Phishing Methods

Beware of Phishing

In recent weeks, we have seen a huge increase in hostile activities, especially phishing, spear phishing, whaling, email phishing, clone phishing, so we decided to take a step forward and show our readers how to spot such attempts, the latest hacking methods, tools, etc.

File Sharing Applications

Cybercriminals will often share a malicious link to a document using a customized email which usually includes the name of the target company.

SharePoint phish

Fake IT Requests

There are many methods that attackers may use to trick people into clicking a link or downloading a malicious file. The example below is just another iteration you should look out for.

Fake IT request

Time Deadline And “Confidential”

Creating a sense of urgency is one of the clues of a hacking attempt. Another one is confidentiality because keeping the target isolated is crucial for the success of the attack.

Urgency and confidentiality

Watch Out For QR Codes!

QR codes have picked up steam. The following three screenshots describe hacking attempts where cybercriminals tried to create the perfect context to convince the recipients to scan these fraudulent QR codes leading the victims to malicious websites.

Employee Handbook

Remuneration Overview

Shipping Phishing Scams

We are seeing increasingly more shipping phishing scams.

Shipping Phishing

Clicking “View Your Order” will take the victim to this page:

View order

Fraudulent Attachments

Beware of suspicious attachments, e.g.

Fraudulent attachment request

Clicking the attachment would get the user to this .htm file pointing the victim to the phishing website.

Open document

Trial Accounts

Cybercriminals can sign up for trial accounts just to share a phishing document.

Trial Accounts Phishing

Fake Sign-In Pages

The strategy to handle these fraudulent attempts is always the same. Do not click a link unless it’s part of an active conversation. IF you find yourself on a Microsoft looking landing page, always look at the URL!

Microsoft fake sign

For a professional approach against such cyber threats, please reach out to StratusPointIT. Keeping your enterprise, your people, and your data safe is our commitment.

0 replies

Leave a Reply

Want to join the discussion?
Feel free to contribute!

Leave a Reply

Your email address will not be published. Required fields are marked *