Intelligent Tech Channels Issue 66 | Page 39

phone number . Once the victim is on the phone , cyber attackers will use stories and emotion to pressure people into taking actions , such as giving up their passwords , purchasing gift cards or transferring money from their bank accounts to accounts controlled by the attacker .
Attackers have learned that while these attacks usually require far more work as they are not automated , they are often more successful and profitable as they can fool people out of their checking , savings or retirement accounts , stealing their entire life savings .
Scams Many phishing emails have no link or attachment , instead the messages are often very short and impersonate someone that the victim knows or trusts , such as their boss , a co-worker or a vendor they work or shop with .
BEC , Business Email Compromise or CEO Fraud attacks are a common example ,
Once an individual ’ s credentials are stolen , cyber attackers can cause a great deal of damage while operating undetected . when cyber attackers send an urgent email to a specific individual in accounts payable pretending to be a very senior executive , pressuring the individual to approve an invoice or payment . The accounts payable person believes they are doing the right thing , not realising they are approving a payment to cyber criminals .
One way you can determine what type of phishing attacks your organisation is seeing is check with your cyber threat intelligence team , your email support team or anyone responsible for your email filtering or perimeter defences . If you have some type of anti-phishing solutions , such as Proofpoint your security team can log and categorise the type of phishing attacks your organisation is seeing .
Below is an example of a real report for a real company . We see the following :
• 69 % of all phishing emails attempt to take the victim to a website to gather information . This is primarily password harvesting but may also include sites that include surveys .
• 14 % are imposter-based attacks , this would include scams such as BEC attacks , gift card , or billing , invoice scams .
• 8 % are Telephone Oriented Attack Delivery , TOAD attacks . This is a new category that Proofpoint added in 2023 due to an increase of these type of phishing attacks . The goal is for the victim to call a phone number .
• Only 9 % of all phishing emails are attempting to infect the victim with malware , via clicking on a URL or opening an email attachment .
INTELLIGENT TECH CHANNELS 39