Phishing Emails

  • DECEMBER 16TH, 2024
  • 1min read
Phishing Emails

Introduction

Phishing attacks are becoming increasingly sophisticated, with malicious actors exploiting current events like the Paris 2024 Olympics Games to run phishing campaigns. Threat actors are creative and may leverage positive and negative trends.

Recently, malicious actors launched phishing emails based on the Crowdstrike incident posing as Crowdstrike technical support to lure users in order to steal their credentials, more examples here.

How to Spot a Phishing Email

  • Email Address and Domain Name: Inspect emails for spelling errors. Phishing domains often mimic legitimate ones but reveal discrepancies upon close inspection. Established organisations typically own unique domains, not generic public ones.
  • Body of Mail: Scammers exploit urgency to manipulate victims into opening malicious attachments, clicking harmful links, or divulging sensitive information to infect devices with malware.
  • Salutation: Unexpected greetings are red flags.
  • Inconsistencies: Discrepancies in email addresses, links, or domain names indicate phishing attempts.

Security Awareness Training

  • Leverage our Phishing Security User Assessment and Training (PSUAT) to increase security awareness. Contact sdr@cecureintel.com for details.

Rescue the Threat from Phishing Emails

  • DNS Security: Implement DKIM, DMARC, SPF, DNSSEC.
  • Email Security: Use SEGs, ICES, MFA, S/MIME, PGP.
  • Avoid Interaction: Do not click links/download attachments from suspicious emails.
  • Report and Delete: Report suspicious emails to IT administrators, then delete them.
  • Training: Empower staff with security awareness training.

Explore more CIL Advisories

Preventing Deep Fake Scams

Preventing Deep Fake Scams

IntroductionMalicious actors always find creative ways to defraud unsuspecting individuals; deep fake scams are one of the latest ways with…

DECEMBER 9TH, 2024

Read More
Trouble Looms: Ransomware Attacks on the Rise

Trouble Looms: Ransomware Attacks on the Rise

IntroductionRansomware is a type of malware which prevents you from accessing your device and the data stored on it, usually…

DECEMBER 2ND, 2024

Read More
Google Chrome Zero Day Vulnerability

Google Chrome Zero Day Vulnerability

IntroductionWe'd like to bring to your attention a high-severity vulnerability in Google Chrome browsers and Chromium-based browsers with active ongoing…

NOVEMBER 18TH, 2024

Read More

Never miss a CIL Security Advisory

Stay informed with the latest security updates and insights from CIL.

Phishing Emails

Contact Us

Message Sent!

Thank you for reaching out. We have received your message and will get back to you shortly.

Check your email for a confirmation from us.

Start a project

Project Request Submitted!

Thank you for your interest. Our team will review your project details and reach out to you soon.

Check your email for a confirmation from us.