{"id":34482,"date":"2021-05-03T10:00:21","date_gmt":"2021-05-03T02:00:21","guid":{"rendered":"https:\/\/www.casbay.com\/blog\/?p=34482"},"modified":"2022-09-22T18:28:45","modified_gmt":"2022-09-22T10:28:45","slug":"what-are-phishing-emails","status":"publish","type":"post","link":"https:\/\/www.casbay.com\/blog\/tips-sharing\/what-are-phishing-emails","title":{"rendered":"What are Phishing Emails"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"34482\" class=\"elementor elementor-34482\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-554340d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"554340d\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-41511ef\" data-id=\"41511ef\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7197d3b elementor-widget elementor-widget-text-editor\" data-id=\"7197d3b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Phishing is an online scam in which criminals pretend to be legitimate organizations through emails, text messages, advertisements, or other means to steal sensitive information. This can usually be done by adding a link that seems to take you to the company\u2019s website to fill in your information. But, the website is the counterfeit product. Therefore, the scammer can directly retrieve the information you keyed in.<\/p><p>The term \u201cphishing\u201d is a spin on the word fishing. This is because the criminals are dangling a fake \u201clure\u201d. For example, legitimate emails, websites, or advertisements, hoping the users can provide what they requested. Most of the valuable information which attracts criminals are credit card numbers, account numbers, passwords, and usernames.<\/p><p>You probably think that you can identify a phishing attack before falling for one. Here\u2019s why you may be mistaken:<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1f7c419 elementor-widget elementor-widget-heading\" data-id=\"1f7c419\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Email Phishing\n<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-88f45de elementor-widget elementor-widget-image\" data-id=\"88f45de\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"512\" height=\"256\" src=\"https:\/\/www.casbay.com\/blog\/wp-content\/uploads\/2021\/04\/email-phishing.jpg\" class=\"attachment-large size-large wp-image-34485\" alt=\"What is Email Phishing?\" srcset=\"https:\/\/www.casbay.com\/blog\/wp-content\/uploads\/2021\/04\/email-phishing.jpg 512w, https:\/\/www.casbay.com\/blog\/wp-content\/uploads\/2021\/04\/email-phishing-300x150.jpg 300w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d95a084 elementor-widget elementor-widget-text-editor\" data-id=\"d95a084\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Most phishing emails are delivered via email and are not personalized or targeted at specific individuals or companies. This is called &#8220;bulk&#8221; phishing. The content of phishing emails varies greatly depending on the target of the attacker-common targets for impersonation. This includes banking and financial services, email and cloud productivity providers, and streaming services. Attackers may use the obtained credentials to steal money directly from the victim, although the compromised account is usually used as a starting point for other attacks, such as stealing proprietary information, installing malware, or conducting spear phishing within the targeted organization. Damaged streaming media service accounts are usually sold directly to consumers on the dark web market.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-730fc2f elementor-widget elementor-widget-heading\" data-id=\"730fc2f\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Spear Phishing\n<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-25a22b4 elementor-widget elementor-widget-image\" data-id=\"25a22b4\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"512\" height=\"324\" src=\"https:\/\/www.casbay.com\/blog\/wp-content\/uploads\/2021\/04\/spear-phishing.jpg\" class=\"attachment-large size-large wp-image-34484\" alt=\"spear phishing\" srcset=\"https:\/\/www.casbay.com\/blog\/wp-content\/uploads\/2021\/04\/spear-phishing.jpg 512w, https:\/\/www.casbay.com\/blog\/wp-content\/uploads\/2021\/04\/spear-phishing-300x190.jpg 300w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f426a4d elementor-widget elementor-widget-text-editor\" data-id=\"f426a4d\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Spear phishing involves attackers using tailored phishing emails to directly target specific organizations or individuals. In contrast to bulk phishing, spear phishing attackers usually collect and use personal information about the target to increase the probability success of an attack. Spear phishing usually targets people who work in financial department that has access to organization\u2019s sensitive financial data and services. In the year of 2019, a study showed that because employees of accounting and auditing companies have access to information that may be valuable to criminals, they are often targets of spear phishing.<\/p><p>One of the best examples is Threat Group-4127 (Fancy Bear). Spear phishing tactics are used to target email accounts linked to Hilary Clinton\u2019s 2016 presidential campaign. They attacked more than 1800 Google accounts and implemented the accounts-google.com domain to threaten targeted users.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cb0d4a2 elementor-widget elementor-widget-heading\" data-id=\"cb0d4a2\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Whaling and CEO fraud\n<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-676e331 elementor-widget elementor-widget-image\" data-id=\"676e331\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"800\" height=\"450\" src=\"https:\/\/www.casbay.com\/blog\/wp-content\/uploads\/2021\/04\/ceo-fraud.jpg\" class=\"attachment-large size-large wp-image-34483\" alt=\"ceo fraud\" srcset=\"https:\/\/www.casbay.com\/blog\/wp-content\/uploads\/2021\/04\/ceo-fraud.jpg 800w, https:\/\/www.casbay.com\/blog\/wp-content\/uploads\/2021\/04\/ceo-fraud-300x169.jpg 300w, https:\/\/www.casbay.com\/blog\/wp-content\/uploads\/2021\/04\/ceo-fraud-768x432.jpg 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e4a5a36 elementor-widget elementor-widget-text-editor\" data-id=\"e4a5a36\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Whaling is a spear phishing attack that specifically targets senior managers and other well-known targets. The content is likely to be designed to attract the target audience or role, such as subpoenas or customer complaints. CEO fraud is actually the opposite of whaling. It involves forging deceptive emails from senior managers, with the purpose of allowing other employees in the organization to perform specific actions, usually by transferring money to offshore accounts. Although the success rate of CEO fraud is quite low, criminals can get a lot of money from several successful attempts. The organization has repeatedly lost tens of millions of dollars in this type of attack.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Phishing is an online scam in which criminals pretend to be legitimate organizations through emails, text messages, advertisements, or other [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":34485,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"default","ast-site-content-layout":"","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"default","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"footnotes":"","_wpscppro_custom_social_share_image":0},"categories":[89],"tags":[99],"_links":{"self":[{"href":"https:\/\/www.casbay.com\/blog\/wp-json\/wp\/v2\/posts\/34482"}],"collection":[{"href":"https:\/\/www.casbay.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.casbay.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.casbay.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.casbay.com\/blog\/wp-json\/wp\/v2\/comments?post=34482"}],"version-history":[{"count":10,"href":"https:\/\/www.casbay.com\/blog\/wp-json\/wp\/v2\/posts\/34482\/revisions"}],"predecessor-version":[{"id":34745,"href":"https:\/\/www.casbay.com\/blog\/wp-json\/wp\/v2\/posts\/34482\/revisions\/34745"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.casbay.com\/blog\/wp-json\/wp\/v2\/media\/34485"}],"wp:attachment":[{"href":"https:\/\/www.casbay.com\/blog\/wp-json\/wp\/v2\/media?parent=34482"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.casbay.com\/blog\/wp-json\/wp\/v2\/categories?post=34482"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.casbay.com\/blog\/wp-json\/wp\/v2\/tags?post=34482"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}