top of page

Episode #3: What is Phishing? - Interview with an Artificial Cyber Intelligence

Updated: Apr 25

Episode #3: What is Phishing?

what is phishing

In this episode we dive deep into phishing and what it actually means for you. We even ask our AI friend to generate a pop song about the dangers of phishing... awesome!


 

Episode #3: What is Phishing?


What is Phishing?


Phishing is a type of cyber attack in which the attacker uses fake emails or websites to trick the victim into giving sensitive information, such as passwords, credit card numbers, or personal data. Phishing attacks often seek to steal this information for financial gain, but they can also be used to gain access to corporate networks or to spread malware.


Phishing attacks can be difficult to detect, as they often use fake emails or websites that appear legitimate. The attacker may impersonate a well-known company or organization, or may use a fake email address or website that looks similar to a legitimate one. They may also use social engineering techniques, such as creating a sense of urgency or offering a reward, to trick the victim into divulging sensitive information.


To protect against phishing attacks, it is important to be cautious when receiving emails or messages from unknown sources, and to be sceptical of offers or requests for personal information. It is also important to use strong passwords and to enable two-factor authentication for added security.


 

How often are phishing emails sent to people?


It is difficult to estimate how often phishing emails are sent to people on average, as this can vary widely depending on the specific targets and tactics being used by the attackers. Some individuals or organizations may receive a high volume of phishing emails, while others may receive very few.


In general, phishing attacks are becoming more common as cyber criminals seek to gain access to sensitive information and systems. According to one estimate, phishing attacks increased by over 600% in the first half of 2020 compared to the same period in 2019.


Phishing is a global problem that affects individuals and organizations in a variety of industries. According to data from the Anti-Phishing Working Group (APWG), there was a significant increase in phishing attacks in 2020, with over 4.3 million unique phishing websites detected.


 

How easy is it to identify phishing emails?


It can be challenging to identify phishing emails, as attackers often use tactics to make the emails or websites they use appear legitimate. However, there are some signs that an email or message may be a phishing attempt, including:


  • Unfamiliar sender: If you receive an email or message from an unfamiliar sender, it may be a phishing attempt. Be cautious when receiving emails or messages from unknown sources, and be skeptical of offers or requests for personal information.


  • Suspicious links or attachments: Phishing emails may contain links or attachments that, when clicked or downloaded, install malware or redirect the victim to a fake website. Be cautious when clicking on links or downloading attachments from unknown sources, and hover your mouse over the link to see where it is actually going.


  • Typos or grammatical errors: Phishing emails may contain typos or grammatical errors, as attackers may not take the time to proofread their messages. Be on the lookout for errors in the email or message, as this may be a sign that it is a phishing attempt.


  • Urgent or threatening language: Some phishing emails may use urgent or threatening language to create a sense of urgency or to scare the victim into giving sensitive information. Be sceptical of emails or messages that use this type of language, and take the time to verify the authenticity of the request before responding.


 

What should I do if I click on a phishing link?


If you have clicked on a link in a phishing email or message, there are a few steps you can take to protect yourself and your personal information:


  • Disconnect from the internet. This will help to prevent the phisher from gaining access to your device or network.


  • Run a security scan. Use antivirus software to scan your device for malware and remove any malicious files.


  • Change your passwords. If you clicked on a link that asked for login credentials, it is important to change your passwords as soon as possible to prevent the phisher from accessing your accounts.


  • Monitor your accounts. Keep a close eye on your accounts for any suspicious activity, and report any unauthorized transactions or changes to the relevant authorities or companies.


  • Be cautious of future emails or messages. If you clicked on a phishing link, it is possible that the phisher now has your email address and may try to send you more scams in the future. Be extra vigilant and use the tips provided above to identify and avoid future phishing attacks.


  • Report the incident. If you believe you have fallen victim to a phishing attack, it is important to report the incident to the relevant authorities or companies. This can help to prevent others from falling victim to the same scam.


By following these steps, you can help to minimize the damage caused by clicking on a phishing link and protect yourself from future attacks. It is also important to remember that prevention is always better than cure, so take steps to protect yourself from phishing attacks in the first place by being cautious when clicking on links or downloading attachments from unknown sources.


 

What countries most commonly use phishing and what industries do they target the most?


Phishing attacks are often launched from countries with weak cybersecurity laws or a high concentration of cybercriminals. Some of the countries that have been identified as major sources of phishing attacks include China, Russia, and the United States.


However, it is important to note that phishing attacks can be launched from any country, and that cybercriminals often use techniques such as proxy servers and virtual private networks (VPNs) to hide their true location.


In terms of industries, no sector is immune to phishing attacks. However, some industries are more commonly targeted due to the valuable nature of the data they hold or the high likelihood of employees falling for a phishing scam. These industries include financial services, healthcare, and technology.


 

Can you give me a real-world example of a phishing attack?


One example of a real-world phishing attack was the 2017 "WannaCry" ransomware attack, which affected over 200,000 computers in 150 countries. The attack was launched through a phishing email that contained a link to a malicious website. When victims clicked on the link, they were redirected to a site that appeared legitimate but was actually a trap. If the victim entered their login credentials or personal information on this site, the cybercriminals could then use this information to gain access to their accounts or to install ransomware on their computer.


 

We've talked about the cyber attack chain before. How does a phishing email fit into the attack chain?


The cyber attack chain refers to the series of steps that an attacker takes to carry out a cyber attack. Phishing emails can be used by attackers as part of the reconnaissance or delivery stage of the attack chain.


During the reconnaissance stage, the attacker gathers information about their target in order to identify vulnerabilities or potential points of entry. This may include using phishing emails to gather information about the target's employees, systems, or processes.


During the delivery stage, the attacker uses the information gathered during reconnaissance to deliver their payload, which may be malware or a phishing email. If the victim falls for the phishing email and clicks on a link or downloads an attachment, the attacker may be able to gain access to the victim's device or personal information.


The subsequent stages of the attack chain include exploitation, installation, command and control, and action on objectives. These stages may involve the attacker using the access gained through the phishing email to install malware, gain control of the victim's device, or achieve their ultimate goals, such as stealing sensitive data or disrupting operations.


 

So, clicking on a phishing link can install ransomware, which is used to extort people?


Yes, clicking on a link in a phishing email or message can sometimes result in malware, such as ransomware, being downloaded onto your device. Ransomware is a type of malware that is designed to encrypt the victim's files, making them inaccessible until the victim pays a ransom to the attacker to decrypt them.


Ransomware attacks can be particularly disruptive and costly, as they can affect individuals, businesses, and even critical infrastructure. In some cases, attackers may threaten to delete the victim's files if the ransom is not paid, or may threaten to release sensitive information publicly if the ransom is not paid.


To protect against ransomware attacks, it is important to be cautious when receiving emails or messages from unknown sources and to be sceptical of offers or requests for personal information. It is also important to use strong passwords and to enable two-factor authentication for added security. Regularly backing up important files can also help you recover from an attack without having to pay a ransom.


 

Thanks for the chat! Before I go, can you write a pop song about how dangerous phishing is?


Here is a pop song about the dangers of phishing:


Verse 1:

I opened up my email

Thinking it was just spam

But this message was different

It looked like it was from a friend


Chorus:

Oh no, it's a phishing scheme

Don't click that link, it's not what it seems

They'll steal your data and hold it for ransom

Be careful out there, don't fall for their trap, man


Verse 2:

They use fake websites

And send fake messages too

They'll trick you into giving them

All your sensitive information, it's true


Chorus:

Oh no, it's a phishing scheme

Don't click that link, it's not what it seems

They'll steal your data and hold it for ransom

Be careful out there, don't fall for their trap, man


Bridge:

Protect yourself, don't be naive

Use strong passwords and enable two-factor leave

Be cautious of unfamiliar senders

And never give out personal information, surrender


Chorus:

Oh no, it's a phishing scheme

Don't click that link, it's not what it seems

They'll steal your data and hold it for ransom

Be careful out there, don't fall for their trap, man

Comments


bottom of page