Don’t Do It and Don’t Click It

Hello, Readers! It’s your friendly IT guy, Sean. Let’s talk about phishing and spoofing email scams. Since it’s TAX SEASON, these campaigns will be much more prevalent. I’ve already heard from multiple clients in the past few weeks, asking questions about how to discern what is real and what is spam.

What is Phishing?

Webster’s definition: “the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.” I think that’s spot on.

What Should I Look For?

Phishing attacks often consist of fabricated or compromised emails sent from someone in your company. The message usually contains random demands they often wouldn’t ask of you. Examples include requests to buy retail gift cards, or wiring money to an unfamiliar ccount. Usually, the email address doesn’t match the user’s real email address. It will be close, but not right. That’s the biggest tell (besides the sketchy demand, of course).

Are you an Office 365 User?

This is a new one we have seen recently, in which hackers use O365 to harvest data and credentials. The phishing message resembles a legitimate SharePoint and OneDrive link that prompts users to click. Once they do, they are taken to an Office 365 login page where they are asked to log in. After they’ve logged in, they’re prompted to grant permission to a third-party app called “Office 365” or “Office Access.” Once granted these permissions, the bad guys have full control of your Office 365 account. Yep, it’s as bad as it sounds, and then your account is officially compromised.

So How Do I Stop Phishing Emails?

I don’t think you’ll like this answer: you can’t stop phishing emails. I know you’re probably thinking, “Well that sucks, thanks for nothing, Sean….” Hold on. Let me at least tell you on what to look for and how to stop these attacks from affecting you or your business.

Educate yourself and employees on how to spot phishing scam red flags like unknown senders, grammatical and typo errors, and suspicious requests. Is the font weird? Is a signature missing? Did it come from a random gmail accont?

Do not click links or grant access to apps you find suspicious. Implementing two-factor authentication (2FA or MFA) is a no-brainer these days. It’s not going to help with phishing attacks, but it won’t allow your account to become compromised. If you haven’t already, add 2FA.

Let’s be honest, this stuff will never stop; it’ll likely only get more sophisticated. I’ve gotten tons of calls about it lately. Take a moment to pause or do a double-take when you receive something suspicious. Call your boss if he asked for a wire transfer – make sure it’s legit. That extra step will save users a lot of headaches from the fallout of one of these attacks. As always, we are here at Birds on a Cable to help if you’re unsure.