
Online safety
The dangerous online network 764: what parents need to know
Learn the recruitment tactics of 764, warning signs to watch for, and prevention tips.
Read articleNimmi Kanji
Director - Social Purpose Programs, For Good and TELUS Wise
Despite the debate about exactly how old the Internet is and how long we’ve been using email for, the fact is that we’ve had some time to get acquainted with this technology and, generally speaking, we’re becoming more savvy internet users. The downside however, is that as we become more aware about how to identify and avoid phishing email traps, cyber criminals are stepping up their social engineering game and making it increasingly challenging for us to detect these sneaky and malicious emails that are disguised to look like legitimate correspondence. We’re seeing a trend where fraudsters are using more targeted approaches in favour of ‘spray and pray’ phishing campaigns that are sent to many people at the same time.
Here we shed light on two recent, targeted and increasingly sophisticated phishing email scams that may be coming to an inbox near you.
This scheme works by infecting a user’s computer with malicious software that works by stealing old emails and related contact information. Fraudsters then use the stolen emails and contact information to continue old email exchanges with the user’s contacts, taking time to make it appear as though the email comes from someone known and trusted, using a subject line that the recipient would be familiar with and including malicious email attachments. Unknowing suspects are tricked into opening the email and attachment (after all, the sender and subject line looked familiar) and malicious software continues to spread.
In this case, emails are disguised to come from a superior and dutiful employees are tricked into clicking and complying with requests in the email, which may range from simply reviewing an attached malicious document or clicking on a bad link, to providing direct deposit or banking information, to wire transferring money to complete a vendor payment. Some fraudsters may go the extra mile by scouring social media to get some ‘inside’ information about the target which they can then use to make the email seem even more legitimate (for instance, they could start off the email with “Hope you had a lovely trip to Mexico” using insight gleaned from a Facebook account with loose privacy settings, or “Heard the launch event went well last week - congratulations,” gathered from a recent LinkedIn post.
Often referred to as spear phishing attacks, these highly targeted and personalized emails can be tricky to detect and easy to fall victim to. In addition to the tips shared in this TELUS Wise video, here are some additional tips to help you stay safe from these more sophisticated phishing attempts:
For more tips on staying safe in our digital world, check out these TELUS Wise tips or book a TELUS Wise workshop.
Learn the recruitment tactics of 764, warning signs to watch for, and prevention tips.
Read articleLearn essential strategies to protect kids while gaming online.
Read articleLearn to spot romance scams, protect yourself, and enjoy safer online connections.
Read article