Crast.net
  • News
    • Internet
  • Apps
  • Smartphones
    • Android
    • Apple
  • Devices
  • How to
  • Computer
    • Windows
    • Security
  • Reviews
  • Games
  • More
    • Comparisons
No Result
View All Result
Crast.net
  • News
    • Internet
  • Apps
  • Smartphones
    • Android
    • Apple
  • Devices
  • How to
  • Computer
    • Windows
    • Security
  • Reviews
  • Games
  • More
    • Comparisons
No Result
View All Result
Crast.net
No Result
View All Result

what is the "Whale Phishing" and how to protect yourself from these dangerous online scams

by Julian Ferreno
May 15, 2022
in News
what is the "Whale Phishing" and how to protect yourself from these dangerous online scams

Share

If the technology to scam us advances, we must be prepared to counter it.

The ingenuity of those who use new technologies to take advantage of others seems to have no limit. Today, any of us can be victims of frauds on the internet, both for naivety of those who do not have sufficient knowledge, such as the malice of those who try to get our data and information at all costs. If you want to meet a method quite particular to virtual deceptionthis article will solve your doubts.

On the hunt for the most interesting whales and how to obtain their data through deception

We talk about Whales in this type of fraud, since the english term used makes mention of this gigantic animal. We are in front of a fraud which is becoming more and more common in the business world and which is becoming a phishing variant that we all know, which turns out to be a set of computer techniques that are used to deceive a victim and make them perform actions that they should not. In the same way as a fisherman throw the fish hook Let’s see if a fish bites, here the scammer sends communications in the hope that some unsuspecting person falls into their networks.

The digital attack called whale phishing is a more specific and punctual variant of the usual phishing

Also read: Now Anyone Can Phish Without Security Knowledge

This method, also called whaling either CEO fraudnow you will see the reason for this name, it is usually a phishing attack where the fraudulent communication seems to come from a upper estate in the company or a department to which the affected person depends. Sometimes the CEO’s name of the company so that the strategy be more crediblewhich gives him the aforementioned nickname.

The objective of these types of attacks, which focus on a group of specific individuals instead of thousands of people, is take on someone else’s identitywe are facing a form of spear phishing, in order to to access to information stored in a specific organization or company. whether you are looking for money, sensitive documentation or access to networkswhale phishing is usually focused on the business sector.

Relentless methods and solutions that require good IT asset management

there are many methods that are used in this type of fraud. For example, the trickster might intercept an unencrypted email conversation and interfering to obtain a bank transfer at a given time. You could also send the link to a video call meeting, changing the link to a malware that infects your computer equipment and allows you to access its content. could be disguised as HR department and request the payroll of employees, both current and past.

exist various examples of this type of deception. In one of them, as stated in the prestigious medium The Guardian, the company behind Snapchat suffered a whale phishing who released the payment details of your employees. The company stated the following:

We have responded quickly and aggressively. Within the first four hours of the incident, we have confirmed that the phishing attack was an isolated incident and reported it to the FBI. We have started to cross-check which employees, current and former, could have been affected. We have also contacted these employees and offered them two years of free monitoring and identity theft insurance.

In addition to the usual solutionshow to pay attention to grammar of communications, these attacks could be prevented with training. Likewise, having programs that prevent the entry of malware and manage the emails via safe mechanisms, such as establishing a firewall to communications from outside the company, could be other weapons to prevent its success. Since many hackers use personal information to give credence to your scam, posting on social medialike LikedIn or Facebook, should be more controlled by the upper echelons of the company.

The reality is that these types of attacks have occurred in the past, they continue to occur and if you don’t act with training, they will occur more often. The only way What we have to protect ourselves from the bad intentions of these criminal organizations is question all kinds of communications and check your origineven if our workflow slows down.

Related topics: Security

Share

Related News

To the rich 2×1 in Samsung: you buy a Galaxy S22 and you take a Galaxy Watch4 for your pretty wrist

To the rich 2×1 in Samsung: you buy a Galaxy S22 and you take a Galaxy Watch4 for your pretty wrist

by Tracy Lopez
May 26, 2022

Samsung is beginning to get us used to those types of offers typical of those who have a wide catalog...

Become the moderator of your favorite streamer on Twitch with these tips

Become the moderator of your favorite streamer on Twitch with these tips

by Julian Ferreno
May 26, 2022

In general, the story of how a person manages to become a moderator starts the same way. Streamers tend to...

Espeon Arrives in Pokémon UNITE

Espeon Arrives in Pokémon UNITE

by Ryan Green
May 26, 2022

A special in-game event allows you to obtain Espeon's Unite license for a limited time without spending Aeos ores. All...

Niantic’s Campfire app will finally let ‘Pokémon Go’ players chat together

Niantic’s Campfire app will finally let ‘Pokémon Go’ players chat together

by James Kaufman
May 26, 2022

Move over Discord, Niantic has its own messaging solution pokemon go Players: A social AR app called Campfire. It will...

  • Privacy Policy
  • Terms and Conditions
  • Dislcaimer

© 2022 Crast.net - Gadget and Tech News.

No Result
View All Result
  • News
    • Internet
  • Apps
  • Smartphones
    • Android
    • Apple
  • Devices
  • How to
  • Computer
    • Windows
    • Security
  • Reviews
  • Games
  • More
    • Comparisons

© 2022 Crast.net - Gadget and Tech News.

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.