home, Auto & Business Security
Tech

682 Locksmith in Euless, TX: Your Local Locksmith Heroes for Home, Auto & Business Security

Whether you're locked out of your car, need new locks for your business, or want to improve your home’s security, 682...

Read more
PGLUCKY88: A Modern Online Gaming Platform Redefining User Experience

PGLUCKY88: A Modern Online Gaming Platform Redefining User Experience

The crypto industry in 2025

The crypto industry in 2025

Why Security Cameras Matter More Than Ever for San Diego Businesses

Why Security Cameras Matter More Than Ever for San Diego Businesses

Organic Fresh Air Enhances Home Safety with Expert Cleaning & Insulation Services in Fort Worth, Texas

Organic Fresh Air Enhances Home Safety with Expert Cleaning & Insulation Services in Fort Worth, Texas

Are you looking for ways to earn money on Cashout Fridays
game

Are you looking for ways to earn money on Cashout Fridays

Discovering the World of Online Gaming Platforms: Featuring Oddigo
General

Discovering the World of Online Gaming Platforms: Featuring Oddigo

Don’t Fall for the Bait  – Michael Pertuit
General

Don’t Fall for the Bait  – Michael Pertuit

Samsung’s Marketing Strategy
Marketing

6 Lessons to Learn from Samsung’s Marketing Strategy

Auto-Run Python Program on Raspberry Pi Startup
Tech

Auto-Run Python Program on Raspberry Pi Startup

No Result
View All Result
  • Automotive
  • Business
  • Career
  • Economy
  • Education
  • Entertainment
  • Environment
  • Family
  • Finance
  • Fitness
  • Food
  • General
  • Health
  • Home
  • Legal
  • Lifestyle
  • Marketing
  • Music
  • Pets
  • Photography
  • Real Estate
  • Shopping
  • Tech
  • Travel
  • Web Design