A simple way to Understand how you get attacks from Phishing (Emails, Messaging Apps etc )
What is Phishing?
Phishing is the fraudulent attempt to obtain sensitive information or data, such as usernames, passwords, and credit card details, by disguising oneself as a trustworthy entity in electronic communication such as (Email, SMS, Text messages, Mobile app messages, and social media posts.)
So how does phishing attacks work-
A malicious link will be sent, once clicked, It begins the process to Steal data, financial card information, login credentials, and also infect your device, phones with malware(Virus) when you download the attached document.
Phishing links don’t just come in emails alone. several malicious links that lead to stolen data and infected devices can be found in SMS text messages, Mobile app messages, Social media posts.
How I received these compromised messages.-
The phishing emails and text may usually look like a message from a company you know or trust. They may look like they’re from your financial institution, banks, your social networking site like Facebook or Instagram, an online payment website or app, or an online store like amazon, jumia or konga etc.
These emails or text messages often tell a story to trick you into clicking on a link or opening an attachment.
The usually are like:
Hello there,
“We noticed some suspicious activity or log-in attempts to account..
“there’s a problem with your account or your payment information click to update here…
“Please update some personal information…..
“say you’re eligible for a government fund, download the registration form.
“You have a coupon for free stuff.”
Such emails usually have real consequences for people who give attackers their information. And also harm the reputation of the companies they’re spoofing.
How they get access to your login details credentials-
When you receive this unsolicited email from an institution that provides a link or attachment and asks you to provide sensitive information, it’s usually a scam. Most companies will not send you an email asking for passwords, credit card information.
Companies make use of unique or verified domains to send emails.
The later is the wrong URL which the attackers would make a similar website Clone..
How your attackers get access to your data through attaching a Malware ..--
Attackers have traditionally relied on malicious links and attachments embedded in phishing emails. Phishing emails contain contents in the form of downloadable attachment. This will either be an infected attachment that you’re asked to download or a link to a fraudulent website.
The purpose of these email attacks is to capture sensitive information, such as login credentials, credit card details, phone numbers and account numbers.
When the attachment gets opened, they’ll see that the content isn’t intended for them, but it will be too late. The document deploys malware on the victim’s computer, which could perform any number of nefarious activities.
It is best that you never open an attachment unless you are sure that the message is from a trusted source.. Even then, you should look out for anything suspicious in the attachment.
How do you prevent an attack via phishing-
I have highlighted some checks to prevent these attacks and also techniques to deploy if you notice an attack.
Change your password to any accounts you think are compromised
Use two-factor authentication wherever it is supported
Comments
Post a Comment