Utilizziamo cookie tecnici per personalizzare il sito web e offrire all’utente un servizio di maggior valore. Chiudendo il banner e continuando con la navigazione verranno installati nel Suo dispositivo i cookie tecnici necessari ai fini della navigazione nel Sito. L’installazione dei cookie tecnici non richiede alcun consenso da parte Sua. Ulteriori informazioni sono contenute nella nostra Cookie Policy.



Phishing - The source of all attacks

PrintMailRate-it

​At a time when technological progress is making it increasingly difficult for hackers to break down security of information systems, the old and generally known statement that "the human is the weakest link in the security chain" still stands true.

The word "phishing" sounds like "fishing" for a reason - it also describes the action that serves to "catch" the victim. And the same way as in fishing, lures are used for this purpose. Such a lure is usually a carefully prepared fake email. Its purpose is to encourage the victim to click on a link in the message, download a document or open a file attached to the email. Attackers are able to create a fake message that looks authentic and from a trusted source such as a friend in the next room or a supervisor. Of course, attackers greatly succeed also with messages pretending to communicate with external companies such as telecommunications or courier. It is easy to convince the victim to check the supposedly lost invoice or to track a delivery which in fact never reaches us.

The times when phishing emails were sent out in bulk to random recipients and contained a lot of language errors, which made it relatively easy to spot them, are over. Nowadays, attackers craft specially profiled messages for a specific group of recipients. Attacks of this type are preceded by a thorough analysis of information about their victims available on public networks and social networking sites. If the targeted company regularly uses services of certain subcontractors or suppliers, it is easy to use this to send an e-mail with an attachment pretending to be an amended invoice. Such targeted attacks are referred to as Spear Phishing.

Are there any means of defending against such attacks? The most important thing in such cases is vigilance and awareness of the threat - features that should appear in the employees' personal development plans on an ongoing basis. It is impossible to predict all forms of attacking activity because each of us may be sensitive to a different kind of "bait". If the content of a message seems any bit suspicious to us, it is always best to double check it, e.g. by phone. It is worth looking more closely at the addresses of the links inserted in the message, for example, whether they contain spelling errors. Suspects may also include messages encouraging quick action, e.g. urgent confirmation of a transfer or a document check. Often attackers send such messages at the end of the working day hoping that the victim will not dwell on the legitimacy of the content and will quickly perform the provoked action.

In fact, phishing is not always aimed at achieving a quick effect and profit for the attacker - as would be the case with a direct request to transfer money to a false account. Most often it is only a prelude to further attacks - such as taking over logins and passwords to IT systems, running malicious software on the user’s machine or scamming credit card data. It is therefore a kind of a gateway for hackers, and the final results of opening an e-mail are difficult to predict and depend only on the inventiveness and capabilities of the attackers. The best way to resist such attacks is to have regular social and technical tests carried out by experienced cyber security companies.

Contact

Contact Person Picture

Adam Wódz

+48 22 2440000

Invia richiesta

RÖDL & PARTNER POLAND

Discover more about our offices in Poland. Read more »

Data Protection Bites


Our newsletter aims at collecting updates, news and insights on data protection matters worldwide, with a special focus on the GDPR.
Skip Ribbon Commands
Skip to main content
Deutschland Weltweit Search Menu