Phish me tender, phish me true

Issue 1 2022 Commercial (Industry)

Phishing remains the most successful threat action when it comes to data breaches, successful hacks and social engineering. The Verizon 2021 Data Breach Investigations Report found that phishing was linked to 36% of breaches and that 85% of breaches connected to social engineering saw cybercriminals walk off with critical login credentials.

Anna Collard.

The past two years have seen cybercriminals not just gain traction and speed as they have ramped up their attacks, but smart ways of manipulating users. It is clever subject lines, personalised messages and emotive approaches that are currently dominating phishing attacks, explains Anna Collard, SVP content strategy and evangelist at KnowBe4 Africa.

“Many phishing attempts succeed because they rely on people to react on their emotions,” she adds. “People react to an official-looking banking email telling them that they have been hacked; or to give out important information over the phone because they think they are talking to a professional organisation; and to click on links and images because they think they have been sent by a trusted source, such as someone from inside their company or someone they know.”

There are multiple threat vectors being used by cybercriminals to get users to slip up so they can slip right on in. In South Africa, the most common phishing and social engineering tactics are:

1. Mobile phishing: These attacks can be anything from using a virus that has been preloaded onto a mobile app, to recreating a corporate login page and using a SMS or WhatsApp message (smishing) to direct the user to that page. Once the person enters their credentials, they are snapped up by the cybercriminals. As the KnowBe4 Phishing by Industry Benchmarking Report found, 67% of respondents use their mobile devices for financial transactions and mobile banking, making this a scary place to make a security mistake. Smishing has become very popular in South Africa and is also being used to disseminate fake news and dis-information.

2. Intelligent subject lines. This may not sound dangerous at first glance, but actually, the subject lines used by hackers in phishing emails are increasingly personalised so that users are encouraged to click on the content. These subject lines are curated to fit the person’s life and everyday tasks so they do not think twice before they open the attachment, enter their credentials, letting the hackers in. A form of this type of highly personalised and targeted attack is known as spear phishing, it is laser focused on one victim or company because the information they hold is of the most value to the attackers.

3. Clever content. There may still be phishing emails out there that are badly spelled, poorly worded and just plain daft, but most are very well written nowadays. In fact, many come across as being written by a trusted colleague or friend and include information that makes it look like the email is every bit as urgent and legitimate as it claims. Always check the URLs, always be wary of attachments and think before you click.

Perhaps the biggest security risk is people. The employees who click on the email or hand out information over the phone. The remote workers who enter their login credentials to a fake website. The person who opens an attachment from their friend Dave. Each of these moments can be prevented or minimised if people understand the risks and are given the tools they need to recognise them.

“It is really important for people to realise that cybercriminals are learning,” concludes Collard. “They are learning and evolving so that their attacks can bypass expensive and complicated security systems and catch people unaware. Check every email, text, SMS, message and phone call and stay alert to make sure that you are not another victim in 2022.”


Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Cyber resilience is more than cybersecurity
Technews Publishing Cyber Security Integrated Solutions IT infrastructure
Hi-Tech Security Solutions held a round-table discussion focusing on cyber resilience and found that while the resilience discipline includes cybersecurity, it also goes much further.

Revamping Liberty Life’s reception area
Turnstar Systems Access Control & Identity Management Commercial (Industry)
Turnstar supplied and installed four Speedgate Express lanes, each 550 mm wide, as well as two Pulse Special Needs Gates for wheelchair access to Liberty Life.

From the editor's desk: Security and resilience
Technews Publishing News
It’s often said that South Africans are a resilient bunch, and history has proven this correct. When it comes to security, both cyber and physical, resilience is key to an effective defensive plan. ...

Hikvision aims for solutions
Technews Publishing Hikvision South Africa Editor's Choice CCTV, Surveillance & Remote Monitoring News Integrated Solutions Conferences & Events
Hikvision recently held a roadshow titled Industry X, where the company highlighted its latest products and solutions, supported by partners and distributors.

ADI Expo returns to South Africa
Technews Publishing ADI Global Distribution News
September saw the return of the ADI Expo to South Africa. The Johannesburg event was held at the Focus Rooms and the Durban event, two days later, at the Southern Sun Elangeni & Maharani.

Technoswitch Awards dinner for 2022
Technews Publishing News Fire & Safety
Technoswitch hosted its fifth awards dinner at Montecasino in September, where customers and suppliers celebrated a year of success.

Reliable, low-maintenance video appliances
Technews Publishing Editor's Choice CCTV, Surveillance & Remote Monitoring News IT infrastructure Products
Symetrix, part of the Agera Group, has added the AES range of video recording servers, storage appliances and workstations to its portfolio.

Resilience is a collaborative effort
Technews Publishing Editor's Choice
Cyber resilience is not an ‘IT thing’; Wayne Olsen says it is an enterprise-wide risk strategy that involves collaboration, lots of collaboration.

The challenge of data safety and availability
Technews Publishing Editor's Choice Cyber Security
Veeam offers backup and recovery software that presents the user with one interface to manage backups to and from almost any platform.

Cold chain integrity in real time
Technews Publishing Editor's Choice Asset Management, EAS, RFID IT infrastructure Transport (Industry) Logistics (Industry)
DeltaTrak offers real-time farm-to-fork IoT monitoring of the cold chain to ensure every step of the journey is recorded and verifiable via the cloud.