An introduction to phishing
Phishing is a term used to describe a nefarious actor who is attempting to gain access to sensitive information by impersonating a legitimate business, company, or individual. They will send out emails, SMS texts, chat messages using Whatsapp, Facebook Messenger, or WeChat and may even call you directly by phone or knock on your door. They will use any method possible to try and extract sensitive information such as passwords, social security numbers, credit card information, etc., which they will either sell on the dark web or use directly to steal from you or your company.
There are many forms of phishing including:
Phishing has now become a very successful, if illegal business, where criminal organizations buy phishing-as-a-service (PhaaS). They get phishing kits that include email templates and SMS examples along with all the hosted tools to launch the phishing campaign. These turnkey platforms often reside in jurisdictions where regulations are lacking or not enforced.
Both the PhaaS providers and the criminals exist because they have made a successful business out of phishing and they continue to evolve and improve their “product offering”.
In this world of big data, both legitimate and illegitimate companies collect information on individuals from many sources. It is the combination of this collected data that allows criminals to know enough to hold you to ransom or just simply steal from your bank accounts. We, as individuals need to be 100% correct whereas the fraudsters only need us to make one mistake. Using social engineering techniques, they will play on our lack of computer literacy, human emotions, or just plain luck, which can result in us clicking that link and handing over personal data or money.
Many people will tell you not to trust unsolicited emails, SMS, or phone calls, but that will mean closing yourself off from many of the good things in life. Legitimate businesses need to reach out to you, to inform you of new products or services along with special offers and discounts, which may be available. It is better to be aware of the risks by using trusted tools like Trust Alice, which not only educate on the current risks but also ensure trusted businesses have a way to communicate with you.
