Ask A Question

+44 (0) 345 260 8801 Remote Support Log a Case Client Area
Home>News>Those clever phishermen

Those clever phishermen

Phishing is rife, and they’re only getting smarter

 

Hackers are trying via numerous means to get access to our personal & sensitive data. Email is a popular means of access for cyber criminals, with it often being the weakest point of entry to a computer network.

 

Emails can of course be filtered, but unlike other network entry points, can’t be blocked entirely, otherwise you wouldn’t be able to receive anything from anyone!

 

Phishing… is the phrase, (pardon all the ph’s!), to explain hackers masking their malicious emails as genuine via a few clever tricks. Their goal is to lure you into clicking on embedded links to websites that may download viruses, malware, or worse, tracking software that’ll collect your key data, such as your bank account login details.

 

 

How do they do it?

 

Masking emails as though they were sent from someone else’s mailbox is surprisingly easy to do. Beyond that, (to ensure a greater chance of their malicious emails getting delivered), they may well have hacked into a businesses mail server or an individual’s mailbox, to send the emails directly as that user.

 

The email itself, (in the majority of cases), isn’t dangerous. It can simply be checked & then deleted from your inbox.

 

If you’ve clicked the link & downloaded the file or opened the document, your PC is then open to the ‘hack’ & exposed to whatever buggy software they intended to hit your machine.

 

We have embedded an example case below, (with the victim sender’s details omitted), to which we refer to through this blog article. This email looks very realistic, given the correct sender’s name, email address and even their full email signature & disclaimer being present.

 

Phishing Example

 

 

What does it look like in my inbox?

 

You’ll receive it through as a normal email in your inbox, among all of your genuine emails. It’ll likely appear as though it’s from the sender’s name and match their correct email address. So, at first glance, you’ll be none the wiser.

 

If the email is masked as though it is from a government department, it may well contain poorly written language, pixelated logos, or be sending you / requesting from you information that would normally be sent via the post or submitted via their secure websites.

 

The email is most likely to contain an attachment or a link, which is the lure to draw you toward their means by which they can enter your PC & steal your data.

 

 

What can I look out for?

 

When you receive any email there are a few key things to check, even if you know & trust the sender.

 

1. The sender’s name & email address. Is it genuine? Has it actually come from their mailbox or does something about the name or email address not look right?

 

2. Does the email contain an attachment?

If it is a PDF, there’s a good chance that you’re safe.

 

If it is a Word or Excel document, it may be programmed to contain a virus that can take over your machine as soon as you open it & activate any “macros” set to run. Always question and be wary of Word & Excel documents that you aren’t expecting. Invoices are often a favourite trick of the fraudsters – always ask your suppliers to send their invoices as PDFs, that way you can have a rule to avoid opening anything marked as an invoice that arrives as an Excel or Word doc.

 

The downside is, you can’t tell from looking at the file whether it is genuine or malicious before you open it – then it’s probably too late.

 

3. Does the email contain any links?

Links are a little easier to check. Hover over the link and you can see where it’ll take you.

 

If it’s an email purporting to be from HMRC or your bank, and the link wants to take you to a completely different gobeldygook website, don’t click on it!

 

If the link appears to be the real website or where you would expect to land, like in the example below, then it may well be genuine, but that is no guarantee.

 

Phishing Example

 

With this example, the link takes you to a file hosted on Microsoft OneDrive. The email makes it look like this user genuinely wanted to send you this file, which is hosted in a reputable place. If the link appeared to be an untrusted source, it would appear to be more suspicious, but on face-value this appears to be legitimate.

 

Clicking the link to visit the website, which shows to be a real Microsoft OneDrive file share, you can see an overview of the document, a PDF.

 

Phishing Example

 

Upon further inspection, hovering over the preview shows the Microsoft branded box with the “Open” link to just be an image, overlaid with a hyperlink to a shortened website URL via tinyurl.com. This cleverly masks the ultimate website address, likely a malicious website.

 

Phishing Example

 

Had the “Open” button highlighted, like a normal website button, and the document been able to be viewed within the browser it would have been genuine. However, clicking this link does actually take you through to a virus riddled website, leading to my email accounts likely vulnerable to being hacked & sending out the very same email I received.

 

 

In Summary

 

Be very, very wary. Even if you believe to know the person that sent you the email.

 

Follow our straight-forward 3-step check list – sender’s name & email address, attachments and links. Checking these three key things before taking any action with the email will help you remain protected.

 

 

Appreciate some guidance?

 

If you have concerns about your cyber security & would appreciate some brief advice, a more detailed check or a complete audit from top to bottom, we’d love to help.

 

At Advoco, we take a consultative approach to working with our clients. Unlike the majority of IT providers, we take the time to learn our client’s business, operations and processes; enabling us to better tailor workable technology solutions.

 

For over 12 years we have partnered with clients across Berkshire, London and the wider-South East. We are incredibly proud of our commercially-sound, technology solutions that drive efficiency, cost savings and performance for the businesses we support.

 

 

 

Phishing