Phishing Attack

Threat Areas
Integrity
General Likelihood
High

Description

Phishing is a type of cyber attack that involves tricking individuals into giving away sensitive information, such as passwords, credit card numbers, or login credentials, by pretending to be a legitimate entity. Here is an example of how a phishing attack might occur:

  1. The attacker creates a fake email that appears to be from a well-known company or organization. The email may contain a sense of urgency, such as a warning that the recipient's account has been compromised or that they need to take immediate action to avoid a negative consequence.
  2. The recipient of the email clicks on a link or downloads an attachment that takes them to a fake website that looks almost identical to the legitimate one. The website may ask the recipient to enter their login credentials or other sensitive information.
  3. If the recipient falls for the trick and enters their information, the attacker can then use it to gain access to their accounts or steal their identity.

Assessment

Practically every business with an online presence is susceptible to phishing attacks.

Mitigations

There are several steps that individuals and organizations can take to mitigate the risk of falling victim to a phishing attack:

  • Use a reputable antivirus and anti-phishing software: These types of software can help to identify and block phishing emails and websites. It is important to keep the software up to date to ensure that it can detect the latest threats.
  • Be cautious when clicking on links or downloading attachments: If you receive an email or message that you were not expecting, do not click on any links or download any attachments until you have verified the authenticity of the message. You can do this by contacting the sender directly or by checking the website's URL to ensure that it is legitimate.
  • Use strong, unique passwords: Using strong, unique passwords for all of your accounts can help to prevent attackers from accessing your accounts even if they obtain your login credentials through a phishing attack. It is also a good idea to use a password manager to store and generate secure passwords for you.
  • Educate employees about phishing attacks: It is important for employees to be aware of the types of phishing attacks that may be targeted at them and to know how to identify and report them. Organizations can provide training or resources to help employees learn how to spot and avoid phishing attacks.

In the Wild

There have been many high-profile phishing attacks that have occurred over the years. Here are a few examples:

  • Google Docs phishing attack: In 2017, a phishing attack targeted Google users by sending them a fake Google Docs invitation. The invitation appeared to be from someone the recipient knew and contained a link that, when clicked, took the user to a fake Google login page. If the user entered their login credentials, the attacker was able to access their accounts.
  • Anthem data breach: In 2015, a phishing attack targeted employees at health insurance provider Anthem, Inc. The attackers sent fake emails that appeared to be from a legitimate vendor, which contained a link to a fake login page. When employees entered their login credentials, the attackers were able to access the company's systems and steal the personal data of over 78 million people.
  • Marriott data breach: In 2018, hotel chain Marriott International disclosed that it had suffered a data breach as a result of a phishing attack that had occurred in 2014. The attack targeted the systems of a subsidiary company, Starwood Hotels & Resorts, and resulted in the theft of the personal data of over 500 million guests.
  • Capital One data breach: In 2019, a phishing attack targeted Capital One, a financial services company, and resulted in the theft of the personal data of over 100 million customers. The attacker, who was a former employee of Amazon Web Services, gained access to the company's systems through a misconfigured firewall.