News Story
Posted by Transylvania County on February 3, 2020

Phishing is the most common type of social engineering attack that occurs today. The main goal of phishing attacks is to obtain personal information such as names, addresses and Social Security numbers.  In short, these criminals use shortened or misleading website links that redirect users to websites that are really phishing landing pages.  These malicious links are often delivered in e-mails or text message to the victims, and many contain spelling or grammar errors.

 

However, they all have the same goal of using fake websites to steal user login credentials and other personal information.  The key to preventing this type of attack is to never click on a link that you aren’t familiar with or that doesn’t come from a trusted source.  This week, we will continue to look at some common phishing scams for you to be on the lookout.

 

6.  The Contest Winner

 

Don’t get too excited when you receive emails that claim you’ve won something, or received an inheritance from a relative you've never heard of. 99.9% of the time, these are absolutely bogus. To claim your prize, the email requires you click a link and enter your info for prize shipment.

 

7.  The Friendly Bank

 

Your bank may offer account notifications when certain amounts are withdrawn from your accounts. This ploy tricks you with a fake account notification stating that an amount has been withdrawn from your account that exceeds your notification limit. If you have any questions about this withdrawal (which you probably would), it gives you a convenient link that leads to a web form asking for your bank account number “for verification purposes.” Instead of clicking on the link, give your bank a call. They may want to take action on the malicious email.

 

8.  The Victim

 

Being wrongly accused of something doesn’t feel good. This type of phishing acts as an angry customer whom supposedly sent you money in return for a shipped product. The email ends with a threat that they will inform the authorities if they don’t hear from you.

 

Source: www.spyescape.com & www.securitymetrics.com