What are Phishing Scams?: A Comprehensive Guide 101

Introduction

SentinelOne's image of What is a Phishing Scam with phishing's definition being displayed.

While malware attacks and big data breaches often command the media headlines, phishing scams are both more common and in many cases just as serious a threat to companies. Aside from being used to steal credit card information, bank account numbers, login credentials, social security numbers and other sensitive data, phishing scams are also widely used as an entry point for malware and ransomware attacks. Phishing can result not only in identity theft but also in loss of customer data and company intellectual property. When adversaries engage in spear-phishing, targeted attacks on company personnel, or impersonate enterprise platforms like Software as a Service (SaaS), the risk is even greater.

 

What is Phishing?

At its core, phishing is a cybercrime in which a target or targets are contacted by someone posing as a legitimate institution to lure individuals into providing personally identifiable information. Typically, an email, telephone or text message that contains malicious code is used in a phishing attack. In the last 12 months, 69% of organizations that have suffered a ransomware attack said that the attackers were able to gain access to their network via phishing emails or phishing through social media.

How Common are Phishing Scams?

One of the most recent reports from the Anti-Phishing Working Group (APWG) showed that phishing campaigns targeting brands have been steadily increasing:

The report notes that phishing scams are increasingly hosted on HTTPS websites, with nearly half of all phishing sites now using the secure protocol. These will not trigger warnings from mechanisms like Chrome’s not secure tab, and their content is invisible to legacy AV solutions, which cannot read encrypted traffic.

HTTPS is attractive to scammers because users are encouraged to think the much-vaunted green lock in the browser address bar indicates a safe or legitimate site. The truth is that any site, no matter how dangerous, can acquire an SSL certificate. They are even offered for free by services like Comodo and Let’s Encrypt. An SSL certificate only establishes a secure connection to the site the user has landed on.  It offers no guarantee that it is not a malicious, fake website set up for scamming.

 

How Do Phishing Scams Work?

Email is the primary, but not only, vector. Text messages, direct phone calls (vishing), and social media sites like Facebook, Twitter and LinkedIn have also been exploited, but the aim is always the same: to get the victim to click on a link, make a phone call, or initiate some other kind of action that will trigger the scam.

Many phishing scams will attempt to impersonate a vendor the victim is familiar with, like this fake Spotify subscription message:

A fake Spotify phishing subscription confirmation from the app store

Phishing messages like this push just the right pyschological buttons. The recipient will be both angry about the “mistake” and concerned not to be charged, so there is a strong incentive to click the baited “review your subscription” link.

Links themselves are often manipulated so that they look legitimate to casual observation. Only one of these is real, but how many users would know which one without pausing for thought?

A screenshot image displaying two different links being manipulated to look legitimate for casual observation.

Then there’s homographic attacks in which scammers register sites with unicode characters that are visually similar to the ASCII characters used in the name of a genuine site. Compare these two unicode strings:

\u0430\u0440\u0440\u04CF\u0435

\u0061\u0070\u0070\u006C\u0065

and their visual “printed” form, shown on the right in the image below:

Screenshot image of phishing apple unicode

These two encodings may look similar to the human eye, but the computer reads them differently. If the first were used in a domain name registration, it would actually point to a completely different site than the second.

Fortunately, most modern browsers can recognise this kind attack, but there were vulnerabilities in Chrome, Firefox and Opera as recently as last year which were able to bypass those browsers’ homographic protection filters.

In a more recent attack, scammers used a real subdomain of Google.com, sites.google.com, to host webpages that then redirected victims to malicious sites.

Screenshot image of phishing displaying on Google sites

Reeling in the Catch

Once the victim has been hooked, the scam could involve any number of ruses, from fraudulent tech support scams to fake email sign-in pages. A common tactic is to tell the victim that they need to update their email account and then provide a reasonably convincing spoof site:

Screenshot image of a fake Yahoo

Examination of the code behind the site, however, will show it for what it is: an attempt to steal the user’s login credentials. After the user enters their credentials in the fake site, the code then redirects them to the real site.

A screenshot image of the fake Yahoo redirect code

Spear-phishing campaigns that target the enterprise may be looking for intellectual property for either industrial or nation-state espionage. A UK engineering company, for example, was recently targeted in a spear-phishing campaign designed to steal secrets about its maritime technology, possibly for a Chinese-backed APT group.

 

Phishing for Profit (Why Do Phishers Phish?)

For any cyberattack, a phishing campaign is a great way to start. Let’s see why it is a favored vector among bad actors.

Psychology

As the old adage goes, the weakest link in any computer defence strategy is often between the keyboard and the chair; in other words, exploiting human psychology is often easier than exploiting technical systems. Even those that know how to spot malicious links are not immune to falling victim to a well-crafted phishing campaign.

Using social engineering techniques, persistence and some good initial reconnaissance, phishing is a reasonably reliable way for an attacker to gain an entry point. The scammers have psychology and technology on their side. Add to that some kind of time pressure or sense of urgency, such as limited seasonal deals like “Black Friday” or “Cyber Monday” or the unexpected news from a fake legal outfit that your spouse is filing for divorce– the goal of getting the victim to click a link is statistically odds-on in favor of the attacker.

The trick, particularly in targeted spear-phishing campaigns, is to learn enough about the target to know what will “push her buttons” and to use that information in a carefully-crafted impersonation of a trusted source.

Phishing Starbucks

Low Risk, High Return

A second reason why phishing is popular with attackers is that it’s a low risk, high return strategy. While phishing may be used by a threat actor to achieve direct entry into a target, the technique is more commonly used by actors with no intention other than to steal credentials and sell them on the DarkNet, using bitcoin and other cryptocurrencies to easily receive untraceable payments. As many people re-use the same login credentials across multiple sites, using a phishing technique can have unexpected rewards for those involved in profiteering by selling sensitive information online, where a single sign-on credential could potentially open up a vast treasure-trove of data and access points.

Impersonation

It is notoriously difficult to verify identities through written communication. If a friend makes a video or telephone call, you can instantly recognize that it is your friend on the other end of the line. If you receive a text-based message from your friend urging you to check out a link or open a document, things are much more difficult. In a busy world, it’s a statistical inevitability that some of us will click on something malicious inadvertently. Scammers know this and, like any kind of advertising, getting “click throughs” is all a question of knowing your audience and putting out enough volume.

No Technical Skills Required

It used to be that hacking required technical prowess to create malware. Now it’s becoming possible for non-technical people with criminal intent to create a malware attack, and these service providers are making it easy. These types of attacks are being offered as malware as a service. It allows malware developers to sell their malicious software as a service online.

 

How to Avoid Phishing Scams

Given the dangers, what can a busy person do to reduce the risk of falling for a phishing scam? Here’s some tips:

Take Control

Ensure that your browsers’ anti-phishing preferences are turned on. It’s not uncommon for users to uncheck this option, and it’s trivial for malware to disable it without user permission.

Depending on your browser, the setting can be found in various places and with various names. For Chrome and Chromium browsers, they are typically under Advanced or Privacy and will be called something like “Safe Browsing” or “Phishing and Malware Protection”.

A Gif showing how to make your Chrome browser private by typically going to Advanced or Privacy and clicking on Safe Browsing or Phishing and Malware Protection.

Firefox calls the setting “Block dangerous and deceptive content”, which is located in its Preferences page under “Privacy & Security”. For Safari, check the “Warn when visiting a fraudulent website” option in its Preferences’ Security tab.

In your email client, disable automatic loading of images and external content stored on remote servers. Failing to do this allows attackers to use clickable images, which can avoid security filters, instead of text for links. It also allows them to include hidden images to notify them when a target opens the poisoned email.

Take a Closer Look

Poor spelling and grammar errors in emails and other messages are always a red flag for a phishing attempt, so get into the habit of looking closely at the text of emails that contain links. Hover over any links before clicking them to see where they really lead.

It’s also a good idea to develop the habit of never clicking a link from an email. Avoid clicking links or dialing telephone numbers that request personal information, credit card numbers, or account passwords. Instead, go to the page from a bookmark in your browser, or look up the address in an internet search engine. Similarly, always double-check any phone number you’re asked to call either through a web search or looking at your previous correspondence.

Get with the Program

For enterprise users, consider employee security awareness training that simulates phishing campaigns on a regular basis and encourage good password hygiene, including mandating multi-factor authentication. Using a good Next-Gen AV like SentinelOne that can inspect encrypted traffic and enforce firewall control to block known scam sites helps to further defend against cybercrime as well.

Be a Good Citizen

And of course, if you spot a phishing attack, be sure to report it. You can report phishing, identity theft and other scams online to the Federal Trade Commission (FTC), as well as inform the organization concerned if the scam is spoofing a legitimate site. Reporting functions are provided by Apple, Google, Microsoft, PayPal, Amazon, and most other major vendors. You can easily find the appropriate page of other vendors with an internet search for “report phishing to” and the vendor name.


Like this article? Follow us on LinkedIn, Twitter, YouTube or Facebook to see the content we post.

Read more about Cyber Security

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.