Attackers use phishing to obtain log-in data from unsuspecting Internet users, for instance to then access e-banking facilities or online shops. In the process, the attackers affect a fake identity, so exploiting their victims’ good faith.
Protect yourself against phishing by ...
- never using any links you receive by e-mail or short message, and never scanning in any such QR codes to log into your financial institution facility.
- never filling in any forms received by e-mail or short message and asking you to enter log-in information.
- treating any attachments received with e-mails and text messages with great caution.
- never disclosing any confidential information, such as passwords, during telephone calls.
- always entering the address for your online service provider or financial institution’s log-in page manually via the browser address line.
- checking there is an TLS connection (https://, lock symbol) when calling up a log-in page, and verifying that the Internet address shown in the address bar of your browser actually indicates that you have reached the correct page.
- contacting your financial institution if you are not quite sure or something is not completely clear.
A typical phishing attack
1. Contact
Criminals send out faked e-mails purporting to be employees of online service providers or financial institutions. The recipients of such e-mails are for instance informed that their account information or access data (e. g. user name and password) are no longer safe or up-to-date, and that they should be updated using the link stated in their e-mail.
2. Intercepting personal data
A link stated in their e-mail does not however lead to the original service provider page, but to a faked website, albeit a very authentic looking one. Personal information entered there, such as passwords, directly end up in the hands of the perpetrators.
3. Gain
Using the stolen information, the perpetrators then, for instance, carry out remittances from their victim’s bank account, buy online at their cost or place faked offers with online auction houses.
For you to receive phishing mails, fraudsters have to know your e-mail address first. To reduce this risk and spam received into your inbox generally, it helps to follow some simple rules, to be found in our article on spam.
Further information for anyone interested
Classic phishing
With classing phishing, the attackers are trying to lure their victims to a counterfeit website with the help of a faked e-mail and to get them to enter their log-in information (for instance account number, password) there.
Alternatively or additionally, they may also add mail attachments containing a Trojan. Once this attachment is opened, it installs itself in the background, proceeding to capture Internet users’ access details or directing them to fake websites.
Important to know: Financial institutions would never send out e-mails like that!
Spear phishing and dynamite phishing
In contrast to classic phishing which involves large amounts of e-mails randomly sent to a broad public, with spear phishing, recipients are specifically chosen and receive e-mails personally tailored to them.
Senders take the guise of a trustworthy person here, often posing as an acquaintance, employee or business partner of the recipient. The personalised e-mail contents seem credible and authentic and are therefore not even recognised by spam filters at times.
If such personalised e-mails are created automatically and sent out en masse, we also call this “dynamite phishing”.
Smishing (SMS-Phishing)
Short messages are increasingly used for phishing attacks, too. The perfidious thing about “smishing” is that most of the criteria suitable to recognise phishing e-mails cannot be used for short messages: There is usually no personal form of address. Language and design of these text messages are too simple and brief to allow any conclusions as to whether they are fake. And on most mobile devices, it is rather difficult or unreliable to check the true sender and the link. Many users are also used to receiving SMS messages to verify their e-banking log-in or before financial transactions are carried out.
Vishing (voice phishing or phone phishing)
Vishing is the voice- or telephone-based version of phishing. Similar to classic phishing, a well thought-out story is employed to induce users to disclose confidential information, such as their log-in details for their e-banking facility.
QR Phishing
With QR phishing, attackers simply stick their own QR codes (Quick Response codes) over those displayed in frequently visited places and direct gullible users to a fake URL. This way, it is easily possible to execute scripts or show a faked financial institution log-in page, in particular on mobile devices.
Phishing using websites in the attachment
When phishing using websites, no link or document is included in the e-mail you receive – instead, there is simply an HTM- or HTML file containing a fake website in the attachment. Victims are fooled, since there is no link to click on. And at first glance, the attached file doesn’t seem to be that dangerous either, as it isn’t an actual document (Word, Excel) which could for instance run some macros.
But caution! HTM and HTML files can redirect victims straight to the attacker’s server! Any log-in information then entered will end up in the wrong hands this way. In addition, such files can also contain scripts, which may just cause more damage.
Such redirects and scripts are blocked by the latest e-mail software for security reasons. If however you open such an HTM or HTML attachment, this is no longer controlled by the mail program’s security settings. This is extra-perfidious, since even users aware of phishing in general are duped, since the browser address line “only” shows a local file path and not a dubious URL the way it is displayed with classic phishing.