Search
Close this search box.

Beware of a Phishing Attack

What is Phishing?

Phishers are cybercriminals who create fake, realistic-looking web pages to lure in businesses and individuals in order to gain private information. Their goal is to steal sensitive information, such as credit card information, passwords and money. From there, they end up either using your stolen credentials to transfer money to themselves or sell it on the black market.
Phishing has been growing rapidly and is able to reach out to their victims through email.
It is important to know that no matter how much protection you may have to prevent phishing, this crime can still happen to you or your business. Stay informed. 

Step 1: Choosing a victim

There are two types of phishing attacks:

Mass Phishing Attack – Aims for a general large population.

Targeted Phishing Attack – Chooses a high-profile, or specific, person/group.

Step 2: Setting Up the Source

The phisher first decides which brand name they want to use:

Brand Name – Phisher chooses a brand name for mass email distribution (LinkedIn, PayPal, etc.). They either create a fake website that resembles that brand name or hack into the real one.

Realistic Content – Phisher sends out a mock email requesting legal or financial information.

Step 3: Attack

Once that is decided, they carry out the attack by either:

Mass Distribution – Sending out a mass distribution email that includes fake, but believable web pages through links.

Targeted Distribution – Sending out an email to a smaller, precise group/person that includes fake, but believable web pages through links. 

Step 4: Falling for the Trap

Their plan is successful if you end up giving out your personal information by either:

Clicking on the Fake Links – The victim is taken to a fake web page where you end up giving out your sensitive information to them.

Responding Directly to the Email – The victim obeys the instructions given in the email and end up replying with your personal information.

Step 5: Expansion and Monetizing

Once/If the plan goes as planned, the phisher proceeds to use the stolen information/money to:

Create More Attacks – The phisher may begin to collect more email addresses that have been hacked for their next attack.

Transfer The Money/Sell Information – The phisher ends up transferring the money to their account or sell the sensitive information to the black market.

What YOU Can Do to Prevent Being Phished:

  • Your business should use email security inbound/outbound, URL rewrite, anti-spoofing, sandboxing and security awareness training. 
  • For more information, please visit: https://www.cyberteam.us/contact-us/ or call (914) 417-4814
  • Contact Troy Insurance asking what extra measures are best for your policy regarding this type of cyber crime.

About Us

Troy Insurance, a woman owned business, has been serving Stamford, Connecticut and the surrounding areas since 1960. We are a local Independent Insurance Agency known for providing superior personal and professional service.

Email us at troy@troyinsurance.com or
call 203-324-3143 to contact an agent today.

Click here to receive more information from the Insurance Information Institute.