{"id":7997,"date":"2024-06-13T20:15:22","date_gmt":"2024-06-14T03:15:22","guid":{"rendered":"https:\/\/www.islandtechnologies.net\/blog\/?p=7997"},"modified":"2024-06-13T20:15:22","modified_gmt":"2024-06-14T03:15:22","slug":"how-to-spot-a-scam-spear-phishing","status":"publish","type":"post","link":"https:\/\/www.islandtechnologies.net\/blog\/how-to-spot-a-scam-spear-phishing\/","title":{"rendered":"How to Spot a Scam: Spear Phishing"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">What is &#8220;Spear Phishing&#8221;?<\/h2>\n\n\n\n<p>Last week we took a look at phishing in general, this week we\u2019ll be looking at a less common, albeit more dangerous type of email scam. In the case of spear phishing, scammers do a bit more research to find personal information about their potential victim. They then use this personal information to create more targeted and believable email scams.<\/p>\n\n\n\n<p>These emails are less common because of the effort they take to create, but&nbsp;<strong>spear phishing emails account for the majority of successful phishing attempts.<\/strong>&nbsp;The personalized touch goes a long way in securing the trust of unsuspecting recipients\u2014and at a much higher rate than the average phishing email.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full\"><a href=\"https:\/\/www.islandtechnologies.net\/blog\/wp-content\/uploads\/2024\/06\/image-4.png\"><img loading=\"lazy\" decoding=\"async\" width=\"457\" height=\"325\" src=\"https:\/\/www.islandtechnologies.net\/blog\/wp-content\/uploads\/2024\/06\/image-4.png\" alt=\"\" class=\"wp-image-7998\" srcset=\"https:\/\/www.islandtechnologies.net\/blog\/wp-content\/uploads\/2024\/06\/image-4.png 457w, https:\/\/www.islandtechnologies.net\/blog\/wp-content\/uploads\/2024\/06\/image-4-300x213.png 300w\" sizes=\"auto, (max-width: 457px) 100vw, 457px\" \/><\/a><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Spear Phishing vs. Phishing<\/h2>\n\n\n\n<p>Phishing emails often come disguised as communications from legitimate, familiar brands. However,&nbsp;<strong>spear phishing goes a step further by including specific personal information<\/strong>&nbsp;within the email.&nbsp;<\/p>\n\n\n\n<p>A regular phishing email may appear as a minimally personalized communication from a large brand. For example, a message from Netflix asking you to pay a phony invoice. A spear phishing campaign, on the other hand, \u201cmay address you personally, use a familiar greeting, or appear to come from a colleague, acquaintance, friend, or a higher-up in your organization,\u201d as stated&nbsp;<a href=\"https:\/\/islandtechnologies.createsend1.com\/t\/y-i-mllktdd-l-y\/\" target=\"_blank\" rel=\"noreferrer noopener\">in this NYU article.<\/a>&nbsp;The added personal details make spear phishing much more believable than other scam emails.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">An example of Spear Phishing:<\/h2>\n\n\n\n<p>As with other phishing attempts, scammers will use a technique called&nbsp;<strong>Spoofing<\/strong>. This is when a scammer \u201cdisguises their email address, sender name, phone number, or website URL,\u201d as described by&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/islandtechnologies.createsend1.com\/t\/y-i-mllktdd-l-j\/\" target=\"_blank\">this FBI report,<\/a>&nbsp;\u201coften just by changing one letter, symbol, or number.\u201d While spoofing is used in most phishing attempts, it is usually more subtle to spot in spear phishing emails. If you look closely, there are usually clues that the email may be unsafe, as in the example below.<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full is-style-default\"><a href=\"https:\/\/www.islandtechnologies.net\/blog\/wp-content\/uploads\/2024\/06\/image-5.png\"><img loading=\"lazy\" decoding=\"async\" width=\"689\" height=\"557\" src=\"https:\/\/www.islandtechnologies.net\/blog\/wp-content\/uploads\/2024\/06\/image-5.png\" alt=\"\" class=\"wp-image-7999\" srcset=\"https:\/\/www.islandtechnologies.net\/blog\/wp-content\/uploads\/2024\/06\/image-5.png 689w, https:\/\/www.islandtechnologies.net\/blog\/wp-content\/uploads\/2024\/06\/image-5-300x243.png 300w\" sizes=\"auto, (max-width: 689px) 100vw, 689px\" \/><\/a><\/figure>\n\n\n\n<p class=\"has-text-align-right has-small-font-size\"><em>Photo source:&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/islandtechnologies.createsend1.com\/t\/y-i-mllktdd-l-t\/\" target=\"_blank\">identitytheft.org<\/a><\/em><\/p>\n\n\n\n<p><strong>Note how the email is ostensibly from a higher up at the organization being sent to an employee.<\/strong>&nbsp;That is a common tactic in these types of scams. Closer inspection reveals a mismatch between the scammer\u2019s email address and email sign off. Also notice how the scammer mistakenly calls the university by two different names. While the scammers may do more research than usual in these emails, they still often make mistakes like these.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What can you do to protect yourself?<\/h2>\n\n\n\n<p>The steps to protecting yourself from Spear Phishing are similar to the ones you would take to protect yourself from other scam emails.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Double-check email addresses and URLs for misspellings or other oddities.<\/li>\n\n\n\n<li>When in doubt, don\u2019t click a link or download an attachment.<\/li>\n\n\n\n<li>Use two-factor authentication (2FA) when possible.<\/li>\n\n\n\n<li>Install and regularly update a trusted cybersecurity software<\/li>\n\n\n\n<li>Keep software and systems up-to-date.<\/li>\n\n\n\n<li>Review your accounts regularly for suspicious activity.<\/li>\n\n\n\n<li>Use strong, unique passwords for each individual login.<\/li>\n\n\n\n<li>Create regular backups of your data.<\/li>\n<\/ul>\n\n\n\n<p>When dealing with organizations, we like to add one more bullet point to that checklist.&nbsp;<strong>In addition to all the rest, we suggest that organizations run phishing simulations.<\/strong>&nbsp;Unlike your run-of-the-mill phishing attempts, many employees are completely unaware about spear phishing.&nbsp;<strong>Many employees would not expect that an urgent email request from their superior could actually be a spear phishing attempt.<\/strong>&nbsp;The best way to combat this is with education.<\/p>\n\n\n\n<p>If you are interested in running a phishing simulation in your organization, or would like to discuss other ways to strengthen your cybersecurity processes, please call&nbsp;<a href=\"https:\/\/islandtechnologies.createsend1.com\/t\/y-i-mllktdd-l-i\/\" target=\"_blank\" rel=\"noreferrer noopener\">818-832-2310<\/a>&nbsp;or email&nbsp;<a href=\"mailto:support@islandtechnologies.net\" target=\"_blank\" rel=\"noreferrer noopener\">support@islandtechnologies.net<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">That&#8217;s all\u2026for now!<\/h2>\n\n\n\n<p>Thanks for reading another installment of our series on how to spot scam emails. Keep an eye out for our next one where we will be talking about &#8220;Whaling,&#8221; an even more sophisticated version of phishing that targets business owners directly.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>What is &#8220;Spear Phishing&#8221;? Last week we took a look at phishing in general, this week we\u2019ll be looking at a less common, albeit more dangerous type of email scam. In the case of spear phishing, scammers do a bit more research to find personal information about their potential victim. They then use this personal &hellip; <a href=\"https:\/\/www.islandtechnologies.net\/blog\/how-to-spot-a-scam-spear-phishing\/\">Continued<\/a><\/p>\n","protected":false},"author":8,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-7997","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/www.islandtechnologies.net\/blog\/wp-json\/wp\/v2\/posts\/7997","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.islandtechnologies.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.islandtechnologies.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.islandtechnologies.net\/blog\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/www.islandtechnologies.net\/blog\/wp-json\/wp\/v2\/comments?post=7997"}],"version-history":[{"count":3,"href":"https:\/\/www.islandtechnologies.net\/blog\/wp-json\/wp\/v2\/posts\/7997\/revisions"}],"predecessor-version":[{"id":8002,"href":"https:\/\/www.islandtechnologies.net\/blog\/wp-json\/wp\/v2\/posts\/7997\/revisions\/8002"}],"wp:attachment":[{"href":"https:\/\/www.islandtechnologies.net\/blog\/wp-json\/wp\/v2\/media?parent=7997"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.islandtechnologies.net\/blog\/wp-json\/wp\/v2\/categories?post=7997"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.islandtechnologies.net\/blog\/wp-json\/wp\/v2\/tags?post=7997"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}