SlideShare a Scribd company logo
1 of 4
Download to read offline
Building Modern Business
01424 460721
enquiries@astec.email
www.astec.website
Data Security
Whale Phishing
Astec’s Guide To Protecting Your Business
Definition
Of A Whaling
Attack
What Makes Whaling Attacks
Successful?
It is not just SME’s at risk to whale phishing. In 2016, the
social media app Snapchat fell victim to a whaling attack
when a employee was emailed by a cybercriminal
impersonating the CEO and was tricked into releasing
employee payroll information.
Snapchat
A Whaling Attack Victim
Snapchat reported the incident to the FBI,
offered the employees affected by the leak free
identity-theft insurance and have since trained
staff to deal with this threat.
The term ‘Whaling’ comes from the fact that a usual target will have a significant or important role in the company i.e. a
big fish. ‘Whales’ are used in the spoofing in the hope that the role or authority of the position will encourage the
target to act on the request without questioning it.
Whaling attacks are often successful as they are a personalised attack rather than a generic spam email. Whaling
attacks can be successful depending on the amount of information available. If your organisation has a ‘meet the team’
page that displays the name, role, email address and contact details of all your staff then an attacker can use this
information to not only build a spoof profile but choose an appropriate target within your organisation.
Whaling attacks are difficult to identify as they are so personalised and rely heavily on social engineering to trick the
target. These attacks have become increasingly popular due to the potentially large sums of money involved and
therefore attackers will also spend more time on a particular target than a typical malicious attack.
1
Building Modern Business
A whaling attack is a malicious attack on a company
or organisation for financial gain or to steal
sensitive information. A whaling attack differs from
traditional hacking and phishing attempts in that
the attacker will use information they have
gathered from the internet to impersonate a
working colleague. An attacker can use this
information to build a profile of an organisation. A
common example is an attacker impersonating a
key member of staff such as a director or CEO and
asking someone in a finance role for a sum of
money to be transferred urgently.
www.astec.website
Building Modern Business
Assume It’s Fake
Never enter your account credentials for
any service into a web page unless you are
100% sure it’s the real thing, look for https
and don’t follow email links to login pages.
Tips To Prevent Whaling Attacks
Are You A Target For Whaling Attacks?
The more information you have publicly available, the more you put yourself at risk of becoming a target for whaling
attacks. By presenting lots of information about your staff and their contact details on the web, a hacker will have
more information for building a profile to target your organisation. Think about your ‘meet the team’ or staff page on
your website. If you have a detailed list of staff, their roles, contacts details and other information, then the attacker
has more firepower to build a personalised attack.
How Do Whaling Attacks Difffer From Typical Phishing Attacks?
Phishing attacks generally involve an attempt to gain a user’s credentials through a generic email such as asking you
to sign in to verify your account. Phishing attacks are often sent in volume and are easier to detect due to the
generic content and the location of links included in the spam email. Whaling attacks are a more targeted attempt
and often bypass a spam filter as the content does not require the inclusion of a malicious link.
3
Whaling attacks will often start with a probe email to test the success of a hacking
attempt. This may be something as simple as sending an email asking for a response,
once a response has been received to the spoofed account, typically they will then
attempt to obtain sensitive information or more likely, a transfer of money. Phishing
attacks cover a broader spectrum of malicious hacking attempts and are often
generic or targeted at a large group of people rather than a personalised
attack to a small group or single person.
Threats to security are greater than ever and come in
ever more sophisticated forms. Astec will provide you
with advice and guidance on avoiding being caught by
whaling attacks, but this represents just one area of your
security landscape.
2
Need Further Support?
Astec Is Here To Help
www.astec.website
Educate Your Team
Introduce simple but effective processes for
money transfers and educate your team –
never rely on an email request alone to
initiate money transfers.
Use Multi-layer Security
Use multiple layers of security solutions
that go beyond the basic spam filter and
antivirus software and consider
multi-factor authentication.
We design, build and deploy secure environments that
work for you and our security team can provide detailed
audits, security reviews and solutions to keep your
business and your data safe and compliant. Speak to our
security experts today.
Building Modern Business
Years of experience
Becoming a Microsoft Gold Partner has been achieved by investing in
our team for over 25 years. This means you have access to the most
skilled and knowledgeable people to help your business grow.
25
01424 460721
enquiries@astec.email
www.astec.website

More Related Content

What's hot

Cyber security
Cyber securityCyber security
Cyber securityJoseMerda1
 
NASA Cyber Security Webinar: Phishing Detection Strategies
NASA Cyber Security Webinar: Phishing Detection StrategiesNASA Cyber Security Webinar: Phishing Detection Strategies
NASA Cyber Security Webinar: Phishing Detection StrategiesPaubox, Inc.
 
Phishing scams in banking ppt
Phishing scams in banking pptPhishing scams in banking ppt
Phishing scams in banking pptKrishma Sandesra
 
P H I S H I N G
P H I S H I N GP H I S H I N G
P H I S H I N Gbensonoo
 
Spear Phishing 101
Spear Phishing 101Spear Phishing 101
Spear Phishing 101Sendio
 
Fire eye spearphishing
Fire eye spearphishingFire eye spearphishing
Fire eye spearphishingZeno Idzerda
 
What is a phishing attack
What is a phishing attackWhat is a phishing attack
What is a phishing attackAariyaRathi
 
The Rise of Spear Phishing & How to Avoid being the Next Headline
The Rise of Spear Phishing & How to Avoid being the Next HeadlineThe Rise of Spear Phishing & How to Avoid being the Next Headline
The Rise of Spear Phishing & How to Avoid being the Next HeadlinePhishLabs
 
Spear phishing attacks-by-hari_krishna
Spear phishing attacks-by-hari_krishnaSpear phishing attacks-by-hari_krishna
Spear phishing attacks-by-hari_krishnaRaghunath G
 
Phishing Attack Awareness and Prevention
Phishing Attack Awareness and PreventionPhishing Attack Awareness and Prevention
Phishing Attack Awareness and Preventionsonalikharade3
 
Anatomy of a Spear Phishing Attack
Anatomy of a Spear Phishing AttackAnatomy of a Spear Phishing Attack
Anatomy of a Spear Phishing AttackMark Mair
 

What's hot (20)

Cyber security
Cyber securityCyber security
Cyber security
 
Phishing
PhishingPhishing
Phishing
 
Phishing
PhishingPhishing
Phishing
 
Phishing Technology
Phishing TechnologyPhishing Technology
Phishing Technology
 
What is Phishing and How can you Avoid it?
What is Phishing and How can you Avoid it?What is Phishing and How can you Avoid it?
What is Phishing and How can you Avoid it?
 
Phishing
PhishingPhishing
Phishing
 
NASA Cyber Security Webinar: Phishing Detection Strategies
NASA Cyber Security Webinar: Phishing Detection StrategiesNASA Cyber Security Webinar: Phishing Detection Strategies
NASA Cyber Security Webinar: Phishing Detection Strategies
 
Phishing scams in banking ppt
Phishing scams in banking pptPhishing scams in banking ppt
Phishing scams in banking ppt
 
P H I S H I N G
P H I S H I N GP H I S H I N G
P H I S H I N G
 
Spear Phishing 101
Spear Phishing 101Spear Phishing 101
Spear Phishing 101
 
Fire eye spearphishing
Fire eye spearphishingFire eye spearphishing
Fire eye spearphishing
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
What is a phishing attack
What is a phishing attackWhat is a phishing attack
What is a phishing attack
 
The Rise of Spear Phishing & How to Avoid being the Next Headline
The Rise of Spear Phishing & How to Avoid being the Next HeadlineThe Rise of Spear Phishing & How to Avoid being the Next Headline
The Rise of Spear Phishing & How to Avoid being the Next Headline
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Spear phishing attacks-by-hari_krishna
Spear phishing attacks-by-hari_krishnaSpear phishing attacks-by-hari_krishna
Spear phishing attacks-by-hari_krishna
 
Phishing Attack Awareness and Prevention
Phishing Attack Awareness and PreventionPhishing Attack Awareness and Prevention
Phishing Attack Awareness and Prevention
 
Introduction to phishing
Introduction to phishingIntroduction to phishing
Introduction to phishing
 
Anatomy of a Spear Phishing Attack
Anatomy of a Spear Phishing AttackAnatomy of a Spear Phishing Attack
Anatomy of a Spear Phishing Attack
 
PPT on Phishing
PPT on PhishingPPT on Phishing
PPT on Phishing
 

Similar to Data Security: A Guide To Whale Phishing

Prevent phishing scams
Prevent phishing scamsPrevent phishing scams
Prevent phishing scamsronpoul
 
Cyber Security PowerPoint Templates.pptx
Cyber Security PowerPoint Templates.pptxCyber Security PowerPoint Templates.pptx
Cyber Security PowerPoint Templates.pptxjenanityanand4
 
Email threat detection and mitigation
Email threat detection and mitigationEmail threat detection and mitigation
Email threat detection and mitigationNimishaRawat
 
Cybercrime - An essential guide from Thawte
Cybercrime - An essential guide from ThawteCybercrime - An essential guide from Thawte
Cybercrime - An essential guide from ThawteRapidSSLOnline.com
 
Phishing Awareness Training.pptx
Phishing Awareness Training.pptxPhishing Awareness Training.pptx
Phishing Awareness Training.pptxHajar Bouchriha
 
Are Phishing Attacks Angling For You?
Are Phishing Attacks Angling For You? Are Phishing Attacks Angling For You?
Are Phishing Attacks Angling For You? The TNS Group
 
Phishing, Smishing and vishing_ How these cyber attacks work and how to preve...
Phishing, Smishing and vishing_ How these cyber attacks work and how to preve...Phishing, Smishing and vishing_ How these cyber attacks work and how to preve...
Phishing, Smishing and vishing_ How these cyber attacks work and how to preve...Okan YILDIZ
 
The Top Cybersecurity Threats Frightening Small Businesses Today
The Top Cybersecurity Threats Frightening Small Businesses TodayThe Top Cybersecurity Threats Frightening Small Businesses Today
The Top Cybersecurity Threats Frightening Small Businesses TodayPC Doctors NET
 
phishing facts be aware and do not take the bait
phishing facts be aware and do not take the baitphishing facts be aware and do not take the bait
phishing facts be aware and do not take the baitssuser64f8f8
 
Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...
Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...
Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...IRJET Journal
 
Cyber Defense For SMB's
Cyber Defense For SMB'sCyber Defense For SMB's
Cyber Defense For SMB'sGuise Bule
 
Unit iii: Common Hacking Techniques
Unit iii: Common Hacking TechniquesUnit iii: Common Hacking Techniques
Unit iii: Common Hacking TechniquesArnav Chowdhury
 
Learn About Social Engineering Services - Aardwolf Security
Learn About Social Engineering Services - Aardwolf SecurityLearn About Social Engineering Services - Aardwolf Security
Learn About Social Engineering Services - Aardwolf SecurityAardwolf Security
 
December 2019 Part 10
December 2019 Part 10December 2019 Part 10
December 2019 Part 10seadeloitte
 
Phishing & Pharming Explained.pdf
Phishing & Pharming Explained.pdfPhishing & Pharming Explained.pdf
Phishing & Pharming Explained.pdfEvs, Lahore
 
Phishing: Analysis and Countermeasures
Phishing: Analysis and CountermeasuresPhishing: Analysis and Countermeasures
Phishing: Analysis and CountermeasuresIRJET Journal
 

Similar to Data Security: A Guide To Whale Phishing (20)

Prevent phishing scams
Prevent phishing scamsPrevent phishing scams
Prevent phishing scams
 
Cyber Security PowerPoint Templates.pptx
Cyber Security PowerPoint Templates.pptxCyber Security PowerPoint Templates.pptx
Cyber Security PowerPoint Templates.pptx
 
Email threat detection and mitigation
Email threat detection and mitigationEmail threat detection and mitigation
Email threat detection and mitigation
 
Cybercrime - An essential guide from Thawte
Cybercrime - An essential guide from ThawteCybercrime - An essential guide from Thawte
Cybercrime - An essential guide from Thawte
 
Phishing Awareness Training.pptx
Phishing Awareness Training.pptxPhishing Awareness Training.pptx
Phishing Awareness Training.pptx
 
Phishing
PhishingPhishing
Phishing
 
Are Phishing Attacks Angling For You?
Are Phishing Attacks Angling For You? Are Phishing Attacks Angling For You?
Are Phishing Attacks Angling For You?
 
Phishing, Smishing and vishing_ How these cyber attacks work and how to preve...
Phishing, Smishing and vishing_ How these cyber attacks work and how to preve...Phishing, Smishing and vishing_ How these cyber attacks work and how to preve...
Phishing, Smishing and vishing_ How these cyber attacks work and how to preve...
 
The Top Cybersecurity Threats Frightening Small Businesses Today
The Top Cybersecurity Threats Frightening Small Businesses TodayThe Top Cybersecurity Threats Frightening Small Businesses Today
The Top Cybersecurity Threats Frightening Small Businesses Today
 
phishing facts be aware and do not take the bait
phishing facts be aware and do not take the baitphishing facts be aware and do not take the bait
phishing facts be aware and do not take the bait
 
Phishing attack list
Phishing attack listPhishing attack list
Phishing attack list
 
Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...
Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...
Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...
 
Cyber Defense For SMB's
Cyber Defense For SMB'sCyber Defense For SMB's
Cyber Defense For SMB's
 
Cyber Attacks
Cyber AttacksCyber Attacks
Cyber Attacks
 
Unit iii: Common Hacking Techniques
Unit iii: Common Hacking TechniquesUnit iii: Common Hacking Techniques
Unit iii: Common Hacking Techniques
 
Learn About Social Engineering Services - Aardwolf Security
Learn About Social Engineering Services - Aardwolf SecurityLearn About Social Engineering Services - Aardwolf Security
Learn About Social Engineering Services - Aardwolf Security
 
December 2019 Part 10
December 2019 Part 10December 2019 Part 10
December 2019 Part 10
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Phishing & Pharming Explained.pdf
Phishing & Pharming Explained.pdfPhishing & Pharming Explained.pdf
Phishing & Pharming Explained.pdf
 
Phishing: Analysis and Countermeasures
Phishing: Analysis and CountermeasuresPhishing: Analysis and Countermeasures
Phishing: Analysis and Countermeasures
 

Recently uploaded

Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communicationskarancommunications
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear RegressionRavindra Nath Shukla
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...Aggregage
 
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxpriyanshujha201
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesDipal Arora
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayNZSG
 
Event mailer assignment progress report .pdf
Event mailer assignment progress report .pdfEvent mailer assignment progress report .pdf
Event mailer assignment progress report .pdftbatkhuu1
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataExhibitors Data
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...Paul Menig
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Centuryrwgiffor
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Dipal Arora
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...Any kyc Account
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Dave Litwiller
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...amitlee9823
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Roland Driesen
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst SummitHolger Mueller
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyEthan lee
 
Best Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in IndiaBest Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in IndiaShree Krishna Exports
 

Recently uploaded (20)

Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communications
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear Regression
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 
Event mailer assignment progress report .pdf
Event mailer assignment progress report .pdfEvent mailer assignment progress report .pdf
Event mailer assignment progress report .pdf
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors Data
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst Summit
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
 
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
Best Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in IndiaBest Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in India
 

Data Security: A Guide To Whale Phishing

  • 1. Building Modern Business 01424 460721 enquiries@astec.email www.astec.website Data Security Whale Phishing Astec’s Guide To Protecting Your Business
  • 2. Definition Of A Whaling Attack What Makes Whaling Attacks Successful? It is not just SME’s at risk to whale phishing. In 2016, the social media app Snapchat fell victim to a whaling attack when a employee was emailed by a cybercriminal impersonating the CEO and was tricked into releasing employee payroll information. Snapchat A Whaling Attack Victim Snapchat reported the incident to the FBI, offered the employees affected by the leak free identity-theft insurance and have since trained staff to deal with this threat. The term ‘Whaling’ comes from the fact that a usual target will have a significant or important role in the company i.e. a big fish. ‘Whales’ are used in the spoofing in the hope that the role or authority of the position will encourage the target to act on the request without questioning it. Whaling attacks are often successful as they are a personalised attack rather than a generic spam email. Whaling attacks can be successful depending on the amount of information available. If your organisation has a ‘meet the team’ page that displays the name, role, email address and contact details of all your staff then an attacker can use this information to not only build a spoof profile but choose an appropriate target within your organisation. Whaling attacks are difficult to identify as they are so personalised and rely heavily on social engineering to trick the target. These attacks have become increasingly popular due to the potentially large sums of money involved and therefore attackers will also spend more time on a particular target than a typical malicious attack. 1 Building Modern Business A whaling attack is a malicious attack on a company or organisation for financial gain or to steal sensitive information. A whaling attack differs from traditional hacking and phishing attempts in that the attacker will use information they have gathered from the internet to impersonate a working colleague. An attacker can use this information to build a profile of an organisation. A common example is an attacker impersonating a key member of staff such as a director or CEO and asking someone in a finance role for a sum of money to be transferred urgently. www.astec.website
  • 3. Building Modern Business Assume It’s Fake Never enter your account credentials for any service into a web page unless you are 100% sure it’s the real thing, look for https and don’t follow email links to login pages. Tips To Prevent Whaling Attacks Are You A Target For Whaling Attacks? The more information you have publicly available, the more you put yourself at risk of becoming a target for whaling attacks. By presenting lots of information about your staff and their contact details on the web, a hacker will have more information for building a profile to target your organisation. Think about your ‘meet the team’ or staff page on your website. If you have a detailed list of staff, their roles, contacts details and other information, then the attacker has more firepower to build a personalised attack. How Do Whaling Attacks Difffer From Typical Phishing Attacks? Phishing attacks generally involve an attempt to gain a user’s credentials through a generic email such as asking you to sign in to verify your account. Phishing attacks are often sent in volume and are easier to detect due to the generic content and the location of links included in the spam email. Whaling attacks are a more targeted attempt and often bypass a spam filter as the content does not require the inclusion of a malicious link. 3 Whaling attacks will often start with a probe email to test the success of a hacking attempt. This may be something as simple as sending an email asking for a response, once a response has been received to the spoofed account, typically they will then attempt to obtain sensitive information or more likely, a transfer of money. Phishing attacks cover a broader spectrum of malicious hacking attempts and are often generic or targeted at a large group of people rather than a personalised attack to a small group or single person. Threats to security are greater than ever and come in ever more sophisticated forms. Astec will provide you with advice and guidance on avoiding being caught by whaling attacks, but this represents just one area of your security landscape. 2 Need Further Support? Astec Is Here To Help www.astec.website Educate Your Team Introduce simple but effective processes for money transfers and educate your team – never rely on an email request alone to initiate money transfers. Use Multi-layer Security Use multiple layers of security solutions that go beyond the basic spam filter and antivirus software and consider multi-factor authentication. We design, build and deploy secure environments that work for you and our security team can provide detailed audits, security reviews and solutions to keep your business and your data safe and compliant. Speak to our security experts today.
  • 4. Building Modern Business Years of experience Becoming a Microsoft Gold Partner has been achieved by investing in our team for over 25 years. This means you have access to the most skilled and knowledgeable people to help your business grow. 25 01424 460721 enquiries@astec.email www.astec.website