Error
Error
Error
Subscribed
The request was successfully sent
Error
Message sent
Error
There is "Maxnet" coverage at Your address
The request was successfully sent
No coverage
Error
Feedback sent successfully
Error
Feedback sent successfully
Error
Request sent successfully
Error
CV sent successfully
The request for the domain transfer is successfully sent
Error
11.10.2023
Internet
17949
The Ministry of Digital Transformation of Ukraine has declared October as Cyber Security Month. Given the importance of protecting businesses and ordinary users from cyber threats, as well as the growing number of cybercrimes with the outbreak of a full-scale war in Ukraine, we decided not to stand aside. We have dedicated a separate article to the topic of phishing and safe behavior of Internet visitors.
What phishing is and what purpose it serves
First of all, let's understand the concept of phishing. Many of you have probably received emails about winning the lottery or receiving an inheritance from a distant foreign relative. To find out the details, the text was usually followed by a call to click on a link. So, you should know that this is a form of phishing.
In general, phishing is the luring of confidential data from Internet users by sending emails supposedly from reliable organizations (bank, popular online service, etc.). In reality, they are sent by cybercriminals to seize account data in order to steal money from bank accounts, blackmail or resell it online.
The term "phishing" was first mentioned in 1987 in a paper from the conference "System Security: A Hacker's Perspective". The word comes from the English word "fishing", because scammers literally catch their victims on the hook. By the way, such phishing attacks are carried out not only through online mailings, but also through SMS messages (then they are called "smishing" — from "SMS" and "fishing") and phone calls (called "vishing" — from the English "voice" and "fishing").
The most famous phishing attacks in history
One of the first global phishing attempts took place in the United States in 2001. The attackers took advantage of the chaos that reigned after the September 11 terrorist attacks and sent out emails as if to verify the identity of individuals. In reality, the fraudsters needed the information to steal bank data.
$900 million — that's how much money cybercriminals managed to steal from Internet users in the United States in 2005. More than a decade later, in 2016, more than 250 thousand phishing attacks were recorded across the country. High-profile cyberattacks using phishing emails are also known to have occurred during the 2016 and 2020 U.S. presidential campaigns.
Since hackers are constantly improving the methods of their attacks, and the scale of the latter is impressive, Internet users need to be attentive to online activities and adhere to at least basic security rules.
Domain spoofing as a form of phishing
One fairly common form of phishing attack is domain spoofing. Typically, scammers pass off fake domains as legitimate organizations on websites or in emails. When a user interacts with the malware, their personal data is exposed to the criminals.
This is the name given to visually identical or similar characters that have different meanings. For example, the capital letter "O" and the number "0". Such signs in the URL-address user can easily confuse each other and as a result get to a fraudulent site.
In this case, cybercriminals create a subdomain of a recognizable domain and intercept the victim's Internet traffic when trying to access a web resource.
This technique consists of registering a domain similar to a popular one, but with some differences: replacing letters, misspelling words, adding symbols ("-", "_" or others). Upon contact, the Internet user is directed to a malicious site.
Email remains one of the main communication channels through which hackers reach out to their potential victims, offering to switch to spoofed domains. This is not surprising, as over 300 billion emails are sent around the world every day. Therefore, it’s important for everyone to know how to protect themselves from these and other forms of cyberattacks. We hope the following recommendations will help you with this.
5 tips to protect yourself from phishing:
We also advise you to use spam filters to block emails from unwanted sources. Also, analyze in time what email address you provided to the sender for communication with you (if it’s not the one to which the letter came, it’s already an "alarm bell").
Be careful on the Internet to avoid falling prey to phishing scams. And if this material was useful to you, please share it with your family and friends.
Rate
5.0
Share
Comments
0
Еще комментарии