Exactly what the scammer wants can vary wildly between attacks. It might be handing over passwords to make it easier to hack a company or person, or sending payments to fraudsters instead of the correct account. This information is often stolen by making requests that look entirely legitimate – like an email from your boss, so you don’t think twice about doing what is asked. Also: The best VPN services right now A successful phishing attack is one that can provide everything fraudsters need to ransack information from their targets’ personal and work accounts, including usernames, passwords, financial information, and other sensitive data.  Phishing is also a popular method for cyber attackers to deliver malware by encouraging victims to download a weaponized document or visit a malicious link that will secretly install the malicious payload in attacks that could be distributing trojan malware, ransomware or all manner of damaging and disruptive attacks.  Also: How to stay safe on public Wi-Fi: 5 important tips  It’s also likely a reference to hacker history: some of the earliest hackers were known as “phreaks” or “phreakers” because they reverse engineered phones to make free calls. Also: How to find and remove spyware from your phone More complex phishing schemes can involve a long game, with hackers using fake social media profiles, emails and more to build up a rapport with the victim over months or even years, especially in cases where specific individuals are targeted for data that they would only ever hand over to people they trust.  That data can range from your personal or corporate email address and password to financial data such as credit card details, online banking accounts and cryptocurrency wallets, or even personal data including your date of birth, address and a social security number.  In the hands of fraudsters, all of that information can be used to carry out scams such as identity theft or using stolen data to buy things or even selling your private information to other cyber criminals on the dark web, who can use it how they please. For example, phished usernames and passwords are regularly the starting point for ransomware attacks.  Also: Your guide to the dark web and how to safely access .onion websites Because phishing can be so effective, it’s one of the most common techniques used by state-backed hacking groups for conducting espionage against other governments or other organizations of interest.  Ultimately, anyone can be a victim of a phishing attack, from high-ranking officials, to business leaders, to office professionals – anyone who has an email or social media account could fall victim to a phishing attack. The sheer number of emails sent every single day means that it’s an obvious attack vector for cyber criminals. Over 300 billion emails are sent every day – and it’s believed that at least three billion of these are malicious phishing emails.  Also: The best password managers you can use Most people simply don’t have the time to carefully analyze every message that lands in their inbox. Some scammers are aiming at unwary consumers. Their email subject line will be designed to catch the victim’s eye. Common phishing campaign techniques include offers of prizes won in fake competitions, such as lotteries or contests by retailers offering a winning voucher.  In order to receive the prize, the victims are asked to enter their details such as name, date of birth, address, and bank details, as well as their username and password, in order to claim it. Obviously, there’s no prize and all they’ve done is put their personal details into the hands of fraudsters.  Also: The best antivirus software and apps right now Other phishing emails claim to be from a bank or other financial institution looking to verify details, online shops attempting to verify non-existent purchases or sometimes – even more cheekily – attackers will claim that there’s been suspicious behavior on your account and you should login to check.  Sometimes they’ll even claim to be representatives of tech or cybersecurity companies and that they need access to information in order to keep their customers safe.  Other scams, usually more sophisticated, aim at business users. Here attackers might pose as someone from within the same organization or one of its suppliers and will ask you to download an attachment that they claim contains information about a contract or deal.  Also: My stolen credit card details were used 4,500 miles away. How it happened Attackers will often use high-profile events as a lure in order to reach their end goals. For example, during the height of the coronavirus pandemic, cyber criminals extensively sent emails that supposedly contained information about coronavirus as a means of luring people into falling victim.  One common technique is to deliver a Microsoft Office document that requires the user to enable macros to run. The message that comes with the document aims to trick the potential victim into enabling macros to allow the document to be viewed properly, but in this case it will allow the crooks to secretly deliver their malware payload.  One research paper suggests the cost of phishing for large companies is almost $15 million a year, whie the FBI suggests that the total cost of online attacks has cost US businesses over $43 billion in recent years. These are the “URGENT message from your bank” and “You’ve won the lottery” messages that aim to panic victims into making an error – or blind them with greed. Some emails attempt to use fear, suggesting there’s a warrant out for the victim’s arrest and they’ll be thrown in jail if they don’t click through.  Also: The best security keys you can buy Schemes of this sort are so basic that there’s often not even a fake web page involved – victims are often just told to respond to the attacker via email. Sometimes emails might play on the pure curiosity of the victim, appearing as a blank message with a malicious attachment to download.  These attacks are mostly ineffective, but the sheer number of messages being sent out means that there will be people who fall for the scam and inadvertently send details to cyber attackers who’ll exploit the information in any way they can.  For cyber criminals, they take little time and effort to spam out – the activity is often outsourced to bots – which means that they’re likely making a profit, even if it isn’t much.    While many in the information security sector might raise an eyebrow when it comes to the lack of sophistication of some phishing campaigns, it’s easy to forget that there are billions of internet users – and every day there are people who are accessing the internet for the first time.  Also: Personally identifiable information (PII): What it is, how it’s used, and how to protect it Lots of internet users won’t even be aware about the potential threat of phishing, let alone that they might be targeted by attackers using it. Why would they even suspect that the message in their inbox isn’t actually from the organization or friend it claims to be from? But while some phishing campaigns are so sophisticated and specially crafted that the message looks totally authentic, there are some key giveaways in less advanced campaigns that can make it easy to spot an attempted attack. Here are four such giveaways to look for.  Official messages from any major organization are unlikely to contain bad spelling or grammar, and certainly not repeated instances throughout the body. A poorly written message should act as an immediate warning that the communication might not be legitimate. It’s common for attackers to use a service like Google Translate to translate the text from their own first language, but despite the popularity of these services, they still struggle to make messages sound natural.

2. An unusual URL 

It’s very common for email phishing messages to coerce the victim into clicking through a link to a malicious or fake website. Many phishing attacks will contain what looks like an official-looking URL. However, it’s worth taking a second careful look. In some instances, it can simply be a shortened URL, whereby the attackers hope the victim won’t check the link and will just click through. In other instances, attackers will take a minor variation on a legitimate web address and hope the user doesn’t notice. Ultimately, if you are suspicious of a URL in an email, hover over it to examine the landing page address and, if it looks fake, don’t click on it. And check that it is the correct URL and not one that looks very similar but slightly different to one that that you’d usually expect.

3. A strange or mismatched sender address

You receive a message that looks to be from an official company account. The message warns you that there’s been some strange activity using your account and urges you to click the link provided to verify your login details and the actions that have taken place.  The message looks legitimate, with good spelling and grammar, the correct formatting and the right company logo, address and even contact email address in the body of the message. But what about the sender address? Also: This cruel email-hacking gang aims to tug on your heartstrings and steal your cash In many instances, the phisher can’t fake a real address and just hopes that readers don’t check. Often the sender address will just be listed as a string of characters rather than as sent from an official source. Another trick is to make the sender address almost look exactly like the company – for example, one campaign claiming to be from “Microsoft’s Security Team” urged customers to reply with personal details to ensure they weren’t hacked. However, there isn’t a division of Microsoft with that name – and if there was, it probably wouldn’t be based in Uzbekistan, where the email was sent from. Keep an eye on the sender address to ensure that the message is legitimately from who it says it is. 

4. This message looks too strange or too good to be true

Congratulations! You’ve just won the lottery/free airline tickets/a voucher to spend in our store – now just provide us with all of your personal information, including your bank details, to claim the prize. As is the case with many things in life, if it seems too good to be true, it probably is. In many cases, phishing emails with the aim of distributing malware will be sent in a blank message containing an attachment.  Never clicking on mysterious, unsolicited attachments is a good rule to live by online. Even if the message is more detailed and looks as if it came from someone within your organization, if you think the message might not be legitimate, contact someone else in the company – over the phone or in person rather than over email if necessary – to ensure that they really did send it. Cyber criminals also engage in CEO Fraud, a subset of BEC attack, where the attackers pose as a board member or manager, asking an employee to transfer funds to a specific account – often claiming it as a matter of secrecy and urgency. Exercises allow staff to make errors – and crucially learn from them – in a protected environment. It’s important not to punish people who fall victim to phishing exercises, because if they think they’ll be humiliated for reporting a real phishing attack, they may not report it, which would be bad for everyone. Being able to talk about phishing makes protecting against it easier in the long run. Also: Password-hacking attacks are on the rise. What you can do At a technical level, disabling macros from being run on computers in your network can play a big part in protecting employees from attacks. Macros aren’t designed to be malicious; they’re designed to help users perform repetitive tasks with keyboard shortcuts. However, the same processes can be exploited by attackers in order to help them execute malicious code and drop malware payloads. Most newer versions of Office automatically disable macros, but it’s worth checking to ensure that this is the case for all the computers on your network. It can act as a major barrier to phishing emails attempting to deliver a malicious payload. Multi-factor authentication (MFA) also provides a strong barrier against phishing attacks because it requires an extra step for cyber criminals to overcome in order to conduct a successful attack. According to Microsoft, using MFA blocks 99.9% of attempted account hacks. If applying MFA to accounts is possible, it should be applied. These early attacks were successful because it was a new type of attack, something users hadn’t seen before. AOL provided warnings to users about the risks, but phishing remained successful and it’s still here over 20 years on.  In many ways, it has remained the same for one simple reason – because it works. Following the initial AOL attacks, email became the most appealing attack vector for phishing scams, as home internet use took off and a personal email address started to become more common.  Also: Fraudsters are using machine learning to help write scam emails in different languages Many early phishing scams came with telltale signs that they weren’t legitimate – including strange spelling, weird formatting, low-res images, and messages that often didn’t make complete sense.  Nonetheless, in the early days of the internet, people knew even less about potential threats and that meant these attacks still found success – and are still effective today. Some phishing campaigns remain really obvious to spot – like the prince who wants to leave his fortune to you but others have become to be so advanced that it’s virtually impossible to tell them apart from authentic messages. Some might even look like they come from your friends, family, colleagues, or even your boss. Instead of vague messages being sent, criminals design them to target anything from a specific organization, to a department within that organization, or even an individual in order to ensure the greatest chance that the email is read and the scam is a success. Also: How my digital footprints left me surprisingly over-exposed online It’s these sorts of specially crafted messages that have often been the entry point for a number of high-profile cyberattacks and hacking incidents. Both cyber-criminal gangs and nation-state-backed attackers continue to use this as means of beginning espionage campaigns. The message might be designed to look like an update from your bank, it could say you’ve ordered something online, and it could relate to any one of your online accounts.  Hackers have even been known to seek out victims of data breaches and pose as customer service teams or security professionals warning victims of compromise – and that targets should ensure their account is still secure by entering their account details into this handy link. Also: How to find out if you are involved in a data breach While spear phishing does target consumers and individual internet users, it’s much more effective for cyber criminals to use it as a means of infiltrating the network of a target organization as it can produce a far more lucrative bounty. This particular type of phishing message can come in a number of forms including a false customer query, a false invoice from a contractor or partner company, a false request to look at a document from a colleague, or even in some cases, a message that looks as if it comes directly from the CEO or another executive. Rather than being a random message, the idea is to make it look as if it has come from a trusted source, and coax the target into either installing malware or handing over confidential credentials or information. These scams take more effort but there’s a bigger potential payback for crooks, too. Also: The best travel VPNs It’s quite possible for hackers to compromise the account of one user and use that as a stepping stone for further attacks. These ‘conversation hijacking’ attacks take advantage of using a real person’s account to send additional phishing emails to their real contacts – and because the email comes from a trusted source, the intended victim is more likely to click.   According to the FBI, common BEC scams include: cyber criminals posing as a vendor your company regularly deals with that sends an invoice with a (fake) updated mailing address; a company CEO asking an employee to buy gift cards to send out as rewards – and to send the gift card codes over immediately; or a homebuyer receiving an email about transferring a down-payment.

Business email compromise examples

In each instance, the attacker will rely heavily on social engineering, often attempting to generate a sense of urgency that the money transfer needs to be made right now – and in secret. For example, attackers have been known to compromise the email account for a supplier that they’ll use to send an ‘urgent’ invoice that needs paying to the victim.   In each of these cases, the attackers direct the funds into bank accounts they control, then make off with the money. By the time anyone notices anything is wrong, the attackers are long gone. According to the FBI, it’s estimated that BEC attacks cost a combined total of billions of dollars a year.  The growth of remote working in recent years has arguably made it easier for criminals to conduct BEC scams and other phishing attacks, because people working from home can’t as easily talk to one of their colleagues to check if the email is legitimate.   After a certain amount of time – it could be days, it could be months – the attacker might concoct a false story and ask the victim for details of some kind such as bank details, information, even login credentials, before disappearing into the ether with their info. Some attacks are simple and easy to spot: a Twitter bot might send you a private message containing a shortened URL that leads to something bad, such as malware or maybe even a fake request for payment details. Some of these are slightly more advanced, claiming to be a potential new friend and only sending a link after a few messages back and forth.  Also: These file types are the ones most commonly used by hackers to hide their malware But there are other attacks that play a longer game. A common tactic used by phishers is to pose as a person using photos ripped from the internet, stock imagery or someone’s public profile. Often these are just harvesting Facebook “friends” for some future mission and don’t actually interact with the target. However, sometimes plain old catfishing also comes into play, with the attacker establishing a dialogue with the target – all while posing as a fake persona. Also: Cybersecurity: These are the new things to worry about in 2023 One campaign of this nature targeted individuals in organizations in the financial, oil and technology sectors, with advanced social engineering based around a single, prolific social media persona that was fake. Those behind ‘Mia Ash’, a social media phishing campaign, are thought to have been working on behalf of the Iranian government and tricked victims into handing over login credentials and private documents. Our LinkedIn profiles can also display a lot of public-facing information, letting anyone out there know who we are, our professional interests, who we work for – and who our colleagues are. For cyber criminals, that means, if exploited, LinkedIn is a useful too for helping to conduct phishing attacks to steal passwords and other sensitive corporate information. For example, a fraudster could browse your LinkedIn profile to find out who you work and regularly interact with. Also: How LinkedIn massively cut the time it takes to detect security threats Then there are cyber criminals who are more direct, attempting to use LinkedIn itself as part of the attack chain. A common tactic is to claim the recipient is being headhunted for a job, before the attacker sends them an attachment featuring the job description – a fake document for a fake job that contains very real malware. Other attackers play a longer game, starting conversations with potential targets on LinkedIn before asking them to move to another platform like email or mobile messaging – and it’s through this platform that the phishing attack containing the malicious link or malware is distributed. Attackers don’t even need to use emails or instant-messaging apps to meet the end goal of distributing malware or stealing credentials – the internet-connected nature of modern communications means text messages are also an effective attack vector. Also: Follow this one simple rule for better phone security SMS phishing – or smishing – attacks work in much the same way as an email attack; presenting the victim with a fraudulent offer or fake warning as an incentive to click through to a malicious URL. The nature of text messaging means the smishing message is short and designed to grab the attention of the victim, often with the aim of panicking them into clicking on the phishing URL.  A common attack by smishers is to pose as a bank and fraudulently warn that the victim’s account has been closed, had cash withdrawn or is otherwise compromised. Also: 5 easy steps to keep your smartphone safe from hackers The truncated nature of the message often doesn’t provide the victim with enough information to analyze whether the message is fraudulent, especially when text messages don’t contain telltale signs, such as a sender address. One form of mobile-phishing attack that has become increasingly common in recent times is fraudulent missed delivery messages. The SMS phishing message claims that you have a delivery on the way – or that you’ve missed one – and that you need to click a link to reschedule or pay for it.   Once the victim has clicked on the link, the attack works in the same way as a regular phishing attack, with the victim duped into handing over their information and credentials to the perpetrator. However, unless the attacker has a large network of PCs, servers or IoT devices doing their bidding, making money from this kind of campaign can be an arduous task that involves waiting months. Another option for crooks is to use phishing to steal cryptocurrency directly from the wallets of legitimate owners – and that’s a lucrative business for cyber criminals. Also: Ransomware: An executive guide to one of the biggest menaces on the web In a prominent example of cryptocurrency phishing, one criminal group conducted a campaign that copied the front of Ethereum wallet website MyEtherWallet and encouraged users to enter their login details and private keys. Once this information had been gathered, an automatic script created the fund transfer by pressing the buttons like a legitimate user would, but all while the activity remained hidden from the individual until it was too late.  The theft of cryptocurrency in phishing campaigns like this and other attacks is costing crypto exchanges and their users hundreds of millions of dollars, as accounts and whole platforms get hacked and cyber criminals take the money for themselves. Also: Flipper Zero: ‘Can you really hack Wi-Fi networks?’ and other questions answered On top of this, the low cost of phishing campaigns and the extremely low chances of scammers getting caught means they remain a very attractive option for fraudsters. As new technologies emerge, it’s inevitable that cyber criminals will look to abuse them for profit. Cyber scammers have already used deepfake technology to successfully use phone calls to trick victims into believing they’re talking to their boss making a request for a financial transfer.  And as deepfake technology evolves, there’s also the potential for cyber criminals to exploit it on video calls, using the deep-learning tech to make themselves look and sound like someone the victim trusts, only to trick them into doing what they want.  Meanwhile, cybersecurity researchers warn that cyber criminals are already looking at the ChatGPT AI chat bot and the potential it has for helping to conduct campaigns. It’s possible that crooks could use AI to write convincing phishing messages. Also: What is ChatGPT and why does it matter? Here’s what you need to know Because of all of this, phishing will continue as cyber criminals look to profit from stealing data and dropping malware in the easiest way possible. But it can be stopped – and by knowing what to look for and by employing training when necessary, you can try to ensure that your organisation doesn’t become a victim.